1.

Solve : Computer starts up with no action by me?

Answer» <html><body><p>I used to frequent this site and provide the help I could and learn from others on here. This problem I'm not sure how to approach.  So as the title says my computer has been starting up by itself. I place the computer into sleep mode it will start back up periodically through the day. At first I thought someone scheduled multiple scheduled tasks to start my computer up as a gag, that was not the case, I've scanned multiple times for virus. I used the scanners that CH lists for scanning a system and <a href="https://interviewquestions.tuteehub.com/tag/came-248412" style="font-weight:bold;" target="_blank" title="Click to know more about CAME">CAME</a> up clean multiple times.<br/><br/><br/>Oh, I almost forgot, here are my specs.<br/><br/><br/>Help please, <br/><br/><br/>TalonTromper<br/><br/>[recovering disk space, attachment deleted by admin]It's either a scheduled task...or an app updating.<br/>Could also be your e-mail client phoning home.<br/>I don't use any Windows power saving features.If it was a scheduled task wouldn't it be listed inside the schedule tasks inside computer management?<br/><br/><br/>Also I've tried unplugging my network when I would leave, still happens.Check the event log<br/>In answer to your question...Yes...a scheduled Task would be listed.I've noticed that same thing with my laptop. Even though it's <a href="https://interviewquestions.tuteehub.com/tag/sleeping-1211724" style="font-weight:bold;" target="_blank" title="Click to know more about SLEEPING">SLEEPING</a> at times I hear the fan and the harddrive running.SalmonTrout I looked into the event viewer and the earliest thing that I could find entering an active state was "Window Image Acquisition" <br/><br/><br/><br/><br/><br/>Log Name:      System<br/>Source:        Service Control Manager<br/>Date:          7/27/2014 3:43:03 AM<br/>Event ID:      7036<br/>Task Category: None<br/>Level:         Information<br/>Keywords:      Classic<br/>User:          N/A<br/>Computer:      TomC-Comp_Room<br/>Description:<br/>The Windows Image Acquisition (WIA) service entered the running state.<br/>Event Xml:<br/>http://schemas.microsoft.com/win/2004/08/events/event"&gt;<br/>  <br/>    <br/>    7036<br/>    0<br/>    4<br/>    0<br/>    0<br/>    0x8080000000000000<br/>    <br/>    119036<br/>    <br/>    <br/>    System<br/>    TomC-Comp_Room<br/>    <br/>  <br/>  <br/>    Windows Image Acquisition (WIA)<br/>    running<br/>    7300740069007300760063002F0034000000<br/>  <br/><br/><br/><br/><br/>Here is the exported version of the event log.<br/><br/><br/><br/><br/><br/><br/><strong>Am I reading this right??? My system was remotely activated? The key field says that for a "3" that it was a network logon to my system, am I reading this wrong?</strong><br/><br/><br/><br/><br/><br/>Log Name:      Security<br/>Source:        Microsoft-Windows-Security-Auditing<br/>Date:          7/27/2014 3:42:54 AM<br/>Event ID:      4624<br/>Task Category: Logon<br/>Level:         Information<br/>Keywords:      Audit Success<br/>User:          N/A<br/>Computer:      TomC-Comp_Room<br/>Description:<br/>An <a href="https://interviewquestions.tuteehub.com/tag/account-25640" style="font-weight:bold;" target="_blank" title="Click to know more about ACCOUNT">ACCOUNT</a> was successfully logged on.<br/><br/><br/>Subject:<br/>   Security ID:      SYSTEM<br/>   Account Name:      TOMC-COMP_ROOM$<br/>   Account Domain:      WORKGROUP<br/>   Logon ID:      0x3e7<br/><br/><br/>Logon Type:         5<br/><br/><br/>New Logon:<br/>   Security ID:      SYSTEM<br/>   Account Name:      SYSTEM<br/>   Account Domain:      NT AUTHORITY<br/>   Logon ID:      0x3e7<br/>   Logon GUID:      {00000000-0000-0000-0000-000000000000}<br/><br/><br/>Process Information:<br/>   Process ID:      0x2d0<br/>   Process Name:      C:\Windows\System32\services.exe<br/><br/><br/>Network Information:<br/>   Workstation Name:   <br/>   Source Network Address:   -<br/>   Source Port:      -<br/><br/><br/>Detailed Authentication Information:<br/>   Logon Process:      Advapi  <br/>   Authentication Package:   Negotiate<br/>   Transited Services:   -<br/>   Package Name (NTLM only):   -<br/>   Key Length:      0<br/><br/><br/>This event is generated when a logon session is created. It is generated on the computer that was accessed.<br/><br/><br/>The subject fields indicate the account on the local system which requested the logon. This is most <a href="https://interviewquestions.tuteehub.com/tag/commonly-2530443" style="font-weight:bold;" target="_blank" title="Click to know more about COMMONLY">COMMONLY</a> a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.<br/><br/><br/>The logon type field <a href="https://interviewquestions.tuteehub.com/tag/indicates-248601" style="font-weight:bold;" target="_blank" title="Click to know more about INDICATES">INDICATES</a> the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).<br/><br/><br/>The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.<br/><br/><br/>The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.<br/><br/><br/>The authentication information fields provide detailed information about this specific logon request.<br/>   - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.<br/>   - Transited services indicate which intermediate services have participated in this logon request.<br/>   - Package name indicates which sub-protocol was used among the NTLM protocols.<br/>   - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.<br/>Event Xml:<br/>http://schemas.microsoft.com/win/2004/08/events/event"&gt;<br/>  <br/>    <br/>    4624<br/>    0<br/>    0<br/>    12544<br/>    0<br/>    0x8020000000000000<br/>    <br/>    32930<br/>    <br/>    <br/>    Security<br/>    TomC-Comp_Room<br/>    <br/>  <br/>  <br/>    S-1-5-18<br/>    TOMC-COMP_ROOM$<br/>    WORKGROUP<br/>    0x3e7<br/>    S-1-5-18<br/>    SYSTEM<br/>    NT AUTHORITY<br/>    0x3e7<br/>    5<br/>    Advapi  <br/>    Negotiate<br/>    <br/>    <br/>    {00000000-0000-0000-0000-000000000000}<br/>    -<br/>    -<br/>    0<br/>    0x2d0<br/>    C:\Windows\System32\services.exe<br/>    -<br/>    -<br/>  <br/><br/><br/><br/><br/><br/>Sorry for the wall of text.Why would at the same time as a log-on would a policy change be executed to the VSS.exe? Volume Shadow Service policy changes make no sense during a log-on.Just another reason to NOT use Win power saving features...just sayin.<br/>If you want the PC off ...turn it off...if you want it on...leave it on.If it's a remote magic packet wouldn't that start my system regardless of s1-4?<br/><br/><br/>But I will probably start leaving my system in a powered off state and see what happens.<br/><br/><br/> Quote</p><blockquote>If it's a remote magic packet wouldn't that start my system regardless of s1-4?</blockquote> <br/>No.Ok, so I just had my system turn on and I went to the CMD line and used "powercfg -lastwake" to see what turned my system on and it was a Media Center update. How do I disable Media Center from turning on my system?<br/><br/><br/>Update: I figured it out, thanks for the help. was under a task scheduler that I didn't check. It was running system maintenance programs during the night and starting the computer to do so.<br/><br/>[attachment deleted by admin to conserve space]</body></html>


Discussion

No Comment Found