03-28-2014
Please help my computer has been compromised
Hi everyone,
I hope I am posting in the right spot and I really need some help. I am going through a horrible divorce and I am afraid that my husband has compromised . He set up my mac computer and router and for my job set up remote access for me. I caught him cheating on me and I think he has been logging into my computer remotely and accessing my text and emails from my attorney. I did a terminal search and have found the following. I do not know enough about unix to understand and look for footprints of where and if he is accessing but here are some of the stuff I can find. Is this a example of him log gin into my computer??
Quote:
3/26/14 12:26:39.077 PM iPhoto[21464]: view service marshal for <NSRemoteView: 0x7fe7263349e0> failed to forget accessibility connection due to Error Domain=NSCocoaErrorDomain Code=4099 "Couldn’t communicate with a helper application." (The connection was invalidated from this process.) UserInfo=0x608000e7df40 {NSDebugDescription=The connection was invalidated from this process.}
timestamp: 12:26:39.077 Wednesday 26 March 2014
process/thread/queue: iPhoto (21464) / 0x11da04000 / com.apple.NSXPCConnection.user.endpoint
code: line 2972 of /SourceCache/ViewBridge/ViewBridge-46.2/NSRemoteView.m in __57-[NSRemoteView viewServiceMarshalProxy:withErrorHandler:]_block_invoke
domain: communications-failure
9 More Discussions You Might Find Interesting
1. IP Networking
/* Linux Slackware */
looking in my logs I see tons of entries similar to below. Does anyone know what these mean, and should I be concerned. I looked up a few of the IP's at Arin.net and saw that many of them belong to isp's (not good).. Any information is helpful..
Body of Messages log... (1 Reply)
Discussion started by: LowOrderBit
1 Replies
2. Programming
Hi all!
Is there any function to get the name from a computer by the IP adresse?
Thank you in advance!
Greetings Mario (2 Replies)
Discussion started by: coredump2003
2 Replies
3. Shell Programming and Scripting
Hey, this time, I want my rhythmbox to play a different playlist at a set time (about sleeping time). my shellcode works, since if i run it it works, but when i make crontab run it, nothing happens. I try appending commands to the code, such as cp a file, and that occurs, so I have no idea what is... (1 Reply)
Discussion started by: davidY
1 Replies
4. OS X (Apple)
I am trying to change my computer name (located in system prefs-> sharing) using unix
i've tried
Macbook-Pro:~ user$ hostname
Macbook-Pro.local
Macbook-Pro:~ user$ sudo hostname hello
Password:
Macbook-Pro:~ user$ hostname
hello
It seems to work, but my computer is still called... (2 Replies)
Discussion started by: CBarraford
2 Replies
5. UNIX for Dummies Questions & Answers
I have a SCO UNIX 5.0.6. and a computer ATX.
My Question is:
How can i to power off my computer without to push the power button? :confused:
Please help me. :(
Thanks :) (11 Replies)
Discussion started by: vhabalos
11 Replies
6. UNIX for Advanced & Expert Users
Does anyone know of a way of identifying the PC / client name rather than IP address via who or some other AIX command (5.3). (4 Replies)
Discussion started by: gefa
4 Replies
7. What is on Your Mind?
Hey, the What Do You Do for a Living thread got me thinking about this.
My first "computer" was a Timex Sinclair that I built from a kit. I also spent many hours painstakingly programming a Commodore Vic20 to display graphics and sound (and save them on that slooooow tape drive). My first "real"... (26 Replies)
Discussion started by: dday
26 Replies
8. Windows & DOS: Issues & Discussions
I currently own a macbook which I am happy with. I will be starting CS coursework in august, is it ok to buy a netbook just for programming purposes. The largest file would be the compiler; I do not see the actual programs taking up that much space. Thanks. (4 Replies)
Discussion started by: N-Training
4 Replies
9. Cybersecurity
Hi,
I want to ask something about server that has been compromised. Recently, one of my VPS server has been hacked and the attacker install somekind like "IRC" script.
Everytime I killed the process or close the port, it can open again .. and again ..I'm sure the attacker has installed... (14 Replies)
Discussion started by: franx47
14 Replies
LEARN ABOUT OPENSOLARIS
machid
machid(1) User Commands machid(1)
NAME
machid, sun, iAPX286, i286, i386, i486, i860, pdp11, sparc, u3b, u3b2, u3b5, u3b15, vax, u370 - get processor type truth value
SYNOPSIS
sun
iAPX286
i386
pdp11
sparc
u3b
u3b2
u3b5
u3b15
vax
u370
DESCRIPTION
The following commands will return a true value (exit code of 0) if you are using an instruction set that the command name indicates.
sun True if you are on a Sun system.
iAPX286 True if you are on a computer using an iAPX286 processor.
i386 True if you are on a computer using an iAPX386 processor.
pdp11 True if you are on a PDP-11/45tm or PDP-11/70tm.
sparc True if you are on a computer using a SPARC-family processor.
u3b True if you are on a 3B20 computer.
u3b2 True if you are on a 3B2 computer.
u3b5 True if you are on a 3B5 computer.
u3b15 True if you are on a 3B15 computer.
vax True if you are on a VAX-11/750tm or VAX-11/780tm.
u370 True if you are on an IBM(R) System/370tm computer.
The commands that do not apply will return a false (non-zero) value. These commands are often used within makefiles (see make(1S)) and
shell scripts (see sh(1)) to increase portability.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
make(1S), sh(1), test(1), true(1), uname(1), attributes(5)
NOTES
The machid family of commands is obsolete. Use uname -p and uname -m instead.
SunOS 5.11 5 Jul 1990 machid(1)