KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /usr/share/locale/hr/LC_MESSAGES/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/locale/hr/LC_MESSAGES/setroubleshoot-plugins.mo
%PgQhE"Xh]V0
				/	
3	>	J	O	V	\	
c	
q	|		
			vfw@U_
O
FT'`-

	
    Changing the "$BOOLEAN" boolean to true will allow this access:
    "setsebool -P $BOOLEAN=1"
    
    Changing the "$BOOLEAN" boolean to true will allow this access:
    "setsebool -P $BOOLEAN=1."
    
    If the ftp daemon should be allowed to write to this directory you need to turn
    on the $BOOLEAN boolean and change the file context of
    the public directory to public_content_rw_t.  Read the ftpd_selinux
    man page for further information:
    "setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t <path>"
    
    SELinux is preventing the users from running TCP servers in the usedomain.
        
    SELinux policy is preventing the ftp daemon from writing to a public
    directory.
    
    SELinux policy is preventing the ftp daemon from writing to a public
    directory.  If ftpd is not setup to allow anonymous writes, this
    could signal a intrusion attempt.
    
    SELinux prevented the CVS application from reading the shadow password file.
    
    SELinux prevented the CVS application from reading the shadow password file.
    The CVS application requires this access when it is configured for direct
    connection (i.e., pserver) and to authenticate to the system password / shadow
    files without PAM. It is possible that this access request signals an intrusion
    attempt.

    It is recommended that CVS be configured to use PAM, authenticate to a separate
    user file, or use another protocol (e.g., ssh) instead of allowing this access.
    See the CVS manual for more details on why this access is potentially insecure
    (<a href="http://ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html">http://ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html</a>).
    AuthorizationCRONCVSDomain Name ServiceFTPFile LabelFile SystemJavaKernelMediaMemoryNetwork PortsNetworkingRSYNCSAMBAWeb ServerZebraProject-Id-Version: setroubleshoot
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2008-02-01 15:24-0500
PO-Revision-Date: 2007-03-24 00:32+0100
Last-Translator: Renato Pavicic <renato@translator-shop.org>
Language-Team: Croatian <http://translator-shop.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=3; plural=n%10==1 && n%100!=11 ? 0 :  n%10>=2 && n%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2;;

    Promjena logičke varijable "$BOOLEAN" u "istinito" dopustit će ovaj pristup:
    "setsebool -P $BOOLEAN=1"
    
    Promjena logičke varijable "$BOOLEAN" u "istinito" dopustit će ovaj pristup:
    "setsebool -P $BOOLEAN=1."
    
    Ako je demonu ftp potrebno dopustiti zapisivanje u ovu mapu, potrebno je
    uključiti logičku varijablu $BOOLEAN i promijeniti kontekst javne mape
    u 'public_content_rw_t'. Dodatne podatke potražite u man stranicama
    ftpd_selinux:
    "setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t <putanja>"
    
    SELinux spriječava korisnike u pokretanju TCP poslužitelja unutar domene korisnika.
    
    SELinux pravilo sprječava ftp demona od upisivanja u javnu mapu.
        
    SELinux pravilo sprječava ftp demona od upisivanja u javnu mapu.
    Ako ftpd nije postavljen kako bi dopustio anonimna zapisivanja,
    ovo može biti naznaka pokušaja upada u sustav.
    
    SELinux je spriječio CVS aplikaciju da čita iz datoteke lizinki u sjeni.
    
    SELinux je spriječio CVS aplikaciju da čita iz datoteke lizinki u sjeni.
    CVS aplikacija zahtjeva ovu vrstu pristupa ako je konfigurirana za izravno
    povezivanje (npr. u obliku "pserver") i provjeru autentičnosti prema datotekama
    lozinki u sjeni, bez upotrebe PAM-a. Potoji mogućnost da ovo pristupanje
    signalizira pokušaj provaljivanja.

    Preporučuje se konfiguriranje CVS-a za upotrebu PAM-a, provjera autentičnosti
    prema posebnoj korisničkoj datoteci ili upotreba drugog protokola (npr. ssh)
    umjesto dopuštanja pove vrste pristupa. Dodatne podatke o razlozima
    potencijalne nesigurnosti ovog pristupa potražite u priručniku CVS-a:
    <a href="http://ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html">http://ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html</a>.
    DopuštenjeCRONCVSUsluga naziva domenaFTPOznaka datotekeDatotečni sustavJavaKernelMediaMemorijaMrežni portoviUmrežavanjeRSYNCSAMBAWeb poslužiteljZebra

Anon7 - 2021