Google "rootkit". This is a great example of theoretical security vs actual security. In theory, people review logs on their personal machines and hunt for bad guys. In practice, virtually nobody has ever done that. The reality is that personal laptop compromises are discovered through side-effects. Heat, sluggishness, webcam turning on, accounts being hijacked.