Which system executables (if any) were trojaned and what configuration files did they use?
Related Questions
- When a new version is installed, what does it do to the existing configuration files? Are system default files/entries created, or will existing configuration files be used by the new version?
- Can I enable/disable a system capability without modifying /etc/lids/lids.cap and reloading the configuration files?
- Are TestMaker tests composed of individual files that may be checked-into a configuration management system?