Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 3.129.17.245
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
snap /
core24 /
739 /
usr /
lib /
sysctl.d /
Delete
Unzip
Name
Size
Permission
Date
Action
10-apparmor.conf
708
B
-rw-r--r--
2024-07-14 22:22
50-coredump.conf
1.79
KB
-rw-r--r--
2024-08-08 14:51
50-pid-max.conf
649
B
-rw-r--r--
2024-02-27 17:26
99-protect-links.conf
372
B
-rw-r--r--
2024-09-26 08:44
Save
Rename
# AppArmor restrictions of unprivileged user namespaces # Allows to restrict the use of unprivileged user namespaces to applications # which have an AppArmor profile loaded which specifies the userns # permission. All other applications (whether confined by AppArmor or not) will # be denied the use of unprivileged user namespaces. # # See # https://gitlab.com/apparmor/apparmor/-/wikis/unprivileged_userns_restriction # # If it is desired to disable this restriction, it is preferable to create an # additional file named /etc/sysctl.d/20-apparmor.conf which will override this # current file and sets this value to 0 rather than editing this current file kernel.apparmor_restrict_unprivileged_userns = 1