Hello,

I retry with an old question of mine.

I have a nice script that fire and update my "antiviral protection"
(for more info check my blog quoted in the footer).
I would like to manage to perfect my byte-code scan efficacy by
pointing it to scan most of or lets say the most common paths of 
autolaunching services of my station, eg. libexec.
Despite the fact that auto-launching scripts or nice fishes can
quitely swim on different "coasts" (home, sbin) can you suggest/enlight
me with some good places to evaluate as target and I mean eg the most
desperate low and c dirty places?

Thanks a lot!  

Dan

------
bsdload.com - Repo: https://code.5mode.com

Please reply to the mailing-list, leveraging technical stuff.

Reply via email to