Dear Tim
Short answer, forensics & chain of trust: $wonder-drug binding to
$interesting-target is published and is carried downstream, some time later it
is discovered that the binding mode is different in vivo to the published
structure and you want to be able to verify (or otherwise) all of t
>I recently created a de novo backup of some personal data on an external HFS+
>drive (photos, movies, music, etc). I was very unpleasantly surprised to find
>several files had been silently corrupted. (In the case of a movie file, for
>example, the file would play but could not be copied. In