404

[ Avaa Bypassed ]




Upload:

Command:

botdev@18.226.248.100: ~ $
# Defaults for tor initscript
# sourced by /etc/init.d/tor
# installed at /etc/default/tor by the maintainer scripts
#
# Note that this file is not being used for controlling Tor-startup
# when Tor is launched by systemd.
#

#
# This is a bash shell fragment
#
RUN_DAEMON="yes"

#
# Servers sometimes may need more than the default 1024 file descriptors
# if they are very busy and have many clients connected to them.  The top
# servers as of early 2008 regularly have more than 10000 connected
# clients.
#  (ulimit -n)
#
# (the default varies as it depends on the number of available system-wide file
#  descriptors.  See the init script in /etc/init.d/tor for details.)
#
# MAX_FILEDESCRIPTORS=

#
# If tor is seriously hogging your CPU, taking away too much cycles from
# other system resources, then you can renice tor.  See nice(1) for a
# bit more information.  Another way to limit the CPU usage of an Onion
# Router is to set a lower BandwidthRate, as CPU usage is mostly a function
# of the amount of traffic flowing through your node.  Consult the torrc(5)
# manual page for more information on setting BandwidthRate.
#
# NICE="--nicelevel 5"

# Additional arguments to pass on tor's command line.
#
# ARGS="$ARGS "

#
# Uncomment the ulimit call below, and set "DisableDebuggerAttachment 0"
# in /etc/tor/torrc, if you want tor to produce coredumps on segfaults
# and assert errors.
#
# Keeping coredumps around is some sort of security issue since they
# may leak session keys, sensitive client data and more, should such
# files fall into the wrong hands.  Therefore coredumps are not enabled
# by default.
#
# ulimit -c unlimited

#
# Config option for the weekly cron file: Whether or not to remove old
# coredumps in /var/lib/tor.  Coredumps can hold sensitive data, as such
# they probably should not be kept lying around if nobody will ever look
# at them.  This option makes /etc/cron.weekly/tor clean out files older
# then three weeks.
#
CLEANUP_OLD_COREFILES=y

#
# By default the tor init script will launch Tor using apparmor iff
# /usr/sbin/aa-status exists and is executable and calling it with --enabled
# returns true, /usr/sbin/aa-exec is executable, there is a
# /etc/apparmor.d/system_tor policy, and USE_AA_EXEC is set to 'yes'.
#
# USE_AA_EXEC="yes"  # default
# USE_AA_EXEC="no"

# Let the vidalia package override some of our settings.
# People who have vidalia installed might not want to run Tor as a system
# service. The vidalia .deb can ask them that and then set run-daemon to no.
if [ -e /etc/default/tor.vidalia ] && [ -x /usr/bin/vidalia ]; then
	. /etc/default/tor.vidalia
fi

Filemanager

Name Type Size Permission Actions
grub.d Folder 0755
kdm.d Folder 0755
acpid File 346 B 0644
apache-htcacheclean File 556 B 0644
apport File 149 B 0644
bridge-utils File 125 B 0644
bsdmainutils File 222 B 0644
console-setup File 284 B 0644
crda File 549 B 0644
cron File 150 B 0644
cryptdisks File 652 B 0644
dbus File 297 B 0644
docker File 654 B 0644
ebtables File 1.2 KB 0644
grafana-agent File 459 B 0644
grub File 1.19 KB 0644
hddtemp File 1.2 KB 0644
irqbalance File 931 B 0644
keyboard File 150 B 0644
locale File 13 B 0644
mdadm File 718 B 0644
motd-news File 682 B 0644
netfilter-persistent File 291 B 0644
networkd-dispatcher File 152 B 0644
nss File 1.71 KB 0644
open-iscsi File 2.63 KB 0644
openvpn File 1.16 KB 0644
pollinate File 363 B 0644
rsync File 2.01 KB 0644
rsyslog File 124 B 0644
ssh File 133 B 0644
tor File 2.56 KB 0644
ubuntu-fan File 1.38 KB 0644
ufw File 1.75 KB 0644
useradd File 1.09 KB 0644