Previous: Security Considerations for locate, Up: Security Considerations   [Contents][Index]


8.5 ³µÍ×

¿®ÍѤǤ­¤Ê¤¤Âè»°¼Ô¤¬¡¤¥·¥¹¥Æ¥à¾å¤Ë¥Õ¥¡¥¤¥ë¤òºîÀ®¤Ç¤­¤¿¤ê¡¤ºîÀ®¤·¤¿¥Õ¥¡ ¥¤¥ë̾¤Ë²½Ç¡¤¹¤ë¤³¤È¤¬¤Ç¤­¤ë¾ì¹ç¡¤find¡¤locate¡¤¤½¤·¤Æ xargs¤Î»ÈÍÑ»þ¤Ë¤Ï¡¤°Ê²¼°Ê³°¤Î¥»¥­¥å¥ê¥Æ¥£¤ÎÌäÂê¤òÃΤäƤª¤¤¤Æ¤¯ ¤À¤µ¤¤¡¥

Informational use only

¥×¥í¥°¥é¥à¤¬Á°¤â¤Ã¤Æ½àÈ÷¤µ¤ì¤Æ¤¤¤ë¥Õ¥¡¥¤¥ë̾¤Î¥ê¥¹¥È¤ò»ÈÍѤ·¡¤¤½¤ì°Ê¾å ¤Î¥¢¥¯¥·¥ç¥ó¤ò¼Â»Ü¤·¤Ê¤¤¤è¤¦¤Ë»ÈÍѤ¹¤ë¡¥

-delete

»ØÄꤷ¤¿¾ò·ï¤Ë¹çÃפ·¤¿¥Õ¥¡¥¤¥ë¤òºï½ü¤¹¤ë‘-delete’¥¢¥¯¥·¥ç¥ó¤ò»ÈÍÑ ¤¹¤ë¡¥

-execdir

PATH´Ä¶­ÊÑ¿ô¤¬¡¤¿®ÍѤµ¤ì¤¿¥×¥í¥°¥é¥à¤À¤±¤¬´Þ¤Þ¤ì¤Æ¤¤¤ë¥Ç¥£¥ì¥¯¥È ¥ê¤È¤Ê¤Ã¤Æ¤¤¤ë¾õ¶·¤Ç¡¤‘-execdir’¥¢¥¯¥·¥ç¥ó¤ò»ÈÍѤ¹¤ë¡¥