Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
i found three gif images pointing to www.tempelton.com
with adds to buy viagra...
i'm pretty sure i never visited that site...
i wonder how these files ended in /tmp??
it is world writeble (drwxrwxrwt)
so anyone can copy whatever they want to /tmp!?
/tmp is designed for temporary storage by all applications. To write anything they want they have to get to your box. It may be you hit another site or opened an email that had these files as attachments. Since they're in /tmp its safe to delete them.
so anyone can copy whatever they want to /tmp!?
That's what /tmp is for. If you don't run SELinux or GRSecurity I suggest you:
- at least mount your temporary partitions (if they are partitions) with the "noexec,nosuid,nodev" flags (note you'll have to test noexec and nodev as it may break some applications),
- use a tmpwatch cronjob to clean up /tmp and
- if you run publicly accessable services use a tool to monitor system (and temporary) directories for files with changing and unexpected permissions like setuid root ones.
... i never saw image files in /tmp before...
What's the date they where put there and who owns them?
Then users who are not part of the owner or group the directory is owned by will not be able to write to it (that includes your unprivileged user account).
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.