LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 04-19-2009, 09:20 AM   #46
wabbalee
Member
 
Registered: Oct 2006
Location: brisbane - australia
Distribution: ubuntu
Posts: 335

Rep: Reputation: 38

Ex seems to be an expert at the art of spying, reason enough to reinstall an OS for me. personally, I would not worry about Knoppix now. Instead, if you are running KUbuntu (like myself atm), you are somewhat familiar with that already and I think you should stick with that for now.
we are at the brink of a new (K)Ubuntu release (only days away) I would even suggest to stay with the version you have now, but that is up to you.

one way to see what KDE version you are using is to click on:
'the K at bottom left' then on 'SystemSettings' and then in the menu bar on 'Help-> About KDE'
you can now read the version of the KDE release. if it is version 3.5.x you are most likely using KUbuntu 8.04 alias 'Hardy Herron' or in short just 'Hardy'
The Ubuntu developers have thought of an interesting naming scheme for their releases and they are all named after African (I think so anyway) animals.

With the KUbuntu cd you can initially let it load into 'live' mode. I think it will do that automatically if you boot with the cd in you drive. Once the live cd has fully loaded you can access your windows partition by clicking on the icon called 'System Menu' right next to the big 'K' at the bottom left and then click on 'Storage Media' you will now see all drives that are attached (or built in) to the system. (May be you can do that even now in your current system, but I don't know what ex did with regards to passwords)

But first you will have to get yourself a copy. One way is to do what rich_c suggested in his post, but you will have to wait sometime before you get the actual disk. i92guboj suggests a Ubuntu link (post #40), which uses the GNOME desktop environment, which is excellent but I think you have KUbuntu which uses KDE and therefore looks and feels different as i92guboj also said. not harder just different.

btw, I am answerring this post offline as I have a 16hr shift at work (no internet here), so I apologise if I am suggesting anything here that's been suggested by someone else already. I will post this when I get home at midnight, the last post when I read this was from the moderator XavierP post number #42 on page #3.

If you want to stick with your current version, you will have to download the 'iso' file for it. (you will need to download an 'iso' anyway regardless) If you wish to stay with the same version we need you to answer what I previously suggested on how to find out which KDE version you use so we can provide the download link to the 'iso' for you. Then once you have downloaded the 'iso', burning it to a disc is as simple as inserting a blank CD in your burner;
right click on the just downloaded iso-> Actions-> Write CD Image with K3b.
give it some time to do its thing and click the 'start' button that appears in the window that pops up. I assume you have KUbuntu.

After succesful burning leave the CD in your drive and reboot your machine, if your computer now boots up exactly like it always has then report back here and we will have to help you setup your computer's BIOS to boot from cd first. This is where XavierP's suggestion of finding your local LUG can come in handy, but we could resolve it here as well. but may be ex just left it to boot of cd...

speaking of long posts...

Last edited by wabbalee; 04-19-2009 at 09:22 AM.
 
Old 04-19-2009, 02:46 PM   #47
mark_alfred
Senior Member
 
Registered: Jul 2003
Location: Toronto, Ontario, Canada
Distribution: Ubuntu Linux 16.04, Debian 10, LineageOS 14.1
Posts: 1,572

Rep: Reputation: 210Reputation: 210Reputation: 210
Quote:
Originally Posted by QueenMom View Post
Yay! You guys are so awesome...thank you for all this help. I will start pulling stuff off in a little while then. Before I do, I have 2 questions.

1) Can anything I'm going to pull off be infected? It's just some pictures and a couple of .doc documents.
Just pull off the stuff, and then later you can scan the usb-drive from the newly installed OS on your computer. Do you have files, such as documents and pictures, on the broken Windows partition that you wish to save? Unless something is seriously wrong with that partition, you should be able to mount it from within Linux, and copy files from it to your usb-drive. Usually there are icons/launchers on the desktop for mounting a computer's partitions, but if not, within your file-manager (Konqueror or Nautilus, or Rox Filer) go to the directory "/media" (or the directory "/mnt"), and you should see mount points that you can right-click on to access the Windows partition.

Also, do you have address files from daytimer and/or email programs that you'd like to save? You can export these files to the usb-drive, and then import them later in your newly set up operating system. Most daytimer and email programs allow for exporting files, for backup. This is true too of web browsers, and bookmark files.

