. "Such a mechanism and methodology is particularly important when open source operating systems, such as Linux, are used, since they could have been modified to do erroneous or malicious operations." . . .