MSV FM

[email protected]: ~ $
Path : /proc/self/root/sbin/
File Upload :
Current < : //proc/self/root/sbin/ddns-confgen

ELF>�!@J@8@@@@hh����:�: 8;8; 8; �0 P;P; P; �����  ���DDS�td���  P�td�7�7�7��Q�tdR�td8;8; 8; ��/lib64/ld-linux-x86-64.so.2GNU�GNUGNU���E�R�����[T5�aa
	M��H5678:=>BCDFG��k�|�3�r07�v�qX�K�8���|k	C���a*v�.���hq��kCE��
�2b�����
:�������s�D"-�l5	"SJ2�c^k��~�������F��l����U�?%���� �*� � ��+P%Pg}@@ Ip%�8@ V�,��$�DhA �@ 6`A eP*at@&��#�1@ ��,��!/�,e� @ �`&��#�libdns.so.1115isc_result_totextisc_entropy_createisc_assertion_failedisc_entropy_usehookisc__mem_getisc_entropy_detachisc_mem_createisc_md5_availableisc__mem_put_ITM_deregisterTMCloneTableisc_base64_totext__gmon_start___ITM_registerTMCloneTabledst_key_generatedst_key_tobufferdst_key_freedns_result_registerdns_rootnamedst_lib_destroydst_lib_initlibisc.so.1107isc_commandline_parseisc_commandline_argumentisc_entropy_destroysourceisc_file_safecreateisc_mem_statsisc_mem_destroyisc_entropy_usebestsourceisc_commandline_errprintisc_file_prognameisc_commandline_indexisc_commandline_optionisc_mem_debugginglibmaxminddb.so.0libgssapi_krb5.so.2libkrb5.so.3libk5crypto.so.3libcom_err.so.2libcrypto.so.1.1libdl.so.2libprotobuf-c.so.1libfstrm.so.0libcap.so.2libz.so.1libjson-c.so.4libpthread.so.0__errno_locationlibxml2.so.2libc.so.6fflush__printf_chkexitputs__stack_chk_failgetpwnam__fprintf_chkfchownfputcfclosestrcasecmpstderr__snprintf_chkstrncasecmpfileno__vfprintf_chk__cxa_finalize__libc_start_mainferror_edata__bss_start_endalg_fromtext_IO_stdin_usedwrite_key_filealg_bitsverbosefatalgenerate_keyset_useralg_totext__data_start__libc_csu_initnotify__libc_csu_finiGLIBC_2.2.5GLIBC_2.4GLIBC_2.3.44 ui	�bii
�ui	�ti	�8; �"@; `"H; H; �? �? 	�? �? �? !�? (�? )�? *�? /�? 1�? 3�? 4X> `> h> p> x> �> �> �> 
�> �> �> 
�> �> �> �> �> �> �> �> �> �> ? ? ? ?  ? (? 0? 8?  @? "H? #P? $X? %`? &h? 'p? +x? ,�? -�? .�? 0�? 2��H��H��) H��t��H����5"( �%#( ��h�������h��������h�������h�������h�������h�������h�������h��q������h��a������h	��Q������h
��A������h��1������h��!������h
��������h��������h������h�������h��������h�������h�������h�������h�������h�������h��q������h��a������h��Q������h��A������h��1������h��!������h��������h��������h������h �������h!��������h"�������h#�������h$�������h%�������h&�������h'��q������h(��a�������%�% D���%�% D���%}% D���%u% D���%m% D���%e% D���%]% D���%U% D���%M% D���%E% D���%=% D���%5% D���%-% D���%%% D���%% D���%% D���%
% D���%% D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%�$ D���%}$ D���%u$ D���%m$ D���%e$ D���%]$ D���%U$ D���%M$ D��AWAVAUATA��UH��SH��dH�%(H��$�1�H�D$8��H�}�H�5�$ �o���H��$ ���8H�=�H�ֹL��% �H��$ H�5�����HE�H��I��t�����tH�5�H���a��������3$ �D$H��# �D$E1�A�H�$A��H�(�H�D$H�D$H��H��D���v����������?��;��Hc�H�>����=�# ��H�# H�H�D$�f��=�# ��H��" H�H�$��=m# ��H��" L�0�l���@H��" L�8L���nD��E���sA���(	A���8���H��" ��&���fDH��" D�A��?��H�}" H�
# �H��H�81������6fD�=�" u��D$����DH�!" H�H�D$���@�D$���H�5H�������u1�m" �D$�5���1���H�5��H������H�5�H���S�����t�H�
����H�=������=" uH��! Hc�H�
L�t�H�<$tH�|$����H�s! D9 ����D��H�l$8�e1�1�H��I���v������1�H�5�H�=��YM���`�D$1�H�t$H�|$8D��D��H��$�L�D$@�D$@!fuBH�D$HH��H�D$PH�D$XH�D$`H�D$hH�D$p�D$x�I�|$��L�L$HD�D$TL��L��H�5��1��{���H��tHcT$H�|$8A�*H��H�
