Which particular hack regularly creates a user called r and another called
re on a system?
Where can I get the scripts, and I'll figure out whats needed to make them
stop.
thanks.

Reply via email to