Linux server1.hosting4iran.com 4.18.0-553.89.1.el8_10.x86_64 #1 SMP Mon Dec 8 03:53:08 EST 2025 x86_64
LiteSpeed
Server IP : 185.208.174.156 & Your IP : 216.73.216.218
Domains : 282 Domain
User : satitravel
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
pam /
txts /
Delete
Unzip
Name
Size
Permission
Date
Action
README.pam_access
5.13
KB
-rw-r--r--
2025-12-17 18:53
README.pam_chroot
1.47
KB
-rw-r--r--
2025-12-17 18:53
README.pam_console
1.88
KB
-rw-r--r--
2025-12-17 18:53
README.pam_cracklib
9.53
KB
-rw-r--r--
2025-12-17 18:53
README.pam_debug
1.95
KB
-rw-r--r--
2025-12-17 18:53
README.pam_deny
1.01
KB
-rw-r--r--
2025-12-17 18:53
README.pam_echo
1.07
KB
-rw-r--r--
2025-12-17 18:53
README.pam_env
3.54
KB
-rw-r--r--
2025-12-17 18:53
README.pam_exec
2.18
KB
-rw-r--r--
2025-12-17 18:53
README.pam_faildelay
827
B
-rw-r--r--
2025-12-17 18:53
README.pam_faillock
5.92
KB
-rw-r--r--
2025-12-17 18:53
README.pam_filter
3.03
KB
-rw-r--r--
2025-12-17 18:53
README.pam_ftp
1.66
KB
-rw-r--r--
2025-12-17 18:53
README.pam_group
2.12
KB
-rw-r--r--
2025-12-17 18:53
README.pam_issue
1.32
KB
-rw-r--r--
2025-12-17 18:53
README.pam_keyinit
2.19
KB
-rw-r--r--
2025-12-17 18:53
README.pam_lastlog
2.54
KB
-rw-r--r--
2025-12-17 18:53
README.pam_limits
2.36
KB
-rw-r--r--
2025-12-17 18:53
README.pam_listfile
3.54
KB
-rw-r--r--
2025-12-17 18:53
README.pam_localuser
1.14
KB
-rw-r--r--
2025-12-17 18:53
README.pam_loginuid
1.09
KB
-rw-r--r--
2025-12-17 18:53
README.pam_mail
1.96
KB
-rw-r--r--
2025-12-17 18:53
README.pam_mkhomedir
1.33
KB
-rw-r--r--
2025-12-17 18:53
README.pam_motd
2.53
KB
-rw-r--r--
2025-12-17 18:53
README.pam_namespace
11.27
KB
-rw-r--r--
2025-12-17 18:53
README.pam_nologin
1.32
KB
-rw-r--r--
2025-12-17 18:53
README.pam_permit
907
B
-rw-r--r--
2025-12-17 18:53
README.pam_postgresok
346
B
-rw-r--r--
2025-12-17 18:53
README.pam_pwhistory
2.19
KB
-rw-r--r--
2025-12-17 18:53
README.pam_rhosts
1.84
KB
-rw-r--r--
2025-12-17 18:53
README.pam_rootok
1.06
KB
-rw-r--r--
2025-12-17 18:53
README.pam_securetty
1.31
KB
-rw-r--r--
2025-12-17 18:53
README.pam_selinux
2.84
KB
-rw-r--r--
2025-12-17 18:53
README.pam_sepermit
1.61
KB
-rw-r--r--
2025-12-17 18:53
README.pam_shells
653
B
-rw-r--r--
2025-12-17 18:53
README.pam_stress
2.01
KB
-rw-r--r--
2025-12-17 18:53
README.pam_succeed_if
2.8
KB
-rw-r--r--
2025-12-17 18:53
README.pam_time
1.27
KB
-rw-r--r--
2025-12-17 18:53
README.pam_timestamp
1.58
KB
-rw-r--r--
2025-12-17 18:53
README.pam_tty_audit
2.71
KB
-rw-r--r--
2025-12-17 18:53
README.pam_umask
1.59
KB
-rw-r--r--
2025-12-17 18:53
README.pam_unix
7.09
KB
-rw-r--r--
2025-12-17 18:53
README.pam_userdb
2.9
KB
-rw-r--r--
2025-12-17 18:53
README.pam_usertype
1.17
KB
-rw-r--r--
2025-12-17 18:53
README.pam_warn
1.2
KB
-rw-r--r--
2025-12-17 18:53
README.pam_wheel
1.92
KB
-rw-r--r--
2025-12-17 18:53
README.pam_xauth
3.61
KB
-rw-r--r--
2025-12-17 18:53
Save
Rename
pam_wheel -- Only permit root access to members of group wheel -------------------------------------------------------------------------- DESCRIPTION The pam_wheel PAM module is used to enforce the so-called wheel group. By default it permits root access to the system if the applicant user is a member of the wheel group. If no group with this name exist, the module is using the group with the group-ID 0. OPTIONS debug Print debug information. deny Reverse the sense of the auth operation: if the user is trying to get UID 0 access and is a member of the wheel group (or the group of the group option), deny access. Conversely, if the user is not in the group, return PAM_IGNORE (unless trust was also specified, in which case we return PAM_SUCCESS). group=name Instead of checking the wheel or GID 0 groups, use the name group to perform the authentication. root_only The check for wheel membership is done only when the target user UID is 0. trust The pam_wheel module will return PAM_SUCCESS instead of PAM_IGNORE if the user is a member of the wheel group (thus with a little play stacking the modules the wheel members may be able to su to root without being prompted for a passwd). use_uid The check will be done against the real uid of the calling process, instead of trying to obtain the user from the login session associated with the terminal in use. EXAMPLES The root account gains access by default (rootok), only wheel members can become root (wheel) but Unix authenticate non-root applicants. su auth sufficient pam_rootok.so su auth required pam_wheel.so su auth required pam_unix.so AUTHOR pam_wheel was written by Cristian Gafton <gafton@redhat.com>.