Hello,
I retry with an old question of mine. I have a nice script that fire and update my "antiviral protection" (for more info check my blog quoted in the footer). I would like to manage to perfect my byte-code scan efficacy by pointing it to scan most of or lets say the most common paths of autolaunching services of my station, eg. libexec. Despite the fact that auto-launching scripts or nice fishes can quitely swim on different "coasts" (home, sbin) can you suggest/enlight me with some good places to evaluate as target and I mean eg the most desperate low and c dirty places? Thanks a lot! Dan ------ bsdload.com - Repo: https://code.5mode.com Please reply to the mailing-list, leveraging technical stuff.