Благодарю

Медиа Шаман: литературный дневник

...язык йет пэо мозгА; ИМХО Лингвистика Грэйт Эген Ребят спасибо что почитываете иногда... Знаю необходимо лучше... стиха 3 есть которые нравятся мне*)... А так отрывочки пособирать с куч... на которых возмодны иногда и розы...
`````
А в 104(ИЛИ 105 тоЙ) ЧЁ СВЕРЛИЛИ ТО ВЧЕРА СБЕЦ ОБОРУД А? МИСТЕР ВАЙФАЙ;о) ЗОВИ ПАПКУ ТОГДА !



Из Дал Дэ Цзин(57} Страна Управляется Справедливостью... ..


``` TECH ABOUT ЧТО ЕЩЁ К ПСЕВДО ИНТЕРНЕТУ не дошли ИЛИ УЖДАВНО "КОННЕКТИМ НА СЛАВУ НА СЛАВУ ВАМ ; ПАРАМ ПАМ ПАМ ... ПОЧЕТЧАТКА ТО ЕСТЬ ЕЩЁЬ(( в дипстэйте как водится))



;о) vfl.ru/fotos/9b9eea0e30976041.html


vfl.ru/fotos/ab538ea630976040.html
vfl.ru/fotos/9b9eea0e30976041.html
vfl.ru/fotos/350866dd30976042.html




...язык йет пэо мозгА; ИМХО Лингвистика Грэйт Эген



ПРО РУТ КИТЫ чуток ``~938 по Москве : myteam111@michelange618:~$ sudo rkhunter -c
^
^[[A^[[A
Checking system commands...


^[[A Performing 'strings' command checks
^


Performing 'shared libraries' checks
Checking for preloading variables
Checking for preloaded libraries
Checking LD_LIBRARY_PATH variable


Performing file properties checks
Checking for prerequisites
^
^
/usr/sbin/cron
/usr/sbin/groupadd
/usr/sbin/groupdel
/usr/sbin/groupmod
/usr/sbin/grpck
/usr/sbin/nologin
/usr/sbin/pwck
/usr/sbin/rsyslogd
/usr/sbin/sshd
/usr/sbin/tcpd
/usr/sbin/useradd
/usr/sbin/userdel
/usr/sbin/usermod
/usr/sbin/vipw
/usr/sbin/unhide
/usr/sbin/unhide-linux
/usr/sbin/unhide-posix
/usr/sbin/unhide-tcp
/usr/bin/awk
/usr/bin/basename
/usr/bin/chattr
/usr/bin/cut
/usr/bin/diff
/usr/bin/dirname
/usr/bin/dpkg
/usr/bin/dpkg-query
/usr/bin/du
/usr/bin/env
/usr/bin/file
/usr/bin/find
/usr/bin/GET
/usr/bin/groups
/usr/bin/head
/usr/bin/id
/usr/bin/ipcs
/usr/bin/killall
/usr/bin/last
/usr/bin/lastlog
/usr/bin/ldd
/usr/bin/less
/usr/bin/locate
/usr/bin/logger
/usr/bin/lsattr
/usr/bin/lsof
/usr/bin/mail
/usr/bin/md5sum
/usr/bin/mlocate
/usr/bin/newgrp
/usr/bin/passwd
/usr/bin/perl
/usr/bin/pgrep
/usr/bin/pkill
/usr/bin/pstree
/usr/bin/rkhunter
/usr/bin/rpm
/usr/bin/runcon
/usr/bin/sha1sum
/usr/bin/sha224sum
/usr/bin/sha256sum
/usr/bin/sha384sum
/usr/bin/sha512sum
/usr/bin/size
/usr/bin/sort
/usr/bin/ssh
/usr/bin/stat
/usr/bin/strings
/usr/bin/sudo
/usr/bin/tail
/usr/bin/telnet
/usr/bin/test
/usr/bin/top
/usr/bin/touch
/usr/bin/tr
/usr/bin/uniq
/usr/bin/users
/usr/bin/vmstat
/usr/bin/w
/usr/bin/watch
/usr/bin/wc
/usr/bin/wget
/usr/bin/whatis
/usr/bin/whereis
/usr/bin/which
/usr/bin/who
/usr/bin/whoami
/usr/bin/numfmt
/usr/bin/gawk
/usr/bin/lwp-request
/usr/bin/bsd-mailx
/usr/bin/x86_64-linux-gnu-size
/usr/bin/x86_64-linux-gnu-strings
/usr/bin/telnet.netkit
/usr/bin/w.procps
/sbin/depmod
/sbin/fsck
/sbin/ifconfig
/sbin/ifdown
/sbin/ifup
/sbin/init
/sbin/insmod
/sbin/ip
/sbin/lsmod
/sbin/modinfo
/sbin/modprobe
/sbin/rmmod
/sbin/route
/sbin/runlevel
/sbin/sulogin
/sbin/sysctl
/bin/bash
/bin/cat
/bin/chmod
/bin/chown
/bin/cp
/bin/date
/bin/df
/bin/dmesg
/bin/echo
/bin/egrep
/bin/fgrep
/bin/fuser
/bin/grep
/bin/ip



