Back | Home
الـ Path الحالي: /home/picotech/domains/instantly.picotech.app/public_html/public/uploads/.././../../../../../../etc
الملفات الموجودة في هذا الـ Path:
.
..
.etckeeper
.git
.gitignore
.pwd.lock
ImageMagick-6
NetworkManager
PackageKit
UPower
X11
acpi
adduser.conf
aliases
aliases.db
alternatives
apache2
apparmor
apparmor.d
apport
apt
awstats
bash.bashrc
bash_completion
bash_completion.d
bind
bindresvport.blacklist
binfmt.d
byobu
ca-certificates
ca-certificates.conf
ca-certificates.conf.dpkg-old
clamav
cloud
console-setup
cron.d
cron.daily
cron.hourly
cron.monthly
cron.weekly
crontab
cruft
cryptsetup-initramfs
crypttab
dbus-1
dconf
debconf.conf
debian_version
default
deluser.conf
depmod.d
dhcp
dictionaries-common
dkim-domains.txt
dkim-keytable
dkim-signingtable
dkim.key
dkimkeys
dovecot
dpkg
e2scrub.conf
emacs
environment
environment.d
etckeeper
ethertypes
fail2ban
firewalld
fonts
fstab
ftpusers
fuse.conf
fwupd
gai.conf
ghostscript
groff
group
group-
grub.d
gshadow
gshadow-
gss
gtk-3.0
hdparm.conf
host.conf
hostname
hosts
hosts.allow
hosts.deny
init.d
initramfs-tools
inputrc
insserv.conf.d
iproute2
iscsi
issue
issue.net
jailkit
kernel
ld.so.cache
ld.so.conf
ld.so.conf.d
ldap
legal
letsencrypt
libaudit.conf
libblockdev
libnl-3
libpaper.d
lighttpd
locale.alias
locale.gen
localtime
logcheck
login.defs
logrotate.conf
logrotate.d
lsb-release
lvm
lynx
machine-id
magic
magic.mime
mail
mailcap
mailcap.order
mailname
manpath.config
mdadm
milter-greylist
mime.types
mke2fs.conf
modprobe.d
modules
modules-load.d
monit
mtab
multipath
multipath.conf
mysql
nanorc
needrestart
netconfig
netplan
network
networkd-dispatcher
networks
newt
nftables.conf
nsswitch.conf
opendkim.conf
opt
os-release
overlayroot.conf
pam.conf
pam.d
papersize
passwd
passwd-
perl
php
pki
pm
polkit-1
pollinate
postfix
postgrey
ppp
procmailrc
profile
profile.d
proftpd
protocols
python3
python3.10
qemu
quotagrpadmins
quotatab
rc0.d
rc1.d
rc2.d
rc3.d
rc4.d
rc5.d
rc6.d
rcS.d
redis
resolv.conf
resolvconf
rmt
rpc
rsyslog.conf
rsyslog.d
sasldb2
screenrc
security
selinux
sensors.d
sensors3.conf
services
sgml
shadow
shadow-
shells
skel
sos
spamassassin
ssh
ssl
subgid
subuid
sudo.conf
sudo_logsrvd.conf
sudoers
sudoers.d
supervisor
sysctl.conf
sysctl.d
systemd
terminfo
thermald
timezone
tmpfiles.d
ubuntu-advantage
ucf.conf
udev
udisks2
ufw
update-manager
update-motd.d
usb_modeswitch.conf
usermin
vim
virtualmin-license
vmware-tools
vtrgb
warnquota.conf
webmin
wgetrc
xattr.conf
xdg
xml
zsh_command_not_found
مشاهدة ملف: sudo.conf
#
# Default /etc/sudo.conf file
#
# Sudo plugins:
# Plugin plugin_name plugin_path plugin_options ...
#
# The plugin_path is relative to /usr/libexec/sudo unless
# fully qualified.
# The plugin_name corresponds to a global symbol in the plugin
# that contains the plugin interface structure.
# The plugin_options are optional.
#
# The sudoers plugin is used by default if no Plugin lines are present.
#Plugin sudoers_policy sudoers.so
#Plugin sudoers_io sudoers.so
#Plugin sudoers_audit sudoers.so
#
# Sudo askpass:
# Path askpass /path/to/askpass
#
# An askpass helper program may be specified to provide a graphical
# password prompt for "sudo -A" support. Sudo does not ship with its
# own askpass program but can use the OpenSSH askpass.
#
# Use the OpenSSH askpass
#Path askpass /usr/X11R6/bin/ssh-askpass
#
# Use the Gnome OpenSSH askpass
#Path askpass /usr/libexec/openssh/gnome-ssh-askpass