������|$�OH���d���1�H��$�dH3%(�H�Ę[]A\A]A^A_�H�=��M���L�L$HL��L��D�D$TH�5>�1����H�$H����I��H��L��H�5@1����H�=����5���H���=&  L�5mLE�H�$I��H���L�D$(I��L��1�L��H���H�|$8H�ȹ�H�Ѓ�	Lc؉D$L��L�\$ �6���L�\$ L�D$(I�����H��H����PM��L�ѺAPL��L��H��1�I������ZY���H� H�|$8H�0�i������H�T$H��tsL��H�5(�1��������H�� H�
Q �H��D�H�� H�81������g���H�D$I��H�����1��D$�a���L��H�5��1��Q������H�=�
1��nL��H�=X1��]���V���H�5�H�=�H��1��>���f���1�I��^H��H���PTL��
H�
/
H�=h����� �H�= H�
 H9�tH�� H��t	�����H�=� H�5� H)�H��H��H��?H�H�tH�� H��t��fD�����=� u+UH�=: H��tH�=� ����d����� ]������w����H�� �=� S��H�H� H�8tH���1��-��������H��	�1���������SH���H�t$(H�T$0H�L$8L�D$@L�L$H��t7)D$P)L$`)T$p)�$�)�$�)�$�)�$�)�$�dH�%(H�D$1�H�� �8uH�D$dH3%(u[H���[�H�1 H��H��H��$��$H�;H�D$H�D$ �D$0H�D$�H���H�3�
��������@��UH��SH���H�t$(H�T$0H�L$8L�D$@L�L$H��t7)D$P)L$`)T$p)�$�)�$�)�$�)�$�)�$�dH�%(H�D$1�H�e �H�� H��H�H�;1����H�;H��H��H��$���$H�D$H�D$ �D$0H�D$�\�H�3�
���������D����c@��wsH��@��Hc�H�>��fDH�N�H�Y��H�U��H�Q��H�M��H���H�9����S�H�5)H���7���H�SH�5���HD�H������~H�5�H����������t_H�5�H����������tGH�5�H���w�������t/H�5�H���_�������tH�5�H���G��҃⥉�[�����������p�����@����c1�@��w@��H�����f���AWAVAUATU��SH���L�D$dH�%(H��$�1��BcH�D$H�D$ H�D$(<��H�(��I��H��Hc�A��H�>��fD�C����A�E�=��GL�t$ L��L�������1�H�5�H�=B
����H����	H��H�=	�������Ƀ�����HD�L�|$H�|$ H��L�������H�5dH�=�1��u���H�t$ �L������XH�5JH�=�1��F���H��@��E1�H�\$0A��1�D��H�� SATjH�8���H�� ����1�H�5H�=YH��������H�|$(H��$�H�t$@H�D$H�D$@!fuBH�D$P@H�D$XH�l$`H�l$hH�D$p�D$x�����X1�H�5�
H�=����H�D$H��H�L$H�|$0H�H�D$0�D$T�D$8�����1�H�5v
H�=��=���H�|$tL����H�|$(tH���
�L������p�H��$�dH3%(��H���[]A\A]A^A_���A�=�������H�=A1����f�H�|$ ��!�����@��H�=L1������H�=9�t������m�H�5�H�=�
H��1��U������N�H�5!H�=�
H��1��6�������*�H�5MH�=�
H��1���������H�5!H�=g
H��1��������H�5�H�=H
H��1����������H�5�H�=)
H��1����D��H�=
1����@��AVAUI��ATI��UH��SH��A��H��dH�%(H�D$1��[���H��H��H�$I���5�����1�H�5�H�=�	�H���M��tH�<$L��������H���uD�MM��H�|$L��1�H���XZH�<$��H�<$�1��uH�<$�����uaH�� H�پH�eH�81����H�D$dH3%(u,H��[]A\A]A^É���H�5�
H�=�H��1��t������H��H�=�
1��^���H��H�=�
1��M���H�=�
1��?���f.�D��USH��H��H����H��t�hH���k�H���������[��]�'�����H�������[]���AWI��AVI��AUA��ATL�% UH�- SL)�H����H��t1��L��L��D��A��H��H9�u�H��[]A\A]A^A_�ff.������H��H���Usage:
 %s [-a alg] [-k keyname] [-r randomfile] [-q] [-s name | -z zone]
  -a alg:        algorithm (default hmac-sha256)
  -k keyname:    name of the key as it will be used in named.conf
  -r randomfile: source of random data (use "keyboard" for key timing)
  -s name:       domain name to be updated using the created key
  -z zone:       name of the zone as it will be used in named.conf
  -q:            quiet mode: print the key, with no explanatory text
Usage:
 %s [-a alg] [-r randomfile] [keyname]
  -a alg:        algorithm (default hmac-sha256)
  -r randomfile: source of random data (use "keyboard" for key timing)
../../../bin/confgen/ddns-confgen.cfailed to allocate memory for keyname# To activate this key, place the following in named.conf, and
# in a separate keyfile on the system or systems from which nsupdate
# will be run:key "%s" {
	algorithm %s;
	secret "%.*s";
};

