Several programs are used to maintain the
integrity of the Authentication database,
the system area of the filesystem, and the filesystem as a whole.
When checking or fixing problems,
the rule is to work from the most basic components of the filesystem
outward. Otherwise, corrections made at the higher levels may be undone by
programs fixing the lower levels. Given this, use these programs
after a system crash or abnormality in this order: