What I REALLY want to be able to know is when my COMPUTER is being accessed by another device - not just a new device on my network.
Am I wrong to think these are two different issues?
Isn’t it possible for an attacker to get access to a computer through a web connection or malware without necessarily having their device detected?