A couple days ago a CentOS Linux server that I took over administration on had some mysterious files show up in the /tmp and /var/tmp directories. The files were placed in /tmp and /var/tmp by the apache user meaning there is some form of security hole in Apache, PHP, or one of the virtual hosts has an insecure application installed. Before looking into where the issue is I needed to lock things down so no applications could be executed from these directories in the future regardless of a security flaw in the future. Below are instructions on how to secure /tmp and /var/tmp.
During some testing earlier a gem we were using required that the Ruby binaries on the server to be unstripped or not stripped. I wanted to provide information relating to finding out if your Ruby binaries were stripped or not stripped including what the output of each will look like. Below is a command you can use to find out if your Ruby version is stripped or not stripped including example outputs to display what each will look like.