Good luck

Last edited by mark_alfred; 04-19-2009 at 03:00 PM. Reason: deleted an off topic comment
 
Old 04-19-2009, 03:24 PM   #48
mark_alfred
Senior Member
 
Registered: Jul 2003
Location: Toronto, Ontario, Canada
Distribution: Ubuntu Linux 16.04, Debian 10, LineageOS 14.1
Posts: 1,572

Rep: Reputation: 210Reputation: 210Reputation: 210
devil's advocate

The suggestions thus far have been 1.) to attempt to fix your current operating system (Kubuntu?) via scanning it and tightening security on it, and 2.) declaring it irrevocably compromised, and thus reinstalling a flavour of Linux on it.

Given the title of thread, "I Just Don't Get Linux & Need Help", if you've got some money, you may wish to consider buying a new computer with Windows. New computers are reasonably cheap, and if you're getting high speed, most providers will set you up with malware and virus scanners, thus saving yourself the trouble. After all, given that a lot of the really useful open source free software is now available in both Linux AND Windows format, that no longer is an argument for using Linux. And, if Linux can so easily be breached (even by some ex-cop, never mind a computer specialist), and if getting security in Linux means having to join user groups, and configure firewalls, virus scanners, and even reinstall entire operating systems, then, really, who needs it?
 
Old 04-19-2009, 03:32 PM   #49
XavierP
Moderator
 
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 475Reputation: 475Reputation: 475Reputation: 475Reputation: 475
The issue is not that it was breached, but that it was set up in such a way as to make it insecure. The keylogger is not believed to be on there because the system was left insecure. it is believed to be on there because the person who installed the OS also installed the keylogger. No system is proof against maliciousness from the installer.
 
Old 04-19-2009, 03:49 PM   #50
stratotak
Member
 
Registered: Sep 2005
Distribution: Today Debian . Tomorrow ..??
Posts: 386

Rep: Reputation: 39
Quote:
Originally Posted by mark_alfred View Post
The suggestions thus far have been 1.) to attempt to fix your current operating system (Kubuntu?) via scanning it and tightening security on it, and 2.) declaring it irrevocably compromised, and thus reinstalling a flavour of Linux on it.

Given the title of thread, "I Just Don't Get Linux & Need Help", if you've got some money, you may wish to consider buying a new computer with Windows. New computers are reasonably cheap, and if you're getting high speed, most providers will set you up with malware and virus scanners, thus saving yourself the trouble. After all, given that a lot of the really useful open source free software is now available in both Linux AND Windows format, that no longer is an argument for using Linux. And, if Linux can so easily be breached (even by some ex-cop, never mind a computer specialist), and if getting security in Linux means having to join user groups, and configure firewalls, virus scanners, and even reinstall entire operating systems, then, really, who needs it?
Thats a little like saying you have a car with a flat tire,rather than learn to change the flat tire..just go head and buy a new car..lol..
 
Old 04-19-2009, 06:38 PM   #51
mark_alfred
Senior Member
 
Registered: Jul 2003
Location: Toronto, Ontario, Canada
Distribution: Ubuntu Linux 16.04, Debian 10, LineageOS 14.1
Posts: 1,572

Rep: Reputation: 210Reputation: 210Reputation: 210
Quote:
Originally Posted by XavierP View Post
The issue is not that it was breached, but that it was set up in such a way as to make it insecure.
Given the lack of information we actually have about her system, I don't think you can make such a definitive statement as this about it. If the root is still disabled, then no huge effort was made to make her system insecure. For instance, if the result of ...
Code:
cat /etc/passwd | grep root
... indicated that there was a root user set up on the system, I'd then readily agree with you.

[later edit] Actually, disregard the above. I've assumed that since Ubuntu has disabled the root user, that a root entry would not show up, and/or be commented out, in the /etc/passwd file. It's occurred to me that I might be totally wrong in this assumption, and that perhaps the disabling of root may take place elsewhere in the Ubuntu system (maybe in /etc/shadow, or something elsewhere). So, disregard, because I'm just not familiar enough with it to make such a statement.

Last edited by mark_alfred; 04-20-2009 at 11:12 AM. Reason: to diffuse the potential of, in trying to sound knowledgeable, actually revealing myself as an ignoramus
 
Old 04-20-2009, 10:51 AM   #52
XavierP
Moderator
 
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 475Reputation: 475Reputation: 475Reputation: 475Reputation: 475
True enough. But from the information given, it was a reasonable assumption. That said, the user has no failth in the system as it is - she believes it to be insecure and does not believe that she can restore it without her suspected cracker's knowledge. So with that said, I think the best fix is to reinstall and to start again with a system that she has faith in.

I do agree that it is better in the long run to fix the problems rather than reinstall, but in this case I think a reinstall is the better all round option.
 
