On 2016-05-01 12:57 , Godfrey DiGiorgi wrote:
While all of that might be useful if you're working with corporate security, the VAST majority of users will never have the sophistication to crack the system and really track down all the bits. No need to change or wipe machines, and very very VERY few people install spyware on computers that they share with their partners, unless they both have deep problems that have been going on for years and years, and they're particularly computer skilled.
i agree, what i described as the "most paranoid course" is only for a high-stakes situation
To lock down a system that's been shared: 1- In System Preferences, create a new user account with administrator privileges and a strong password. 2- Restart and login with that new account. 3- In System Preferences, disable administrator privileges on all other accounts. 4- Restart again. 5- Login on the user account you want to protect. 6- In System Preferences, change the user account's password. 7- If the account shared permissions in the file system with any other account, change the permissions on those folders to restrict access to just the owning account. 8- Logout of the user account, login on the administrator account. 9- Enable FileVault with a strong password.
yes, this is the course to take if the ex has hands-on access to the computer; i assumed that wouldn't be the case and focused on remote exploits
either way, it's still imperative to change the iCloud password, if iCloud is in use
and if File Sharing, Remote Login etc. has been enabled, the steps above won't keep out someone who has added their account to the lists of permitted users; changing the passwords for all accounts takes care of that without having to know all the details of how remote access works, but you also have to look out for Sharing permissions for "everyone"; these are things an ordinary experienced user could exploit
using FileVault depends on the details of that "older machine"; i would not recommend FileVault unless running Lion (10.7) or newer; it also may significantly slow a computer unless it has an i5 or i7 CPU (which have encryption commands built-in)
in addition to passwords for various online accounts, also change the "security questions" if the ex knows the answers
-- PDML Pentax-Discuss Mail List [email protected] http://pdml.net/mailman/listinfo/pdml_pdml.net to UNSUBSCRIBE from the PDML, please visit the link directly above and follow the directions.