# Then, in the "zone" statement for the zone containing the
# name "%s", place an "update-policy" statement
# like this one, adjusted as needed for your preferred permissions:
update-policy {
	  grant %s name %s ANY;
};

# Then, in the "zone" definition statement for "%s",
# place an "update-policy" statement like this one, adjusted as 
# needed for your preferred permissions:
update-policy {
	  grant %s zonesub ANY;
};

# Then, in the "zone" statement for each zone you wish to dynamically
# update, place an "update-policy" statement granting update permission
# to this key.  For example, the following statement grants this key
# permission to update any name within the zone:
update-policy {
	grant %s zonesub ANY;
};

# After the keyfile has been placed, the following command will
# execute nsupdate using this key:
nsupdate -k <keyfile>tsig-keyddns-keytsig-keygenlt-tsig-keygen.exeddns-confgenddns-confgen.exe0Unsupported algorithm '%s'%s: invalid argument -%c
%s: unhandled option -%c
a:hk:Mmr:qs:y:z:create memory context%s: %s%s.%s����������������������������������������������������������������������������������y�����h���H��������0�H�����������h�(�%s: hmac-md5hmac-sha1hmac-sha224hmac-sha256hmac-sha384hmac-sha512(unknown)hmac-unsupported algorithm %d
create entropy contextstart entropy sourceinitialize dst librarygenerate keydump key to bufferbsse64 encode secretkeyboardcreate keyfileunable to set file owner
write to %s failed
fclose(%s) failed
wrote key file "%s"
H���������P�`�p�����u�u�u����<�<�����keysize %d out of range (must be 1-512)
keysize %d out of range (must be 1-1024)
;�x�����������X�pH��8������������d�h����8zRx�p�/D$4����FJw�?:*3$"\0��t�OO�\���gF�B�B �B(�D0�D8�G�1
8A0A(B BBBA��M�X�A� ����E�G��
AD ���E�D�G�4x��H���E��
Dh��`|���F�B�B �B(�A0�C8�G�G�_�B�B�L�!
8A0A(B BBBHP�<�aF�B�E �D(�D0�K@fHCPcHA@W
0A(A BBBA44X�PE�A�J Y
HCEOFADlp�eF�E�E �E(�H0�H8�G@n8A0A(B BBB����"`"H; p~�������%4Ub�
�,8; @; ���o0�
�
@> � �h	���o���oX���o�o����oP; 0@P`p�������� 0@P`p�������� 0@P`p����GA$3a1��!GA$3p1113P�+GA*GA$annobin gcc 8.5.0 20210514GA$plugin name: gcc-annobinGA$running gcc 8.5.0 20210514GA*GA*GA!
GA*FORTIFYGA+GLIBCXX_ASSERTIONSGA*GOW*�GA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realignGA$3a1�!�,GA$3p1113#�,GA*GA$annobin gcc 8.5.0 20210514GA$plugin name: gcc-annobinGA$running gcc 8.5.0 20210514GA*GA*GA!
GA*FORTIFYGA+GLIBCXX_ASSERTIONSGA*cf_protectionGA+omit_frame_pointerGA+stack_clashGA!stack_realignGA*GOW*�#,GA*GOW*,�,
