Introduction - If you have any usage issues, please Google them yourself
This program is modified on the basis of others, the original link has been lost ..... Linux itself is very weak security mechanisms, the weakest Linux Linux configuration, you can modify the configuration items too, that the administrator can not control the overall situation, modify freely a configuration, it may cause all the safety measures in the system useless. The program verification system in most of the settings, and generates a specific format of the report