Next: , Previous: Security Considerations for xargs, Up: Security Considerations   [Contents][Index]


8.4 locate¤Î¥»¥­¥å¥ê¥Æ¥£¤Î¸¡Æ¤

locate¤Î½ÐÎϤò¾¤Î¥³¥Þ¥ó¥É¤ËÅϤ¹¤³¤È¤ÏÌÇ¿¤Ë¤¢¤ê¤Þ¤»¤ó¡¥¤·¤«¤·¡¤ ¤½¤¦¤¹¤ë¾ì¹ç¤Ï‘find ... -print’¤Î»ÈÍÑ¤ÈÆ±¤¸¤è¤¦¤Ê¥»¥­¥å¥ê¥Æ¥£¤ÎÌä Â꤬À¸¤¸¤ë¤Ç¤·¤ç¤¦¡¥¤·¤«¤·¡¤¥Õ¥¡¥¤¥ë̾¤Î¶õÇò¤Ë°Í¸¤¹¤ëÌäÂê¤Ï¡¤ locate¤Î‘-0’¥ª¥×¥·¥ç¥ó¤Ç²ò·è¤¹¤ë¤³¤È¤¬²Äǽ¤Ç¤¹¤¬¡¤¤³¤ì¤Ç¤â ‘find ... -print0’¤Ë´ØÏ¢¤¹¤ë¶¥¹ç¾õÂÖ¤ÎÌäÂê¤Ï»Ä¤ê¤Þ¤¹¡¥ locate¤Ç¤Ï¡¤¤³¤ì¤é¤ÎÌäÂê¤òÈò¤±¤ëÊýË¡¤¬¤¢¤ê¤Þ¤»¤ó¡¥