On Tuesday 19 December 2006 08:26, "Voytek Eymont" <[EMAIL PROTECTED]> wrote: > on several ocassions I had malware downloaded and executed from /tmp > (through CMS vulnerability); > > there was a suggestion here to mount /tmp as non executable; > > - do I need to partition the HD and make a separate partition for /tmp? > - good/bad/excellent idea ?
I've been doing this for a number of years. Generally it is a good idea. I think the only time I find it a nuisance is when using the Loki Installer (which is used to install games like the Unreal Tournament series). By default, it tries to extract itself and run from /tmp. The resulting error when it discovers that it can't execute is cryptic. The extraction area can be modified with a flag, which IIRC is '--target <destination directory>'. -- "If people had understood how patents would be granted when most of today's ideas were invented and had taken out patents, the industry would be at a complete standstill today." - Bill Gates, 1991
pgpV1ZkptfM2o.pgp
Description: PGP signature
-- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