Old 04-20-2009, 10:59 AM   #53
pixellany
LQ Veteran
 
Registered: Nov 2005
Location: Annapolis, MD
Distribution: Mint
Posts: 17,809

Rep: Reputation: 743Reputation: 743Reputation: 743Reputation: 743Reputation: 743Reputation: 743Reputation: 743
Quote:
Ex is a really bad apple. He used to be a cop and I found out he's using a friend's login/password (who is still a cop) to access info about me and my family from some database available only to law enforcement and that genre. Everything he finds, he's using against my family. (Not anything bad, just making sure I know he's got the info - like my parent's divorce decree from the early '80s.)
stop screwing around with computers and get a restraining order against Ex........You can have the best computer in the world and he can still cause trouble for you.
 
Old 04-20-2009, 12:00 PM   #54
mark_alfred
Senior Member
 
Registered: Jul 2003
Location: Toronto, Ontario, Canada
Distribution: Ubuntu Linux 16.04, Debian 10, LineageOS 14.1
Posts: 1,572

Rep: Reputation: 210Reputation: 210Reputation: 210
Quote:
Originally Posted by XavierP View Post
True enough. But from the information given, it was a reasonable assumption. That said, the user has no failth in the system as it is - she believes it to be insecure and does not believe that she can restore it without her suspected cracker's knowledge. So with that said, I think the best fix is to reinstall and to start again with a system that she has faith in.

I do agree that it is better in the long run to fix the problems rather than reinstall, but in this case I think a reinstall is the better all round option.
I agree that it's a good option. Still, I did feel here that people were too quick to jump on that option, and use it as an opportunity to plug their favourite distro. For instance,

Q: "Hey, my system's acting kinda weird. How do I fix it?"
A: "Obviously that system's broken and not for you! So let me recommend Disto-A! Distro-A is super clean, with super support! In tests, more users prefer Distro-A to Distro-B! So get Distro-A today!!"

Yeesh. What is with people who can only be an advertisement for their favourite distro? Plus, I suspect many of them use Linux as a secondary operating system (IE, a plaything), with Windows as their primary OS (that they've had for a while). If such a user was having a problem with their primary OS, that they've been using for a while, I suspect that they'd be a lot more interested in fixing it than formatting and reinstalling the drive. Like an old car (or bicycle, in my case), when you've been using something for a while, you prefer to stay with it and repair it, to simply trading it in.

Now, that may not be the case here, but there's no reason to assume that (I don't know how long she's been using her system). For myself, since I got rid of Windows 95, I've used Linux solely. When I ask for assistance, usually in mailing lists, for problems I encounter with my operating system, I would be shocked if the first thing I was told was to reformat and reinstall. In general, people ask me for information about the issues (with my system, not with my ex), and then make recommendations for fixing the system. Even for systems that won't boot up at all, or where x-windows is completely shot, people usually try to fix the system first before reformatting and reinstalling.
 
Old 04-20-2009, 12:03 PM   #55
i92guboj
Gentoo support team
 
Registered: May 2008
Location: Lucena, Córdoba (Spain)
Distribution: Gentoo
Posts: 4,083

Rep: Reputation: 405Reputation: 405Reputation: 405Reputation: 405Reputation: 405
Quote:
Originally Posted by XavierP View Post
I do agree that it is better in the long run to fix the problems rather than reinstall, but in this case I think a reinstall is the better all round option.
That's true in other circumstances. But once a system has been compromised you can't be every sure that it has been completely secured.

When someone gains root access, and provided that it's not a dumb script kiddie, the first thing that s/he will be doing is to obscure the logs and set up an alternate backdoor in one or another form. So he can gain access again if something goes bad.

In these cases even backups have a limited usefulness, most times you can't be sure for how long has the attacker been around.

The most probable thing if he truly has access to the system remotely is that he has setup alternate watches or loggers, cron jobs, a rootkit and a few other things, unless he is just a lamer.


On the other side, if he is not that skilled just changing all the passwords and disabling any daemon that is giving remote access could be enough, but on a filesystem where there can easily exist millions of files I doubt that anyone is willing to waste the time to fix it when a reinstall can be done in minutes. And as said, you can't guarantee the system is clean. No one can unless you have the NASA labs in your side


So I'd say just reinstall.
 
Old 04-20-2009, 01:55 PM   #56
mark_alfred
Senior Member
 
Registered: Jul 2003
Location: Toronto, Ontario, Canada
Distribution: Ubuntu Linux 16.04, Debian 10, LineageOS 14.1
Posts: 1,572

Rep: Reputation: 210Reputation: 210Reputation: 210
Self-conscious that I'm contradicting an earlier post of mine, but ...

