suppose these actions are being performed. checking critical files for the appropriate file protection and permissions checking for changes to the /etc/hosts.equiv file checking for changes in user startup files checking for hidden or unowned files and directories