03-29-2014
Seems the main thing you are worried about is that someone is reading your emails on your computer; but you do not mention specifically what email account you are using or how you access email.
If you are worried a relative is reading emails that are sensitive and related to that relative (like in a divorce proceeding), you should set up a separate email account that is unknown to your relative (like a new gmail or yahoo account) and use that new account to communicate with your lawyer.
If you want to be even more safe, do not use your computer at home to communicate with this new email account.
It's not possible for us to know to any degree of certainty if your home computer or your accounts have been compromised; so it is best to assume they have been compromised (since you are in a sensitive situation) and you should not do sensitive work on that computer until such time you are 100% sure your home computer is safe and secure from others.
9 More Discussions You Might Find Interesting
1. IP Networking
/* Linux Slackware */
looking in my logs I see tons of entries similar to below. Does anyone know what these mean, and should I be concerned. I looked up a few of the IP's at Arin.net and saw that many of them belong to isp's (not good).. Any information is helpful..
Body of Messages log... (1 Reply)
Discussion started by: LowOrderBit
1 Replies
2. Programming
Hi all!
Is there any function to get the name from a computer by the IP adresse?
Thank you in advance!
Greetings Mario (2 Replies)
Discussion started by: coredump2003
2 Replies
3. Shell Programming and Scripting
Hey, this time, I want my rhythmbox to play a different playlist at a set time (about sleeping time). my shellcode works, since if i run it it works, but when i make crontab run it, nothing happens. I try appending commands to the code, such as cp a file, and that occurs, so I have no idea what is... (1 Reply)
Discussion started by: davidY
1 Replies
4. OS X (Apple)
I am trying to change my computer name (located in system prefs-> sharing) using unix
i've tried
Macbook-Pro:~ user$ hostname
Macbook-Pro.local
Macbook-Pro:~ user$ sudo hostname hello
Password:
Macbook-Pro:~ user$ hostname
hello
It seems to work, but my computer is still called... (2 Replies)
Discussion started by: CBarraford
2 Replies
5. UNIX for Dummies Questions & Answers
I have a SCO UNIX 5.0.6. and a computer ATX.
My Question is:
How can i to power off my computer without to push the power button? :confused:
Please help me. :(
Thanks :) (11 Replies)
Discussion started by: vhabalos
11 Replies
6. UNIX for Advanced & Expert Users
Does anyone know of a way of identifying the PC / client name rather than IP address via who or some other AIX command (5.3). (4 Replies)
Discussion started by: gefa
4 Replies
7. What is on Your Mind?
Hey, the What Do You Do for a Living thread got me thinking about this.
My first "computer" was a Timex Sinclair that I built from a kit. I also spent many hours painstakingly programming a Commodore Vic20 to display graphics and sound (and save them on that slooooow tape drive). My first "real"... (26 Replies)
Discussion started by: dday
26 Replies
8. Windows & DOS: Issues & Discussions
I currently own a macbook which I am happy with. I will be starting CS coursework in august, is it ok to buy a netbook just for programming purposes. The largest file would be the compiler; I do not see the actual programs taking up that much space. Thanks. (4 Replies)
Discussion started by: N-Training
4 Replies
9. Cybersecurity
Hi,
I want to ask something about server that has been compromised. Recently, one of my VPS server has been hacked and the attacker install somekind like "IRC" script.
Everytime I killed the process or close the port, it can open again .. and again ..I'm sure the attacker has installed... (14 Replies)
Discussion started by: franx47
14 Replies
userdel(8) System Manager's Manual userdel(8)
NAME
userdel - delete an user account
SYNOPSIS
userdel [-D binddn] [-P path] [-r[-f]]
[--service service] [--help] [-u] [-v] account
DESCRIPTION
userdel deletes an user account from the local system files or a LDAP database and removes all entries that refer to account from the group
database. Before the account is removed, the USERDEL_PRECMD command as defined in login.defs(5) is called, after removal the
USERDEL_POSTCMD command is called.
OPTIONS
-r, --remove-home
Remove the whole home directory and the mail spool of the specified account. Files located in other directories will have to be
searched for and deleted manually.
-f, --force
This option is used to force the removal of files, even if not owned by the account.
--service service
Add the account to a special directory. The default is files, but ldap is also valid.
-D, --binddn binddn
Use the Distinguished Name binddn to bind to the LDAP directory. The user will be prompted for a password for simple authentica-
tion.
-P, --path path
The passwd and shadow files are located below the specified directory path. chpasswd will use this files, not /etc/passwd and
/etc/shadow.
--help Print a list of valid options with a short description.
-u, --usage
Print a short list of valid options.
-v, --version
Print the version number and exit.
FILES
passwd - user account information
shadow - shadow user account information
group - group information
SEE ALSO
passwd(1), login.defs(5), passwd(5), shadow(5), useradd(8), usermod(8)
AUTHOR
Thorsten Kukuk <kukuk@suse.de>
pwdutils October 2003 userdel(8)