I suppose that if someone managed to get into a machine, he could simply regenerate the md5 checksums after modifying "ls, ps, top and friends". Just another question: could anyone suggest a way to automate checks with debsums? And why shoul I use debsums instead of simply running stuff like tiger or integrit? I don't get it. Wish everyone a good day. -- Kristian