GA*FORTIFY#u,GA+GLIBCXX_ASSERTIONSddns-confgen-9.11.36-16.el8_10.4.x86_64.debugW�SN�7zXZ�ִF!t/����]?�E�h=��ڊ�2N�B�� ��wg"$���f���T|�Qv_9��p��_$�W�M
)*$�&�S���򺼒ޤbP.�)�(��@P��IK�$<�Y�n���S3{2�ֶ�:%f����>���Y��>����9�K[�О����������Vf�^4����t�#�Vﰼ�]�4Y/�=NҺ��wvu�y�9�56�f.%s	\�+4D{��_�W�t�����a!	ҦV�\W3�t���z��]�*�
�PtE7K�&��y��4J^���I����!�&�OK�8�������q[t�����ʙ݌^�Ї�
FH��	�^����G�BpJ�?���؉ԃ�^y?|�Q6��?��+4�&��J��⽠�Vf���oG4|>�:�<���i�JȈ��Ǝ)��
5�#�_�w�n�מ�8�
���a2����?��r�߂�����Uʍ�3��?�aE�����M�y*�9��4v����ۿ�/�D��`������z����/�x����Z
���
��ur�%����q;z�;x��=�g2=?	긿�0��J�ͷ��ҋ�J�7��[�d��ViF��s��c��7&Pi�/�m.�g��2hY�5�y�(�1��1�*z]g%dm����^�P	�B��[x��؋�*uI]�����^*��A��(#�/`��`"��	��^�'�����oV.�G���`�N$/���%y5���b�[�]�J� EDa�5.�a��Kpn�)�;
���6�'��pw��
DBM(��u�*|��|m&d��[��ow֡ՀnV�w�d��~!���R�-���0�
�kq����򿮶,ۆ{�j��G 7�.�Q����H�8��(�� �@u��6pa�*W��c��k7�|y�N;gs/��n��GK{hyN�p��޶1�<�x��S�$`n�,���2a�+z��z�.�$E�w�9�a�����
��!�\�i��g�YZ.shstrtab.interp.note.gnu.property.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.got.data.bss.gnu.build.attributes.gnu_debuglink.gnu_debugdata���� &�� 4$G���o00�Q���Y�
�
a���o���n���oXX`}��h�B  �����  ������PP5��,�,
��,�, ��7�7��0808��8; 8;�@; @;�H; H;�P; P;��@> @>��@ @ @ @H 
hA`@x |D4/�D(�H>
Bethany
Bethany
0%

THE FINEST HOTEL NEAR LAKE KIVU

The Perfect Base For You

Required fields are followed by *





EC1A68011

About Us

Delicious Interior With The Pinch Of Everything

Bethany Investment group is Presbyterian church in Rwanda(EPR) company that manage Hotel and Guest house in Karongi (Bethany Hotel), ISANO branch in GIKONDO(Kigali), Kiyovu branch(Kigali), AMIZERO branch(Nyagatare-East) and Gisenyi Branch(Rubavu).

Accomodation

Get a Comfortable Room
Feel The Comfort

Get a comfortable room and feel our hotel’s comfort. Bethany Hotel features a variety of fully furnished rooms with extra space, Executive rooms, Deluxe rooms with a beautiful lake view and garden space, Deluxe rooms, comfort rooms, family rooms and standard rooms at your service.

Standard Single

Services

We Provide Top Class Facility
Especially For You

Beach BBQ Party

Kick back on the beach& and enjoy our berbecue from our masterchef

Breakfast

Kick back at our hotels& enjoy our breakfast from our masterchef

Conference Hall

Kick back at our hotels& enjoy our conference halls from all bethany branches

Enjoy with your partner

Honeymoon Package

80%

Get In Touch

Don’t Miss Any Update

    +

    Search your Room

    Required fields are followed by *