Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els11.x86_64 #1 SMP Sun Nov 3 09:06:59 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.135.205.231
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pam-1.1.8 /
txts /
[ HOME SHELL ]
Name
Size
Permission
Action
README.pam_access
4.84
KB
-rw-r--r--
README.pam_chroot
1.47
KB
-rw-r--r--
README.pam_console
1.88
KB
-rw-r--r--
README.pam_cracklib
9.53
KB
-rw-r--r--
README.pam_debug
1.95
KB
-rw-r--r--
README.pam_deny
1.01
KB
-rw-r--r--
README.pam_echo
1.07
KB
-rw-r--r--
README.pam_env
3.07
KB
-rw-r--r--
README.pam_exec
2.21
KB
-rw-r--r--
README.pam_faildelay
827
B
-rw-r--r--
README.pam_faillock
7.94
KB
-rw-r--r--
README.pam_filter
3.03
KB
-rw-r--r--
README.pam_ftp
1.66
KB
-rw-r--r--
README.pam_group
2.09
KB
-rw-r--r--
README.pam_issue
1.32
KB
-rw-r--r--
README.pam_keyinit
2.19
KB
-rw-r--r--
README.pam_lastlog
2.21
KB
-rw-r--r--
README.pam_limits
2.36
KB
-rw-r--r--
README.pam_listfile
3.54
KB
-rw-r--r--
README.pam_localuser
1.14
KB
-rw-r--r--
README.pam_loginuid
986
B
-rw-r--r--
README.pam_mail
1.96
KB
-rw-r--r--
README.pam_mkhomedir
1.33
KB
-rw-r--r--
README.pam_motd
755
B
-rw-r--r--
README.pam_namespace
10.75
KB
-rw-r--r--
README.pam_nologin
1.32
KB
-rw-r--r--
README.pam_permit
907
B
-rw-r--r--
README.pam_postgresok
346
B
-rw-r--r--
README.pam_pwhistory
1.89
KB
-rw-r--r--
README.pam_rhosts
1.84
KB
-rw-r--r--
README.pam_rootok
1.06
KB
-rw-r--r--
README.pam_securetty
1.31
KB
-rw-r--r--
README.pam_selinux
2.84
KB
-rw-r--r--
README.pam_sepermit
1.61
KB
-rw-r--r--
README.pam_shells
652
B
-rw-r--r--
README.pam_stress
2.01
KB
-rw-r--r--
README.pam_succeed_if
2.8
KB
-rw-r--r--
README.pam_tally
4.67
KB
-rw-r--r--
README.pam_tally2
5.52
KB
-rw-r--r--
README.pam_time
1.27
KB
-rw-r--r--
README.pam_timestamp
1.48
KB
-rw-r--r--
README.pam_tty_audit
2.71
KB
-rw-r--r--
README.pam_umask
1.59
KB
-rw-r--r--
README.pam_unix
6.91
KB
-rw-r--r--
README.pam_userdb
2.81
KB
-rw-r--r--
README.pam_warn
1.2
KB
-rw-r--r--
README.pam_wheel
1.92
KB
-rw-r--r--
README.pam_xauth
3.61
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.pam_env
pam_env -- PAM module to set/unset environment variables -------------------------------------------------------------------------- DESCRIPTION The pam_env PAM module allows the (un)setting of environment variables. Supported is the use of previously set environment variables as well as PAM_ITEMs such as PAM_RHOST. By default rules for (un)setting of variables is taken from the config file /etc/security/pam_env.conf if no other file is specified. This module can also parse a file with simple KEY=VAL pairs on separate lines (/etc/environment by default). You can change the default file to parse, with the envfile flag and turn it on or off by setting the readenv flag to 1 or 0 respectively. Since setting of PAM environment variables can have side effects to other modules, this module should be the last one on the stack. OPTIONS conffile=/path/to/pam_env.conf Indicate an alternative pam_env.conf style configuration file to override the default. This can be useful when different services need different environments. debug A lot of debug information is printed with syslog(3). envfile=/path/to/environment Indicate an alternative environment file to override the default. This can be useful when different services need different environments. readenv=0|1 Turns on or off the reading of the file specified by envfile (0 is off, 1 is on). By default this option is on. user_envfile=filename Indicate an alternative .pam_environment file to override the default. This can be useful when different services need different environments. The filename is relative to the user home directory. user_readenv=0|1 Turns on or off the reading of the user specific environment file. 0 is off, 1 is on. By default this option is off as user supplied environment variables in the PAM environment could affect behavior of subsequent modules in the stack without the consent of the system administrator. EXAMPLES These are some example lines which might be specified in /etc/security/pam_env.conf. Set the REMOTEHOST variable for any hosts that are remote, default to "localhost" rather than not being set at all REMOTEHOST DEFAULT=localhost OVERRIDE=@{PAM_RHOST} Set the DISPLAY variable if it seems reasonable DISPLAY DEFAULT=${REMOTEHOST}:0.0 OVERRIDE=${DISPLAY} Now some simple variables PAGER DEFAULT=less MANPAGER DEFAULT=less LESS DEFAULT="M q e h15 z23 b80" NNTPSERVER DEFAULT=localhost PATH DEFAULT=${HOME}/bin:/usr/local/bin:/bin\ :/usr/bin:/usr/local/bin/X11:/usr/bin/X11 Silly examples of escaped variables, just to show how they work. DOLLAR DEFAULT=\$ DOLLARDOLLAR DEFAULT= OVERRIDE=\$${DOLLAR} DOLLARPLUS DEFAULT=\${REMOTEHOST}${REMOTEHOST} ATSIGN DEFAULT="" OVERRIDE=\@
Close