On 2/14/21 1:27 PM, Carlos E.R. wrote:
 will remove the eset program. I tried the fix to the eset file that
was suggested,
but it did nothing. I installed eset after not being able to get a
freebie installed.
Will see about starting over (qv)
If you do a reinstall, read this:

<https://doc.opensuse.org/documentation/leap/startup/single-html/book-opensuse-startup/index.html#sec-osuse-installquick>

Section 1.1.2.8 Local User

This paragraph pertains to you:

«If you install on a system where a previous Linux installation was
found, you may Import User Data from a Previous Installation. Click
Choose User for a list of available user accounts. Select one or more user.»


Section 3.7 Partitioning


Use "Guided Setup".

Somewhere in that screen or in the expert partitioner there is an entry
to import a previous layout. USE IT. If you don't find it, ASK.

Then make sure that "/" is selected to be formatted, and that /home is
not. That way, you keep your entire home partition untouched.

Note that once a computer has been compromised you can never trust
anything on it again.  Malware can hide in places in user data that would
survive an operating system re-install.  The disks, all of them, should be
slicked and the operating system installed from scratch.  User data should
be restored from backups after checking for malware.  If there's no backup
I'd boot the system from the rescue disk,  mount a different disk and
copy /home to that temporary disk.  Does the openSUSE rescue system
contain clamav?  If not, maybe load knoppix or something so that the
temporary disk can be scanned with clamav and rkhunter.

At any rate, the process is rather complicated and can still fail if you
accidentally restore an ods file containing a foul macro, or something. 
So you want to be really sure that you have a problem before going down
that path or all your time could be wasted.

Regards,
Lew