terminal – Is my Macbook Air Hacked?


The data you may have supplied doesn’t appear regarding in any respect, although the stuff a few jailbreak may deserve a brand new query of its personal, with extra particulars.

The consumer identify is leandritus and the subsequent discipline signifies the place the consumer logged in from. Primarily based in your consumer identify right here, I assume that is your authentic consumer account.

I suppose what occurred right here is that you just misplaced the password for leandritus and the service guys created a brand new account macbookpro with a brand new password for you. There is a third account mac which has logged in as soon as.

When you have not enabled distant logins over the community lately, I feel we will safely assume all of those have been made by somebody with bodily entry to the laptop computer. Those on tty* are while you log in from a terminal window and the console ones are while you logged in from the login display.

Once more, all of this appears to be like completely regular, not less than within the absence of extra data to recommend that you’ve unauthorized exercise in your pc.

Additionally, take a look at the dates – there have been weeks between these crashes.

In some extra element, the final output signifies the consumer identify, the situation the place the consumer logged in from (the place identified), the time of the login, and the length of the session. See the handbook web page for particulars and extra choices.

(The person web page hyperlink is to an internet model which could differ barely from what you may have put in. The command man final in a terminal window will show the handbook web page out of your native system, which needs to be authoritative.)

When you actually suspect that one thing is fallacious, reinstalling the working system utilizing macOS Restoration (or when you have a very outdated machine, correct installer media resembling an official Apple DVD) ought to all the time be enough to fully reset the whole lot to manufacturing facility state.

Clearly, you may must be sure you have backups of all of your private recordsdata earlier than you do something drastic, and restore them after the reinstall; however take care to separate out any untrusted executables you may need executed up to now and by no means run them once more if you happen to do not belief them.


Please enter your comment!
Please enter your name here