Please help my computer has been compromised


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Please help my computer has been compromised
# 1  
Old 03-28-2014
Please help my computer has been compromised

Hi everyone,

I hope I am posting in the right spot and I really need some help. I am going through a horrible divorce and I am afraid that my husband has compromised . He set up my mac computer and router and for my job set up remote access for me. I caught him cheating on me and I think he has been logging into my computer remotely and accessing my text and emails from my attorney. I did a terminal search and have found the following. I do not know enough about unix to understand and look for footprints of where and if he is accessing but here are some of the stuff I can find. Is this a example of him log gin into my computer??


Quote:
3/26/14 12:26:39.077 PM iPhoto[21464]: view service marshal for <NSRemoteView: 0x7fe7263349e0> failed to forget accessibility connection due to Error Domain=NSCocoaErrorDomain Code=4099 "Couldn’t communicate with a helper application." (The connection was invalidated from this process.) UserInfo=0x608000e7df40 {NSDebugDescription=The connection was invalidated from this process.}
timestamp: 12:26:39.077 Wednesday 26 March 2014
process/thread/queue: iPhoto (21464) / 0x11da04000 / com.apple.NSXPCConnection.user.endpoint
code: line 2972 of /SourceCache/ViewBridge/ViewBridge-46.2/NSRemoteView.m in __57-[NSRemoteView viewServiceMarshalProxy:withErrorHandler:]_block_invoke
domain: communications-failure
# 2  
Old 03-28-2014
If you're concerned he's getting into your computer, take it off the internet.

Those lines don't look suspicious to me, honestly.
# 3  
Old 03-28-2014
Have a look at
Code:
cat ~/.ssh/authorized_keys

Wrote on Windows, use tab completion for proper filename.
Unless you added an entry there, it should be empty.
If it isnt, empty it.

If he had set up your machine so you can remotly access it, create a new keyfile.
We'll help on this if required.
# 4  
Old 03-29-2014
Thank you . I will check. The reason I am suspicious is I am missing some Key emails and certain emails mainly the ones to my attorney appear in my sent folder multiple times but he had only received the email 1 time. When I say multiple its is showing 20-30 times and a minute apart. Also I have found some very important flagged emails in my trash. What I copied and paste in the first post is also why I am concern. I kept my maiden name ( kennedy) and my husbands last name is marshall. He is not a user on this computer and nothing on this computer is a Marshall user. I have tried to search the internet to find out what the string line is telling me but I am a bit at a loss. I have also consulted security firms here but most of them only want to close any open holes in my router. I would love a walk thru setting up a new key file. I also wanted to know if Unix leaves any type of footprint when he has remote access my computer.
# 5  
Old 03-29-2014
Seems the main thing you are worried about is that someone is reading your emails on your computer; but you do not mention specifically what email account you are using or how you access email.

If you are worried a relative is reading emails that are sensitive and related to that relative (like in a divorce proceeding), you should set up a separate email account that is unknown to your relative (like a new gmail or yahoo account) and use that new account to communicate with your lawyer.

If you want to be even more safe, do not use your computer at home to communicate with this new email account.

It's not possible for us to know to any degree of certainty if your home computer or your accounts have been compromised; so it is best to assume they have been compromised (since you are in a sensitive situation) and you should not do sensitive work on that computer until such time you are 100% sure your home computer is safe and secure from others.
# 6  
Old 03-29-2014
1. Change your password.
2. Examine/delete your ~/.ssh/authorized_keys and ~/.ssh/authorized_keys2
3. Do 1. and 2. for the administrator(root) user.
4. Watch the network connections with the command
Code:
netstat

# 7  
Old 03-29-2014
Thank you everyone for the help. I am going to change my email address and not use my computer at home for sensitive things until I can get someone over here to reset my network and computer . I never though of a seperate email address and thank you for making that suggestion!
 
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Cybersecurity

Server has been compromised

Hi, I want to ask something about server that has been compromised. Recently, one of my VPS server has been hacked and the attacker install somekind like "IRC" script. Everytime I killed the process or close the port, it can open again .. and again ..I'm sure the attacker has installed... (14 Replies)
Discussion started by: franx47
14 Replies

2. Windows & DOS: Issues & Discussions

Which Computer to buy?

I currently own a macbook which I am happy with. I will be starting CS coursework in august, is it ok to buy a netbook just for programming purposes. The largest file would be the compiler; I do not see the actual programs taking up that much space. Thanks. (4 Replies)
Discussion started by: N-Training
4 Replies

3. What is on Your Mind?

What was your first computer?

Hey, the What Do You Do for a Living thread got me thinking about this. My first "computer" was a Timex Sinclair that I built from a kit. I also spent many hours painstakingly programming a Commodore Vic20 to display graphics and sound (and save them on that slooooow tape drive). My first "real"... (26 Replies)
Discussion started by: dday
26 Replies

4. UNIX for Advanced & Expert Users

who - PC Computer name

Does anyone know of a way of identifying the PC / client name rather than IP address via who or some other AIX command (5.3). (4 Replies)
Discussion started by: gefa
4 Replies

5. UNIX for Dummies Questions & Answers

How Can I To Power Off My Computer?

I have a SCO UNIX 5.0.6. and a computer ATX. My Question is: How can i to power off my computer without to push the power button? :confused: Please help me. :( Thanks :) (11 Replies)
Discussion started by: vhabalos
11 Replies

6. OS X (Apple)

Change Computer Name

I am trying to change my computer name (located in system prefs-> sharing) using unix i've tried Macbook-Pro:~ user$ hostname Macbook-Pro.local Macbook-Pro:~ user$ sudo hostname hello Password: Macbook-Pro:~ user$ hostname hello It seems to work, but my computer is still called... (2 Replies)
Discussion started by: CBarraford
2 Replies

7. Shell Programming and Scripting

Another customisation for my computer

Hey, this time, I want my rhythmbox to play a different playlist at a set time (about sleeping time). my shellcode works, since if i run it it works, but when i make crontab run it, nothing happens. I try appending commands to the code, such as cp a file, and that occurs, so I have no idea what is... (1 Reply)
Discussion started by: davidY
1 Replies

8. Programming

getting computer name

Hi all! Is there any function to get the name from a computer by the IP adresse? Thank you in advance! Greetings Mario (2 Replies)
Discussion started by: coredump2003
2 Replies

9. IP Networking

in.telnetd[5115] -- compromised?

/* Linux Slackware */ looking in my logs I see tons of entries similar to below. Does anyone know what these mean, and should I be concerned. I looked up a few of the IP's at Arin.net and saw that many of them belong to isp's (not good).. Any information is helpful.. Body of Messages log... (1 Reply)
Discussion started by: LowOrderBit
1 Replies
Login or Register to Ask a Question