
On 2/14/21 1:27 PM, Carlos E.R. wrote:
will remove the eset program. I tried the fix to the eset file that was suggested, but it did nothing. I installed eset after not being able to get a freebie installed. Will see about starting over (qv) If you do a reinstall, read this:
Section 1.1.2.8 Local User
This paragraph pertains to you:
«If you install on a system where a previous Linux installation was found, you may Import User Data from a Previous Installation. Click Choose User for a list of available user accounts. Select one or more user.»
Section 3.7 Partitioning
Use "Guided Setup".
Somewhere in that screen or in the expert partitioner there is an entry to import a previous layout. USE IT. If you don't find it, ASK.
Then make sure that "/" is selected to be formatted, and that /home is not. That way, you keep your entire home partition untouched.
Note that once a computer has been compromised you can never trust anything on it again. Malware can hide in places in user data that would survive an operating system re-install. The disks, all of them, should be slicked and the operating system installed from scratch. User data should be restored from backups after checking for malware. If there's no backup I'd boot the system from the rescue disk, mount a different disk and copy /home to that temporary disk. Does the openSUSE rescue system contain clamav? If not, maybe load knoppix or something so that the temporary disk can be scanned with clamav and rkhunter. At any rate, the process is rather complicated and can still fail if you accidentally restore an ods file containing a foul macro, or something. So you want to be really sure that you have a problem before going down that path or all your time could be wasted. Regards, Lew