Quote:
Originally Posted by i92guboj View Post
That's true in other circumstances. But once a system has been compromised you can't be every sure that it has been completely secured ...[and] I doubt that anyone is willing to waste the time to fix it when a reinstall can be done in minutes. And as said, you can't guarantee the system is clean.

So I'd say just reinstall.
As they say, when in doubt, throw it out.
 
Old 04-20-2009, 02:17 PM   #57
yancek
LQ Guru
 
Registered: Apr 2008
Distribution: Slackware, Ubuntu, PCLinux,
Posts: 10,503

Rep: Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489Reputation: 2489
Quote:
Ex is a really bad apple. He used to be a cop and I found out he's using a friend's login/password (who is still a cop) to access info about me and my family from some database available only to law enforcement and that genre.
Not only is this kind of activity inappropriate it is illegal in most places. Don't know what country you live in but most places, you could just call the police department wherever his friend works and report it. Assuming you have some substantive information, evidence.
 
Old 04-20-2009, 02:58 PM   #58
farslayer
LQ Guru
 
Registered: Oct 2005
Location: Northeast Ohio
Distribution: linuxdebian
Posts: 7,249
Blog Entries: 5

Rep: Reputation: 191Reputation: 191
Quote:
Originally Posted by QueenMom View Post
~ Ex is a really bad apple. He used to be a cop and I found out he's using a friend's login/password (who is still a cop) to access info about me and my family from some database available only to law enforcement and that genre. Everything he finds, he's using against my family. (Not anything bad, just making sure I know he's got the info - like my parent's divorce decree from the early '80s.)
Not sure about the laws there, but around here this is a violation of the terms of use for these services. Police are NOT ALLOWED to access those databases for personal reasons/use. That would land them in a whole heap of trouble (disciplinary action up to and including termination) if they were found out. and all inquires to those databases are logged by user and query.

Actually an entire police department can end up being banned from access to the databases for that type of misuse..



LEADS is one such system used locally
LAW ENFORCEMENT AGENCIES DATA SYSTEM (LEADS)

Quote:
Section 1240.80 Dissemination of Data Obtained Through LEADS
a) The LEADS network and LEADS data shall not be used for personal purposes.
b) Personal or unofficial messages shall not be transmitted.
c) LEADS data shall not be sold.
d) LEADS data shall not be disseminated to any individual or organization that is not legally authorized to have access to the information.

4) LEADS operators shall use the terminal only for those purposes for which they are authorized. The individual receiving a request for criminal justice information must ensure the person requesting the information is authorized to receive the data.


c) Major Violations Requiring Immediate Suspension (High Risk)

When a violation occurs that could seriously affect the integrity of LEADS or could threaten the safety of officers or the public, or is against the law, the Director may immediately suspend all or part of LEADS access or services without prior notice. When immediate suspension becomes necessary, the Director will notify the suspended agency and give the following:
Threaten the safety of the public, that's you..


Just want you to be aware if he is obtaining information through one of those systems he is most certainly in violation...


Sorry for going off topic like that, but you should be aware of that information. No matter what Law enforcement database they use I'm sure all have similar restrictions.






[edit]I read almos the whole thread but stopped a couple posts before the end, to see someone else had already mentioned this.. When will I learn to read the entire thread before posting ?

Last edited by farslayer; 04-20-2009 at 03:00 PM.
 
Old 04-20-2009, 10:36 PM   #59
AnanthaP
Member
 
Registered: Jul 2004
Location: Chennai, India
Posts: 952

Rep: Reputation: 217Reputation: 217Reputation: 217
QueenMom,

First "pull the network wire" (or get the wireless disabled). Then copy the pictures and documents to a USB or backup device. This is important since the ex could be logging your backup operations and "hit" on you in more malicious ways.

Next, copy out the data and reformat the hard disk and load up an OS of your choice. Preferable linux based since it is less probne to malicious attacks and as many other posters said, comes with better defaults.

MS-Office files contain macros that can run and install more malware, which will work mostly in a windows environment. Also, in MS-Office (if you prefer Windows) you can steps to disable the macros. Pictures should generally be OK. But look carefully at GIF files - particulalrly animated GIFs - using some GIF builder. They can still contain iritants and certainly do not use flash files if you choose to remain in a Windows environment.

End
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
AOL UK && BT Voyager 100 && Slackware 10.2 && RP-PPPoE pitt0071 Linux - Networking 3 01-17-2006 06:10 AM
Japanese canna won't work : Warning: かな漢字変&am OrganicOrange84 Debian 3 06-30-2005 02:28 PM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 01:01 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration