I did not find anything in ~ and only this in /etc. Where else should I look?
find /etc -type f | xargs grep -in skype
/etc/pki/tls/certs/ca-bundle.trust.crt:2260: Subject: C=US/postalCode=38477, ST=Florida, L=English/street=Sea Village 10, O=Google Ltd., OU=Tech Dept., OU=Hosted by GTI Group Corporation, OU=PlatinumSSL, CN=login.skype.com
/etc/pki/tls/certs/ca-bundle.trust.crt:2313: DNS:login.skype.com, DNS:www.login.skype.com
/etc/pki/tls/certs/ca-bundle.trust.crt:2333:Alias: Bogus Skype Binary file /etc/.git/index matches
/etc/dbus-1/system.d/skype.conf:8: <allow own="com.Skype.API"/>
/etc/dbus-1/system.d/skype.conf:10: <allow send_destination="com.Skype.API"/>
/etc/dbus-1/system.d/skype.conf:11: <allow receive_sender="com.Skype.API"/>
/etc/dbus-1/system.d/skype.conf:13: <allow send_path="/com/Skype"/>
/etc/.etckeeper:299:maybe chmod 0644 'dbus-1/system.d/skype.conf'
/etc/.etckeeper:1233:maybe chmod 0644 'prelink.conf.d/skype.conf'
/etc/selinux/targeted/contexts/files/file_contexts:2829:/usr/bin/skype -- system_u:object_r:execmem_exec_t:s0
/etc/selinux/targeted/modules/active/file_contexts.template:2908:/usr/bin/skype -- system_u:object_r:execmem_exec_t:s0
/etc/selinux/targeted/modules/active/file_contexts:2829:/usr/bin/skype -- system_u:object_r:execmem_exec_t:s0
/etc/prelink.conf.d/skype.conf:1:-b /usr/bin/skype
On Wed, June 17, 2015 08:35, Virilha wrote:
generic way to find where something is being called, if you known the name of that something:
enter as your user in terminal:
# su - youruser $ grep -irs skype . | less
now just need to parse the output, find where its being called (probably .X?? or .x?? or .gnome??), remove it.
--Virilha