Tracking preditor, remote access

Discussion in 'iOS 5 and earlier' started by imagemuse, Nov 11, 2011.

  1. imagemuse, Nov 11, 2011
    Last edited: Nov 11, 2011

    imagemuse macrumors newbie

    Nov 11, 2011
    My Imac has been hacked, my ex business partner had access to my Imac, (just discovered the remote access was clicked in the sharing) I called apple and they advised to save the console log. After doing some research, I typed in ssh into the thread search

    the console log reads:
    (com.openssh.sshd) Unknown key: SHAuthorizationRight

    Can I track him through this method? How do I analyze the console messages to trace him? My quickbook application was infected as well on my powerbook. Any advice on how to track the preditory activity, searching key words, what message/sender should I look for? Thank you for taking the time to help me.
  2. Will69 macrumors regular

    Oct 24, 2011
    Please stop spelling predator incorrectly.

    Why is this in the iOS 5 section?
  3. brand macrumors 601


    Oct 3, 2006
    What makes you think that your iMac was hacked?

    Quickbooks was infected with what?

    If you have no idea what you are doing, and obviously you don't, then you need to pay someone who specializes in Computer Security or Computer Forensics.

    Your iMac is most likely on a private network and you have nothing to worry about unless ports were opened in the firewall.

Share This Page