===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
speechd-up-0.5~20110719/debian/speechd-up.init-92-        # Obtain the uid and gid
speechd-up-0.5~20110719/debian/speechd-up.init:93:        DAEMONUID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $3}'`
speechd-up-0.5~20110719/debian/speechd-up.init:94:        DAEMONGID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $4}'`
speechd-up-0.5~20110719/debian/speechd-up.init-95-    else
##############################################
speechd-up-0.5~20110719/debian/speechd-up.init-109-    [ ! -d /proc/$pid ] &&  return 1
speechd-up-0.5~20110719/debian/speechd-up.init:110:    cmd=`cat /proc/$pid/cmdline | tr "\000" "\n"|head -n 1 |cut -d : -f 1`
speechd-up-0.5~20110719/debian/speechd-up.init-111-    # Is this the expected server
##############################################
speechd-up-0.5~20110719/debian/speechd-up.init-121-    [ ! -f "$PIDFILE" ] && return 1
speechd-up-0.5~20110719/debian/speechd-up.init:122:    pid=`cat $PIDFILE`
speechd-up-0.5~20110719/debian/speechd-up.init-123-    running_pid $pid $DAEMON || return 1