Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
sudo /
examples /
Delete
Unzip
Name
Size
Permission
Date
Action
cvtsudoers.conf
3.49
KB
-rw-r--r--
2023-06-27 11:45
pam.conf
1.15
KB
-rw-r--r--
2023-06-27 11:45
sudo.conf
4.24
KB
-rw-r--r--
2023-06-27 11:45
sudo_logsrvd.conf
9.57
KB
-rw-r--r--
2023-06-27 11:45
sudoers
4.08
KB
-rw-r--r--
2023-06-27 11:45
sudoers.dist
3.24
KB
-rw-r--r--
2023-06-27 11:45
syslog.conf
1.05
KB
-rw-r--r--
2023-06-27 11:45
Save
Rename
# This is a sample syslog.conf fragment for use with Sudo. # # By default, sudo logs to "authpriv" if your system supports it, else it # uses "auth". The facility can be set via the --with-logfac configure # option or in the sudoers file. # To see what syslog facility a sudo binary uses, run `sudo -V' as *root*. # # NOTES: # The whitespace in the following line is made up of <TAB> # characters, *not* spaces. You cannot just cut and paste! # # If you edit syslog.conf you need to send syslogd a HUP signal. # Ie: kill -HUP process_id # # Syslogd will not create new log files for you, you must first # create the file before syslogd will log to it. Eg. # 'touch /var/log/sudo' # This logs successful and failed sudo attempts to the file /var/log/auth # If your system has the authpriv syslog facility, use authpriv.debug auth.debug /var/log/auth # To log to a remote machine, use something like the following, # where "loghost" is the name of the remote machine. # If your system has the authpriv syslog facility, use authpriv.debug auth.debug @loghost