Next: Security Summary, Previous: Security Considerations for xargs, Up: Security Considerations [Contents][Index]
locate
¤Î¥»¥¥å¥ê¥Æ¥£¤Î¸¡Æ¤locate
¤Î½ÐÎϤò¾¤Î¥³¥Þ¥ó¥É¤ËÅϤ¹¤³¤È¤ÏÌÇ¿¤Ë¤¢¤ê¤Þ¤»¤ó¡¥¤·¤«¤·¡¤
¤½¤¦¤¹¤ë¾ì¹ç¤Ï‘find ... -print’¤Î»ÈÍÑ¤ÈÆ±¤¸¤è¤¦¤Ê¥»¥¥å¥ê¥Æ¥£¤ÎÌä
Â꤬À¸¤¸¤ë¤Ç¤·¤ç¤¦¡¥¤·¤«¤·¡¤¥Õ¥¡¥¤¥ë̾¤Î¶õÇò¤Ë°Í¸¤¹¤ëÌäÂê¤Ï¡¤
locate
¤Î‘-0’¥ª¥×¥·¥ç¥ó¤Ç²ò·è¤¹¤ë¤³¤È¤¬²Äǽ¤Ç¤¹¤¬¡¤¤³¤ì¤Ç¤â
‘find ... -print0’¤Ë´ØÏ¢¤¹¤ë¶¥¹ç¾õÂÖ¤ÎÌäÂê¤Ï»Ä¤ê¤Þ¤¹¡¥
locate
¤Ç¤Ï¡¤¤³¤ì¤é¤ÎÌäÂê¤òÈò¤±¤ëÊýË¡¤¬¤¢¤ê¤Þ¤»¤ó¡¥