On 2016-05-01 12:57 , Godfrey DiGiorgi wrote:
While all of that might be useful if you're working with corporate security, 
the VAST majority of users will never have the sophistication to crack the 
system and really track down all the bits. No need to change or wipe machines, 
and very very VERY few people install spyware on computers that they share with 
their partners, unless they both have deep problems that have been going on for 
years and years, and they're particularly computer skilled.

i agree, what i described as the "most paranoid course" is only for a high-stakes situation

To lock down a system that's been shared:

1- In System Preferences, create a new user account with administrator 
privileges and a strong password.
2- Restart and login with that new account.
3- In System Preferences, disable administrator privileges on all other 
accounts.
4- Restart again.
5- Login on the user account you want to protect.
6- In System Preferences, change the user account's password.
7- If the account shared permissions in the file system with any other account, 
change the permissions on those folders to restrict access to just the owning 
account.
8- Logout of the user account, login on the administrator account.
9- Enable FileVault with a strong password.

yes, this is the course to take if the ex has hands-on access to the computer; i assumed that wouldn't be the case and focused on remote exploits

either way, it's still imperative to change the iCloud password, if iCloud is in use

and if File Sharing, Remote Login etc. has been enabled, the steps above won't keep out someone who has added their account to the lists of permitted users; changing the passwords for all accounts takes care of that without having to know all the details of how remote access works, but you also have to look out for Sharing permissions for "everyone"; these are things an ordinary experienced user could exploit

using FileVault depends on the details of that "older machine"; i would not recommend FileVault unless running Lion (10.7) or newer; it also may significantly slow a computer unless it has an i5 or i7 CPU (which have encryption commands built-in)

in addition to passwords for various online accounts, also change the "security questions" if the ex knows the answers

--
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
the directions.

Reply via email to