So I am in a situation where I need to prove that I am not hacking or monitoring someone elses computer on a home network. The setup is fairly standard. 2 win 10 computers(one home edition and and one professional edition), 3 android smartphones and a netgear home router make up the network. Additionaly, the phones communicate with the computers to access files, send adb commands, and screencast the phones to the computers.
In the past, one computer has backed up and later retrieved files from the other computer. And one computer has screen cast to the other computer. I have also logged into the other individual's computer with my account, and vice versa. I can provide additional information as needed, but this is what I can think to add so far as a snapshot of the use of the technology on the network.
What I am looking for is a fairly in depth list of services, standard windows apps, and protocols that would have interaction between the computers. I am looking for a whitelist, as it were, of specific reasons and methods that the computers use to interact with each other as part of a baseline network configuration, so that we can rule those out while we try to figure out if we have ben hacked or if anything untoward is happening. Both myself and the other individual are fairly tech saavy, so we are looking for the specifics of what to rule out so we are not chasing down legit interactions as we pour over logs, DLL files, etc.
Thanks.
In the past, one computer has backed up and later retrieved files from the other computer. And one computer has screen cast to the other computer. I have also logged into the other individual's computer with my account, and vice versa. I can provide additional information as needed, but this is what I can think to add so far as a snapshot of the use of the technology on the network.
What I am looking for is a fairly in depth list of services, standard windows apps, and protocols that would have interaction between the computers. I am looking for a whitelist, as it were, of specific reasons and methods that the computers use to interact with each other as part of a baseline network configuration, so that we can rule those out while we try to figure out if we have ben hacked or if anything untoward is happening. Both myself and the other individual are fairly tech saavy, so we are looking for the specifics of what to rule out so we are not chasing down legit interactions as we pour over logs, DLL files, etc.
Thanks.