#
# Sudo device search path:
# Path devsearch /dev/path1:/dev/path2:/dev
#
# A colon-separated list of paths to check when searching for a user's
# terminal device.
#
#Path devsearch /dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev
#
# Sudo command interception:
# Path intercept /path/to/sudo_intercept.so
#
# Path to a shared library containing replacements for the execv(),
# execve() and fexecve() library functions that perform a policy check
# to verify the command is allowed and simply return an error if not.
# This is used to implement the "intercept" functionality on systems that
# support LD_PRELOAD or its equivalent.
#
# The compiled-in value is usually sufficient and should only be changed
# if you rename or move the sudo_intercept.so file.
#
#Path intercept /usr/libexec/sudo/sudo_intercept.so
#
# Sudo noexec:
# Path noexec /path/to/sudo_noexec.so
#
# Path to a shared library containing replacements for the execv(),
# execve() and fexecve() library functions that just return an error.
# This is used to implement the "noexec" functionality on systems that
# support LD_PRELOAD or its equivalent.
#
# The compiled-in value is usually sufficient and should only be changed
# if you rename or move the sudo_noexec.so file.
#
#Path noexec /usr/libexec/sudo/sudo_noexec.so
#
# Sudo plugin directory:
# Path plugin_dir /path/to/plugins
#
# The default directory to use when searching for plugins that are
# specified without a fully qualified path name.
#
#Path plugin_dir /usr/libexec/sudo
#
# Sudo developer mode:
# Set developer_mode true|false
#
# Allow loading of plugins that are owned by non-root or are writable
# by "group" or "other". Should only be used during plugin development.
#Set developer_mode true
#
# Core dumps:
# Set disable_coredump true|false
#
# By default, sudo disables core dumps while it is executing (they
# are re-enabled for the command that is run).
# To aid in debugging sudo problems, you may wish to enable core
# dumps by setting "disable_coredump" to false.
#
#Set disable_coredump false
#
# User groups:
# Set group_source static|dynamic|adaptive
#
# Sudo passes the user's group list to the policy plugin.
# If the user is a member of the maximum number of groups (usually 16),
# sudo will query the group database directly to be sure to include
# the full list of groups.
#
# On some systems, this can be expensive so the behavior is configurable.
# The "group_source" setting has three possible values:
# static - use the user's list of groups returned by the kernel.
# dynamic - query the group database to find the list of groups.
# adaptive - if user is in less than the maximum number of groups.
# use the kernel list, else query the group database.
#
#Set group_source static
#
# Sudo interface probing:
# Set probe_interfaces true|false
#
# By default, sudo will probe the system's network interfaces and
# pass the IP address of each enabled interface to the policy plugin.
# On systems with a large number of virtual interfaces this may take
# a noticeable amount of time.
#
#Set probe_interfaces false
#
# Sudo debug files:
# Debug program /path/to/debug_log subsystem@priority[,subsyste@priority]
#
# Sudo and related programs support logging debug information to a file.
# The program is typically sudo, sudoers.so, sudoreplay, or visudo.
#
# Subsystems vary based on the program; "all" matches all subsystems.
# Priority may be crit, err, warn, notice, diag, info, trace, or debug.
# Multiple subsystem@priority may be specified, separated by a comma.
#
#Debug sudo /var/log/sudo_debug all@debug
#Debug sudoers.so /var/log/sudoers_debug all@debug