Interpreting logs to see if laptop remotely accessed
Hi,
Is there anyone out there who could assist with interpreting whether my computer was remotely accessed without my knowledge? I was connected to a school network and have a specific period of time that I think it was being accessed. The logs seem to indicate that someone was able to gain access to/create a duplicate of my username, but I'm new to all of this so I wanted to run it by someone with more knowledge. Please let me know if you are willing to help, thank you!