Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
usr /
share /
polkit-1 /
actions /
[ HOME SHELL ]
Name
Size
Permission
Action
com.anydesk.anydesk.policy
730
B
-rw-r--r--
com.canonical.UbuntuAdvantage.policy
2.2
KB
-rw-r--r--
com.feralinteractive.GameMode.policy
1.36
KB
-rw-r--r--
com.hp.hplip.policy
677
B
-rw-r--r--
com.ubuntu.apport.policy
1.46
KB
-rw-r--r--
com.ubuntu.languageselector.policy
790
B
-rw-r--r--
com.ubuntu.release-upgrader.policy
23.35
KB
-rw-r--r--
com.ubuntu.softwareproperties.policy
848
B
-rw-r--r--
com.ubuntu.update-notifier.policy
13.85
KB
-rw-r--r--
com.ubuntu.usbcreator.policy
1.11
KB
-rw-r--r--
com.ubuntu.whoopsiepreferences.policy
811
B
-rw-r--r--
io.snapcraft.snapd.policy
1.99
KB
-rw-r--r--
net.hadess.PowerProfiles.policy
1.01
KB
-rw-r--r--
net.reactivated.fprint.device.policy
13.19
KB
-rw-r--r--
org.a11y.brlapi.policy
767
B
-rw-r--r--
org.debian.apt.policy
5.9
KB
-rw-r--r--
org.dpkg.pkexec.update-alternatives.policy
2.66
KB
-rw-r--r--
org.freedesktop.accounts.policy
2.13
KB
-rw-r--r--
org.freedesktop.bolt.policy
1.79
KB
-rw-r--r--
org.freedesktop.color.policy
66.25
KB
-rw-r--r--
org.freedesktop.fwupd.policy
95.17
KB
-rw-r--r--
org.freedesktop.hostname1.policy
2.98
KB
-rw-r--r--
org.freedesktop.locale1.policy
1.86
KB
-rw-r--r--
org.freedesktop.login1.policy
24.54
KB
-rw-r--r--
org.freedesktop.ModemManager1.policy
45.94
KB
-rw-r--r--
org.freedesktop.network1.policy
10
KB
-rw-r--r--
org.freedesktop.NetworkManager.policy
150.92
KB
-rw-r--r--
org.freedesktop.packagekit.policy
147.65
KB
-rw-r--r--
org.freedesktop.policykit.policy
1.49
KB
-rw-r--r--
org.freedesktop.RealtimeKit1.policy
1.74
KB
-rw-r--r--
org.freedesktop.resolve1.policy
7.56
KB
-rw-r--r--
org.freedesktop.systemd1.policy
3.71
KB
-rw-r--r--
org.freedesktop.timedate1.policy
3.03
KB
-rw-r--r--
org.freedesktop.UDisks2.policy
315.79
KB
-rw-r--r--
org.gnome.controlcenter.datetime.policy
990
B
-rw-r--r--
org.gnome.controlcenter.remote-login-helper.policy
879
B
-rw-r--r--
org.gnome.controlcenter.user-accounts.policy
1.16
KB
-rw-r--r--
org.gnome.gnome-system-monitor.policy
1.41
KB
-rw-r--r--
org.gnome.settings-daemon.plugins.power.policy
1.21
KB
-rw-r--r--
org.gnome.settings-daemon.plugins.wacom.policy
1.9
KB
-rw-r--r--
org.gtk.vfs.file-operations.policy
1.29
KB
-rw-r--r--
org.opensuse.cupspkhelper.mechanism.policy
87.95
KB
-rw-r--r--
org.x.xf86-video-intel.backlight-helper.policy
881
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : org.freedesktop.network1.policy
<?xml version="1.0" encoding="UTF-8"?> <!--*-nxml-*--> <!DOCTYPE policyconfig PUBLIC "-//freedesktop//DTD PolicyKit Policy Configuration 1.0//EN" "http://www.freedesktop.org/standards/PolicyKit/1/policyconfig.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1-or-later This file is part of systemd. systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. --> <policyconfig> <vendor>The systemd Project</vendor> <vendor_url>https://systemd.io</vendor_url> <action id="org.freedesktop.network1.set-ntp-servers"> <description gettext-domain="systemd">Set NTP servers</description> <message gettext-domain="systemd">Authentication is required to set NTP servers.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-dns-servers"> <description gettext-domain="systemd">Set DNS servers</description> <message gettext-domain="systemd">Authentication is required to set DNS servers.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-domains"> <description gettext-domain="systemd">Set domains</description> <message gettext-domain="systemd">Authentication is required to set domains.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-default-route"> <description gettext-domain="systemd">Set default route</description> <message gettext-domain="systemd">Authentication is required to set default route.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-llmnr"> <description gettext-domain="systemd">Enable/disable LLMNR</description> <message gettext-domain="systemd">Authentication is required to enable or disable LLMNR.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-mdns"> <description gettext-domain="systemd">Enable/disable multicast DNS</description> <message gettext-domain="systemd">Authentication is required to enable or disable multicast DNS.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-dns-over-tls"> <description gettext-domain="systemd">Enable/disable DNS over TLS</description> <message gettext-domain="systemd">Authentication is required to enable or disable DNS over TLS.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-dnssec"> <description gettext-domain="systemd">Enable/disable DNSSEC</description> <message gettext-domain="systemd">Authentication is required to enable or disable DNSSEC.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.set-dnssec-negative-trust-anchors"> <description gettext-domain="systemd">Set DNSSEC Negative Trust Anchors</description> <message gettext-domain="systemd">Authentication is required to set DNSSEC Negative Trust Anchors.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.revert-ntp"> <description gettext-domain="systemd">Revert NTP settings</description> <message gettext-domain="systemd">Authentication is required to reset NTP settings.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.revert-dns"> <description gettext-domain="systemd">Revert DNS settings</description> <message gettext-domain="systemd">Authentication is required to reset DNS settings.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.forcerenew"> <description gettext-domain="systemd">DHCP server sends force renew message</description> <message gettext-domain="systemd">Authentication is required to send force renew message.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.renew"> <description gettext-domain="systemd">Renew dynamic addresses</description> <message gettext-domain="systemd">Authentication is required to renew dynamic addresses.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.reload"> <description gettext-domain="systemd">Reload network settings</description> <message gettext-domain="systemd">Authentication is required to reload network settings.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> <action id="org.freedesktop.network1.reconfigure"> <description gettext-domain="systemd">Reconfigure network interface</description> <message gettext-domain="systemd">Authentication is required to reconfigure network interface.</message> <defaults> <allow_any>auth_admin</allow_any> <allow_inactive>auth_admin</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> <annotate key="org.freedesktop.policykit.owner">unix-user:systemd-network</annotate> </action> </policyconfig>
Close