Previous: Security Considerations for locate, Up: Security Considerations [Contents][Index]
¿®ÍѤǤ¤Ê¤¤Âè»°¼Ô¤¬¡¤¥·¥¹¥Æ¥à¾å¤Ë¥Õ¥¡¥¤¥ë¤òºîÀ®¤Ç¤¤¿¤ê¡¤ºîÀ®¤·¤¿¥Õ¥¡
¥¤¥ë̾¤Ë²½Ç¡¤¹¤ë¤³¤È¤¬¤Ç¤¤ë¾ì¹ç¡¤find
¡¤locate
¡¤¤½¤·¤Æ
xargs
¤Î»ÈÍÑ»þ¤Ë¤Ï¡¤°Ê²¼°Ê³°¤Î¥»¥¥å¥ê¥Æ¥£¤ÎÌäÂê¤òÃΤäƤª¤¤¤Æ¤¯
¤À¤µ¤¤¡¥
¥×¥í¥°¥é¥à¤¬Á°¤â¤Ã¤Æ½àÈ÷¤µ¤ì¤Æ¤¤¤ë¥Õ¥¡¥¤¥ë̾¤Î¥ê¥¹¥È¤ò»ÈÍѤ·¡¤¤½¤ì°Ê¾å ¤Î¥¢¥¯¥·¥ç¥ó¤ò¼Â»Ü¤·¤Ê¤¤¤è¤¦¤Ë»ÈÍѤ¹¤ë¡¥
»ØÄꤷ¤¿¾ò·ï¤Ë¹çÃפ·¤¿¥Õ¥¡¥¤¥ë¤òºï½ü¤¹¤ë‘-delete’¥¢¥¯¥·¥ç¥ó¤ò»ÈÍÑ ¤¹¤ë¡¥
PATH
´Ä¶ÊÑ¿ô¤¬¡¤¿®ÍѤµ¤ì¤¿¥×¥í¥°¥é¥à¤À¤±¤¬´Þ¤Þ¤ì¤Æ¤¤¤ë¥Ç¥£¥ì¥¯¥È
¥ê¤È¤Ê¤Ã¤Æ¤¤¤ë¾õ¶·¤Ç¡¤‘-execdir’¥¢¥¯¥·¥ç¥ó¤ò»ÈÍѤ¹¤ë¡¥