-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sridhar Dhanapalan wrote: > On Tuesday 19 December 2006 08:26, "Voytek Eymont" <[EMAIL PROTECTED]> wrote: >> on several ocassions I had malware downloaded and executed from /tmp >> (through CMS vulnerability); >> >> there was a suggestion here to mount /tmp as non executable; >> >> - do I need to partition the HD and make a separate partition for /tmp? >> - good/bad/excellent idea ? > > I've been doing this for a number of years. Generally it is a good idea. I > think the only time I find it a nuisance is when using the Loki Installer > (which is used to install games like the Unreal Tournament series). By > default, it tries to extract itself and run from /tmp. The resulting error > when it discovers that it can't execute is cryptic. The extraction area can > be modified with a flag, which IIRC is '--target <destination directory>'.
To get around that problem you can always re-mount with executable while you run the installs you need (UT series, other Loki based installers...). You're best off leaving things that don't need execution privileges without them ;) Hoo Roo, Alex. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFFiSf9g5/KyzD/6f0RAi2pAJ4uv3/eYdMtv/2T1lC824xL8vv7WgCghWAj wiBBFZ9LUNF+F68p9TF1Q5E= =AOsz -----END PGP SIGNATURE----- -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
