Cylul007 Webshell
Server :
Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
php :
8.0.30
on
cgi-fcgi
Time
25 Nov 2024 15:25:24
Current Directory :
/
etc
/
Upload File :
Mass Deface
Home
Bypass Passwd
Current File : //etc/elinks.conf
## ELinks 0.12pre3 configuration file ## This is ELinks global configuration file. You can keep global ELinks ## configuration here. Each user can also save its own ELinks configuration ## to ~/.elinks/elinks.conf. The per user configuration file can be edited ## by ELinks when you save options through UI. ## connection # Connection options. ## connection.ssl # SSL options. ## connection.ssl.cert_verify [0|1] # Verify the peer's SSL certificate. set connection.ssl.cert_verify = 1 ## connection.ssl.trusted_ca_file <str> # The location of a file containing certificates of trusted certification # authorities in PEM format. ELinks then trusts certificates issued by # these CAs. # # If you set this option to an empty string, default NSS root certificates # are loaded. # # If you change this option or the file, you must restart ELinks for the # changes to take effect. This option affects GnuTLS and nss_compat_ossl # but not OpenSSL. set connection.ssl.trusted_ca_file = "/etc/pki/tls/certs/ca-bundle.crt"
./LuLlaby007 ♥ Tata Cantik - Copyright 2k18