Re: Other Problems
Wait... really? Is that attempt at seeing changes to files for convenience, or for security?
As the OP mentioned, if someone has write access, is the sha-1 for confirmation of miscreants attacking, or just to track *known good changes*?
Is there a different layer for security (IP access/logins/etc)?