Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
apparmor.d /
abstractions /
ubuntu-browsers.d /
Delete
Unzip
Name
Size
Permission
Date
Action
chromium-browser
1018
B
-rw-r--r--
2023-02-14 11:49
java
3.8
KB
-rw-r--r--
2023-02-14 11:49
kde
265
B
-rw-r--r--
2023-02-14 11:49
mailto
339
B
-rw-r--r--
2023-02-14 11:49
multimedia
1.38
KB
-rw-r--r--
2023-02-14 11:49
plugins-common
351
B
-rw-r--r--
2023-02-14 11:49
productivity
894
B
-rw-r--r--
2023-02-14 11:49
text-editors
672
B
-rw-r--r--
2023-02-14 11:49
ubuntu-integration
1.11
KB
-rw-r--r--
2023-02-14 11:49
ubuntu-integration-xul
185
B
-rw-r--r--
2023-02-14 11:49
user-files
935
B
-rw-r--r--
2023-02-14 11:49
Save
Rename
# vim:syntax=apparmor abi <abi/3.0>, # Allow read to all files user has DAC access to and write access to all # files owned by the user in $HOME. @{HOME}/ r, @{HOME}/** r, owner @{HOME}/** w, # Do not allow read and/or write to particularly sensitive/problematic files include <abstractions/private-files> audit deny @{HOME}/.ssh/{,**} mrwkl, audit deny @{HOME}/.gnome2_private/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w, audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl, audit deny @{HOME}/.local/share/kwalletd/{,**} mrwkl, # Comment this out if using gpg plugin/addons audit deny @{HOME}/.gnupg/{,**} mrwkl, # Allow read to all files user has DAC access to and write for files the user # owns on removable media and filesystems. /media/** r, /mnt/** r, /srv/** r, /net/** r, owner /media/** w, owner /mnt/** w, owner /srv/** w, owner /net/** w,