#17 This sets up the problem we’ll use to demonstrate various control and data structures of scripts.
This is a common security need, and various commercial tools such as tripwire and tiger do this. They are not scripts, but they work very much like what is here.
You might mention that, in practice, one would put the files we will create in places other than where this exercise puts them. Normally the files would go in a protected area, but here I opt for simplicity.