At 03:20 PM 7/10/2003 -0500, you wrote: > > What I like about the first method is that I don't need to worry about > > anything being put there while I'm not looking. This way I can relax a bit > > more when dumping to and reading from my temporary files. Am I wrong about > > feeling safe? With the second method I could blow away /etc/passwd or > > something if an attacker makes any level of effort. In my mind the second > > method requires a lot more checking on my part, and even with checking I > > can't get around several race conditions in a shell script. > >ramdisk?
1. This isn't a generic solution. 2. Man that would be a high-powered script. 3. It still gets mounted as a file system so nothing gets solved. Someone just sent me an email with this note, and I like it: "Variant of the first -- create a temporary directory, chdir() to it, and unlink it. Then populate it." --- Dustin Puryear <[EMAIL PROTECTED]> Puryear Information Technology, LLC <http://www.puryear-it.com> Providing expertise in the management, integration, and security of Windows and UNIX systems, networks, and applications.
