I am trying to confirm if an application was pushed to my computer by a developer. I have reason to believe someone remote accessed into my computer without my permission. I have reviewed the event logs and it shows someone had pretended to be me. Can someone please assist me?
Thanks Michelle M.