Translations:Binary package guide/17/en

There is a caveat with this method though: it relies on the installed files, which can be a problem in case of configuration files. Administrators often change configuration files after installing software. Because this could leak out important or perhaps even confidential data into the packages,  by default does not include configuration files that are protected through the CONFIG_PROTECT method. To include those as well, use the  or   options.