I suppose that if someone managed to get into a machine, he could simply regenerate the md5 checksums after modifying "ls, ps, top and friends".
Just another question: could anyone suggest a way to automate checks with debsums? And why shoul I use debsums instead of simply running stuff like tiger or integrit? I don't get it. Wish everyone a good day. -- Kristian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

