System files, compilers, backup files, and code files have, by their nature, the ability to compromise the security of the computer system. Therefore, steps are sometimes necessary to protect—or protect against—such files.
For a list of potentially hazardous files, see Hazardous Files. For information about how to use the FILEDATA utility to identify potentially hazardous files, see Security Uses of the FILEDATA Utility.