/bin/less
/bin/login
/bin/ls
/bin/lsmod
/bin/mktemp
/bin/more
/bin/mount
/bin/mv
/bin/netstat
/bin/ping
/bin/ps
/bin/pwd
/bin/readlink
/bin/sed
/bin/sh
/bin/su
/bin/touch
/bin/uname
/bin/which
/bin/kmod
/bin/systemd
/bin/systemctl
/bin/dash
/lib/systemd/systemd




11111111111111111111111111111111111111111



????????????????????????????????????


Performing file properties checks
Checking for prerequisites
/usr/sbin/adduser
/usr/sbin/chroot
/usr/sbin/cron
/usr/sbin/groupadd
/usr/sbin/groupdel
/usr/sbin/groupmod
/usr/sbin/grpck
/usr/sbin/nologin
/usr/sbin/pwck
/usr/sbin/rsyslogd
/usr/sbin/sshd
/usr/sbin/tcpd
/usr/sbin/useradd
/usr/sbin/userdel
/usr/sbin/usermod
/usr/sbin/vipw
/usr/sbin/unhide
/usr/sbin/unhide-linux
/usr/sbin/unhide-posix
/usr/sbin/unhide-tcp
/usr/bin/awk
/usr/bin/basename
/usr/bin/chattr
/usr/bin/cut
/usr/bin/diff
/usr/bin/dirname
/usr/bin/dpkg
/usr/bin/dpkg-query
/usr/bin/du
/usr/bin/env
/usr/bin/file
/usr/bin/find
/usr/bin/GET
/usr/bin/groups
/usr/bin/head
/usr/bin/id
/usr/bin/ipcs
/usr/bin
/usr/bin/last
/usr/bin/lastlog
/usr/bin/ldd
/usr/bin/less
/usr/bin/locate
/usr/bin/logger
/usr/bin/lsattr
/usr/bin/lsof
/usr/bin/mail
/usr/bin/md5sum
/usr/bin/mlocate
/usr/bin/newgrp
/usr/bin/passwd
/usr/bin/perl
/usr/bin/pgrep
/usr/bin
/usr/bin/pstree
/usr/bin/rkhunter
/usr/bin/rpm
/usr/bin/runcon
/usr/bin/sha1sum
/usr/bin/sha224sum
/usr/bin/sha256sum
/usr/bin/sha384sum
/usr/bin/sha512sum
/usr/bin/size
/usr/bin/sort
/usr/bin/ssh
/usr/bin/stat
/usr/bin/strings
/usr/bin/sudo
/usr/bin/tail
/usr/bin/telnet
/usr/bin/test
/usr/bin/top
/usr/bin/touch
/usr/bin/tr
/usr/bin/uniq
/usr/bin/users
/usr/bin/vmstat
/usr/bin/w
/usr/bin/watch
/usr/bin/wc
/usr/bin/wget
/usr/bin/whatis
/usr/bin/whereis
/usr/bin/which
/usr/bin/who
/usr/bin/whoami
/usr/bin/numfmt
/usr/bin/gawk
/usr/bin/lwp-request
/usr/bin/bsd-mailx
/usr/bin/x86_64-linux-gnu-size
/usr/bin/x86_64-linux-gnu-strings
/usr/bin/telnet.netkit
/usr/bin/w.procps
/sbin/depmod
/sbin/fsck
/sbin/ifconfig
/sbin/ifdown
/sbin/ifup
/sbin/init
/sbin/insmod
/sbin/ip
/sbin/lsmod
/sbin/modinfo
/sbin/modprobe
/sbin/rmmod
/sbin/route
/sbin/runlevel
/sbin/sulogin
/sbin/sysctl
/bin/bash
/bin/cat
/bin/chmod
/bin/chown
/bin/cp
/bin/date
/bin/df
/bin/dmesg
/bin/echo
/bin/egrep
/bin/fgrep
/bin/fuser
/bin/grep
/bin/ip
/bin
/bin/less
/bin/login
/bin/ls
/bin/lsmod
/bin/mktemp
/bin/more
/bin/mount
/bin/mv
/bin/netstat
/bin/ping
/bin/ps
/bin/pwd
/bin/readlink
/bin/sed
/bin/sh
/bin/su
/bin/touch
/bin/uname
/bin/which
/bin/kmod
/bin/systemd
/bin/systemctl
/bin/dash
/lib/systemd/systemd



Checking for rootkits...


