===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
and-1.2.2/debian/and.init.d-63-        # Obtain the uid and gid
and-1.2.2/debian/and.init.d:64:        DAEMONUID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $3}'`
and-1.2.2/debian/and.init.d:65:        DAEMONGID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $4}'`
and-1.2.2/debian/and.init.d-66-    else
##############################################
and-1.2.2/debian/and.init.d-80-    [ ! -d /proc/$pid ] &&  return 1
and-1.2.2/debian/and.init.d:81:    cmd=`cat /proc/$pid/cmdline | tr "\000" "\n"|head -n 1 |cut -d : -f 1`
and-1.2.2/debian/and.init.d-82-
##############################################
and-1.2.2/debian/and.init.d-102-    #[ ! -f "$PIDFILE" ] && return 1
and-1.2.2/debian/and.init.d:103:    #pid=`cat $PIDFILE`
and-1.2.2/debian/and.init.d-104-    #running_pid $pid $DAEMON || return 1