Which particular hack regularly creates a user called r and another called re on a system? Where can I get the scripts, and I'll figure out whats needed to make them stop. thanks.