. This program is run whether or not the user desires it, because
> it runs before the user us granted a log-on screen.
Given what you are running, it is a good practice.
> In my reading of Unix
> and BSD literature, I have found no mention of virus scan programs for
> these oper
her or not the user desires it, because it runs before the user
> us granted a log-on screen. In my reading of Unix and BSD
> literature, I have found no mention of virus scan programs for
> these operating systems. Do such programs not exist? Alternately,
> is the Unix/BSD
es it, because
> it runs before the user us granted a log-on screen. In my reading of Unix
> and BSD literature, I have found no mention of virus scan programs for
> these operating systems. Do such programs not exist? Alternately, is the
> Unix/BSD approach to this problem
whether or not the user desires it, because
> it runs before the user us granted a log-on screen. In my reading of Unix
> and BSD literature, I have found no mention of virus scan programs for
> these operating systems. Do such programs not exist? Alternately, is the
> Unix/BSD app
> If so, could you describe the Unix/BSD approach to
> locating and eradicating these invaders of one's hard drive? If
the issue
> is already explained in either printed literature, or posted at a
world
> wide web site, it is sufficient to cite the location. Many thanks
for your
> response.
>
Th
user desires it, because
> it runs before the user us granted a log-on screen. In my reading of Unix
> and BSD literature, I have found no mention of virus scan programs for
> these operating systems. Do such programs not exist? Alternately, is the
> Unix/BSD approach to this problem
Unix
and BSD literature, I have found no mention of virus scan programs for
these operating systems. Do such programs not exist? Alternately, is the
Unix/BSD approach to this problem in a different philosophical and/or
procedural sphere? If so, could you describe the Unix/BSD approach to
locating