In Unix, what should I do if I find someone else is using my computing accounts?

Note:
If you authenticate to the Unix system with your IU passphrase, you should change that.

In Unix, if you find that someone else is using your computing accounts:

  1. Change your password immediately.
  2. Your local security office or system administrator may want to know that your accounts have been compromised. Check with your system administrator to see what process you should follow. At Indiana University, send email to the University Information Security Office at uiso@iu.edu. In the message, explain in detail what has happened.
  3. Make sure you don't have a .rhosts file in your account, as the intruder might have created a file that allows access to your account without a password. If the file isn't there, the attempt to delete it won't hurt. At the shell prompt, enter:
     rm .rhosts

To be on the safe side, consider doing this with all of your accounts.

At Indiana University, for personal or departmental Linux or Unix systems support, see At IU, how do I get support for Linux or Unix?

Related documents

This is document adyc in the Knowledge Base.
Last modified on 2017-05-16 11:50:38.

  • Fill out this form to submit your issue to the UITS Support Center.
  • Please note that you must be affiliated with Indiana University to receive support.
  • All fields are required.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.

  • Fill out this form to submit your comment to the IU Knowledge Base.
  • If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.