ZSec File Manager
Upload
Current Directory: /home/aiessinternational.com/public_html
[Up]
..
[Open]
Hapus
Rename
.htaccess
[Edit]
Hapus
Rename
21cbfe
[Open]
Hapus
Rename
ALFA_DATA
[Open]
Hapus
Rename
advance
[Open]
Hapus
Rename
advance.zip
[Edit]
Hapus
Rename
ammika.php
[Edit]
Hapus
Rename
c8aa5
[Open]
Hapus
Rename
click.php
[Edit]
Hapus
Rename
defaults.php
[Edit]
Hapus
Rename
google41b982abb0d9ca3b.html
[Edit]
Hapus
Rename
index.php
[Edit]
Hapus
Rename
index.php0
[Edit]
Hapus
Rename
item.php
[Edit]
Hapus
Rename
license.txt
[Edit]
Hapus
Rename
mah.php
[Edit]
Hapus
Rename
networks.php
[Edit]
Hapus
Rename
options.php
[Edit]
Hapus
Rename
plugins.php
[Edit]
Hapus
Rename
product.php
[Edit]
Hapus
Rename
readme.html
[Edit]
Hapus
Rename
robots.txt
[Edit]
Hapus
Rename
saiga.php
[Edit]
Hapus
Rename
search.php
[Edit]
Hapus
Rename
web.config
[Edit]
Hapus
Rename
wp-activate.php
[Edit]
Hapus
Rename
wp-admin
[Open]
Hapus
Rename
wp-blog-header.php
[Edit]
Hapus
Rename
wp-comments-post.php
[Edit]
Hapus
Rename
wp-config-sample.php
[Edit]
Hapus
Rename
wp-config.php
[Edit]
Hapus
Rename
wp-content
[Open]
Hapus
Rename
wp-cron.php
[Edit]
Hapus
Rename
wp-includes
[Open]
Hapus
Rename
wp-links-opml.php
[Edit]
Hapus
Rename
wp-load.php
[Edit]
Hapus
Rename
wp-log1n.php
[Edit]
Hapus
Rename
wp-mail.php
[Edit]
Hapus
Rename
wp-settings.php
[Edit]
Hapus
Rename
wp-signup.php
[Edit]
Hapus
Rename
wp-trackback.php
[Edit]
Hapus
Rename
wp.php
[Edit]
Hapus
Rename
xmlrpc.php
[Edit]
Hapus
Rename
Edit File
# # /etc/security/capability.conf # # this is a sample capability file (to be used in conjunction with # the pam_cap.so module) # # In order to use this module, it must have been linked with libcap # and thus you'll know about Linux's capability support. # [If you don't know about libcap, the sources for it are here: # # http://www.kernel.org/pub/linux/libs/security/linux-privs/ # # .] # # Here are some sample lines (remove the preceding '#' if you want to # use them ## user 'morgan' gets the CAP_SETFCAP inheritable capability (commented out!) #cap_setfcap morgan ## user 'luser' inherits the CAP_DAC_OVERRIDE capability (commented out!) #cap_dac_override luser ## 'everyone else' gets no inheritable capabilities (restrictive config) none * ## if there is no '*' entry, all users not explicitly mentioned will ## get all available capabilities. This is a permissive default, and ## possibly not what you want... On first reading, you might think this ## is a security problem waiting to happen, but it defaults to not being ## so in this sample file! Further, by 'get', we mean 'get in their inheritable ## set'. That is, if you look at a random process, even one run by root, ## you will see it has no inheritable capabilities (by default): ## ## $ /sbin/capsh --decode=$(grep CapInh /proc/1/status|awk '{print $2}') ## 0000000000000000= ## ## The pam_cap module simply alters the value of this capability ## set. Including the 'none *' forces use of this module with an ## unspecified user to have their inheritable set forced to zero. ## ## Omitting the line will cause the inheritable set to be unmodified ## from what the parent process had (which is generally 0 unless the ## invoking user was bestowed with some inheritable capabilities by a ## previous invocation).
Simpan