Performing check of known rootkit files and directories
55808 Trojan - Variant A
ADM Worm
AjaKit Rootkit
Adore Rootkit
aPa Kit
Apache Worm
Ambient (ark) Rootkit
Balaur Rootkit
BeastKit Rootkit
beX2 Rootkit
BOBKit Rootkit
cb Rootkit
CiNIK Worm (Slapper.B variant)
Danny-Boy's Abuse Kit
Devil RootKit
Diamorphine LKM
Dica-Kit Rootkit
Dreams Rootkit
Duarawkz Rootkit
Ebury backdoor
Enye LKM
Flea Linux Rootkit
Fu Rootkit
Fuck`it Rootkit
GasKit Rootkit
Heroin LKM
HjC Kit
ignoKit Rootkit
IntoXonia-NG Rootkit
Irix Rootkit
Jynx Rootkit
Jynx2 Rootkit
KBeast Rootkit
Kitko Rootkit
Knark Rootkit
ld-linuxv.so Rootkit
Li0n Worm
Lockit / LJK2 Rootkit
Mokes backdoor
Mood-NT Rootkit
MRK Rootkit
Ni0 Rootkit
Ohhara Rootkit
Optic Kit (Tux) Worm
Oz Rootkit
Phalanx Rootkit
Phalanx2 Rootkit
Phalanx2 Rootkit (extended tests)
Portacelo Rootkit
R3dstorm Toolkit
RH-Sharpe's Rootkit
RSHA's Rootkit
Scalper Worm
Sebek LKM
Shutdown Rootkit
SHV4 Rootkit
SHV5 Rootkit
Sin Rootkit
Slapper Worm
Sneakin Rootkit
'Spanish' Rootkit
Suckit Rootkit
Superkit Rootkit
TBD (Telnet BackDoor)
TeLeKiT Rootkit
T0rn Rootkit
trNkit Rootkit
Trojanit Kit
Tuxtendo Rootkit
URK Rootkit
Vampire Rootkit
VcKit Rootkit
Volc Rootkit
Xzibit Rootkit
zaRwT.KiT Rootkit
ZK Rootkit



Performing additional rootkit checks
Suckit Rootkit additional checks
Checking for possible rootkit files and directories
Checking for possible rootkit strings


Performing malware checks
Checking running processes for suspicious files
Checking for login backdoors
Checking for sniffer log files
Checking for suspicious directories
Checking for suspicious (large) shared memory segments


Performing Linux specific checks
Checking loaded kernel modules
Checking kernel module names



Checking the network...


Performing checks on the network ports
Checking for backdoor ports


Performing checks on the network interfaces
Checking for promiscuous interfaces


Checking the local host...


Performing system boot checks
Checking for local host name
Checking for system startup files
Checking system startup files for malware


Performing group and account checks
Checking for passwd file
Checking for root equivalent (UID 0) accounts
Checking for passwordless accounts
Checking for passwd file changes
Checking for group file changes
Checking root account shell history files


Performing system configuration file checks
Checking for an SSH configuration file
Checking if SSH root access is allowed
Checking if SSH protocol v1 is allowed
Checking for other suspicious configuration settings
Checking for a running system logging daemon
Checking for a system logging configuration file
Checking if syslog remote logging is allowed


Performing filesystem checks
Checking /dev for suspicious file types
Checking for hidden files and directories




System checks summary



File properties checks...
Files checked: 149
Suspect files: 3


Rootkit checks...
Rootkits checked : 500
Possible rootkits: 13


Applications checks...
All checks skipped


The system checks took: 2 minutes and 11 seconds


All results have been written to the log file: /var/log/rkhunter.log


One or more warnings have been found while checking the system.
Please check the log file (/var/log/rkhunter.log)


myteam111@michelange618:~$ fdisk -1
bash: fdisk: команда не найдена
myteam111@michelange618:~$ Ssudo
bash: Ssudo: команда не найдена
myteam111@michelange618:~$ sud


А ТЫ ГРИШЬ;)
?????????????????????????????????????????????????????????
А СПРАВА В НИЖНЕМ ЧТО ЗА СЕКРЕТЫ И ОТ КОГО ДЛЯ ЧЕГО ????????????



Другие статьи в литературном дневнике: