Server : Apache/2.4.18 (Ubuntu) System : Linux canvaswebdesign 3.13.0-71-generic #114-Ubuntu SMP Tue Dec 1 02:34:22 UTC 2015 x86_64 User : oppastar ( 1041) PHP Version : 7.0.33-0ubuntu0.16.04.15 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, Directory : /usr/share/doc/unhide/ |
Upload File : |
unhide for Debian ----------------- These utilities are meant to be run as root, otherwise, they will miss certain things or report false positives. False positives --------------- Grsecurity kernels seem to reserver PIDs 300 to 499. They will be reported when using unhide's brute-forcing method. Some applications can start listening on a port between the time that unhide gets the list of open ports in /bin/netstat and the time when it brute-forces ports. Run it a few times to make sure that it's not a permanent port. -- Francois Marier <francois@debian.org> Thu, 06 Dec 2007 16:59:30 +1300 -- Julien Valroff <julien@debian.org> Fri, 09 Mar 2012 21:53:56 +0100