In Unix, what should I do if I find someone else is using my computing accounts?

Note:
If you authenticate to the Unix system with your IU passphrase, you should change that.

In Unix, if you find that someone else is using your computing accounts:

  1. Change your password immediately.
  2. Your local security office or system administrator may want to know that your accounts have been compromised. Check with your system administrator to see what process you should follow. At Indiana University, send email to the University Information Security Office at uiso@iu.edu. In the message, explain in detail what has happened.
  3. Make sure you don't have a .rhosts file in your account, as the intruder might have created a file that allows access to your account without a password. If the file isn't there, the attempt to delete it won't hurt. At the shell prompt, enter:
     rm .rhosts

To be on the safe side, consider doing this with all of your accounts.

At Indiana University, for personal or departmental Linux or Unix systems support, see At IU, how do I get support for Linux or Unix?

Related documents

This is document adyc in the Knowledge Base.
Last modified on 2017-05-16 11:50:38.

Contact us

For help or to comment, email the UITS Support Center.