Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Please help my computer has been compromised Post 302895176 by kk243665 on Saturday 29th of March 2014 01:48:36 AM
Old 03-29-2014
Thank you . I will check. The reason I am suspicious is I am missing some Key emails and certain emails mainly the ones to my attorney appear in my sent folder multiple times but he had only received the email 1 time. When I say multiple its is showing 20-30 times and a minute apart. Also I have found some very important flagged emails in my trash. What I copied and paste in the first post is also why I am concern. I kept my maiden name ( kennedy) and my husbands last name is marshall. He is not a user on this computer and nothing on this computer is a Marshall user. I have tried to search the internet to find out what the string line is telling me but I am a bit at a loss. I have also consulted security firms here but most of them only want to close any open holes in my router. I would love a walk thru setting up a new key file. I also wanted to know if Unix leaves any type of footprint when he has remote access my computer.
 

9 More Discussions You Might Find Interesting

1. IP Networking

in.telnetd[5115] -- compromised?

/* Linux Slackware */ looking in my logs I see tons of entries similar to below. Does anyone know what these mean, and should I be concerned. I looked up a few of the IP's at Arin.net and saw that many of them belong to isp's (not good).. Any information is helpful.. Body of Messages log... (1 Reply)
Discussion started by: LowOrderBit
1 Replies

2. Programming

getting computer name

Hi all! Is there any function to get the name from a computer by the IP adresse? Thank you in advance! Greetings Mario (2 Replies)
Discussion started by: coredump2003
2 Replies

3. Shell Programming and Scripting

Another customisation for my computer

Hey, this time, I want my rhythmbox to play a different playlist at a set time (about sleeping time). my shellcode works, since if i run it it works, but when i make crontab run it, nothing happens. I try appending commands to the code, such as cp a file, and that occurs, so I have no idea what is... (1 Reply)
Discussion started by: davidY
1 Replies

4. OS X (Apple)

Change Computer Name

I am trying to change my computer name (located in system prefs-> sharing) using unix i've tried Macbook-Pro:~ user$ hostname Macbook-Pro.local Macbook-Pro:~ user$ sudo hostname hello Password: Macbook-Pro:~ user$ hostname hello It seems to work, but my computer is still called... (2 Replies)
Discussion started by: CBarraford
2 Replies

5. UNIX for Dummies Questions & Answers

How Can I To Power Off My Computer?

I have a SCO UNIX 5.0.6. and a computer ATX. My Question is: How can i to power off my computer without to push the power button? :confused: Please help me. :( Thanks :) (11 Replies)
Discussion started by: vhabalos
11 Replies

6. UNIX for Advanced & Expert Users

who - PC Computer name

Does anyone know of a way of identifying the PC / client name rather than IP address via who or some other AIX command (5.3). (4 Replies)
Discussion started by: gefa
4 Replies

7. What is on Your Mind?

What was your first computer?

Hey, the What Do You Do for a Living thread got me thinking about this. My first "computer" was a Timex Sinclair that I built from a kit. I also spent many hours painstakingly programming a Commodore Vic20 to display graphics and sound (and save them on that slooooow tape drive). My first "real"... (26 Replies)
Discussion started by: dday
26 Replies

8. Windows & DOS: Issues & Discussions

Which Computer to buy?

I currently own a macbook which I am happy with. I will be starting CS coursework in august, is it ok to buy a netbook just for programming purposes. The largest file would be the compiler; I do not see the actual programs taking up that much space. Thanks. (4 Replies)
Discussion started by: N-Training
4 Replies

9. Cybersecurity

Server has been compromised

Hi, I want to ask something about server that has been compromised. Recently, one of my VPS server has been hacked and the attacker install somekind like "IRC" script. Everytime I killed the process or close the port, it can open again .. and again ..I'm sure the attacker has installed... (14 Replies)
Discussion started by: franx47
14 Replies
Mail::SpamAssassin::Plugin::PhishTag(3pm)		User Contributed Perl Documentation		 Mail::SpamAssassin::Plugin::PhishTag(3pm)

NAME
PhishTag - SpamAssassin plugin for redirecting links in incoming emails. SYNOPSIS
loadplugin Mail::SpamAssassin::Plugin::PhishTag trigger_ratio 0.1 trigger_target RULE_NAME http://www.antiphishing.org/consumer_recs.html DESCRIPTION
PhishTag enables administrators to rewrite links in emails that trigger certain tests, preferably anti-phishing blacklist tests. The plugin will inhibit the blocking of a portion of the emails that trigger the test by SpamAssassin, and let them pass to the users' inbox after the rewrite. It is useful in providing training to email users about company policies and general email usage. OPTIONS
The following options can be set by modifying the configuration file. o trigger_ratio percentage_value Sets the probability in percentage that a positive test will trigger the email rewrite, e.g. 0.1 will rewrite on the average 1 in 1000 emails that match the trigger. o trigger_target RULE_NAME http_url The name of the test which would trigger the email rewrite; all the URLs will be replaced by http_url. DOWNLOAD
The source of this plugin is avaliable at: http://umut.topkara.org/PhishTag/PhishTag.pm a sample configuration file is also available: http://umut.topkara.org/PhishTag/PhishTag.cf SEE ALSO
Check the list of tests performed by SpamAssassin to modify the configuration file to match your needs from http://spamassassin.apache.org/tests.html AUTHOR
Umut Topkara, 2008, <umut@topkara.org> http://umut.topkara.org COPYRIGHT AND LICENSE
This plugin is free software; you can redistribute it and/or modify it under the same terms as SpamAssassin itself, either version 3.2.4 or, at your option, any later version of SpamAssassin you may have available. perl v5.14.2 2011-06-06 Mail::SpamAssassin::Plugin::PhishTag(3pm)
All times are GMT -4. The time now is 04:22 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy