On Tuesday 19 December 2006 08:26, "Voytek Eymont" <[EMAIL PROTECTED]> wrote:
> on several ocassions I had malware downloaded and executed from /tmp
> (through CMS vulnerability);
>
> there was a suggestion here to mount /tmp as non executable;
>
> - do I need to partition the HD and make a separate partition for /tmp?
> - good/bad/excellent idea ?

I've been doing this for a number of years. Generally it is a good idea. I 
think the only time I find it a nuisance is when using the Loki Installer 
(which is used to install games like the Unreal Tournament series). By 
default, it tries to extract itself and run from /tmp. The resulting error 
when it discovers that it can't execute is cryptic. The extraction area can 
be modified with a flag, which IIRC is '--target <destination directory>'.


-- 
"If people had understood how patents would be granted when most of today's 
ideas were invented and had taken out patents, the industry would be at a 
complete standstill today." - Bill Gates, 1991

Attachment: pgpV1ZkptfM2o.pgp
Description: PGP signature

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to