Have a customer running Win7 Pro on a peer to peer network. Every Wednesday it seems something is trying to log into the administrator account on his computer when he isn't there. When he comes into the office on Thursday or remotes into the computer via Logmein he sees that the Windows login screen as switched from his user account login icon to the administrator account login icon. Thats not the strangest part though. Something actually has left a few characters typed into the password field. Last week it was 3 characters, this week its one character. He has security cameras in his office and nobody was near his desk at all. The only remote access to his machine is Logmein and I checked the Logmein reports and nobody had accessed his Logmein account at any time during the hours this would have occurred. I thought about program or windows update that cause automatic reboots but even if it had automatically rebooted Windows it wouldn't automatically switch user to the Administrator and certainly there is no way Windows itself would be able to key in characters in a entry field that I have ever heard of. Machine has been checked for malware and virus' and is clean as a whistle. And if someone was using some sort of hidden remote software on the machine why would they be bothered to try and log into the Administrator account when my clients users account has full administrator rights anyway. The whole things is creepy. Any ideas?