{"id":4798,"date":"2013-11-18T14:03:19","date_gmt":"2013-11-18T05:03:19","guid":{"rendered":"http:\/\/begi.net\/news\/?p=4798"},"modified":"2013-11-18T14:03:19","modified_gmt":"2013-11-18T05:03:19","slug":"%e3%82%b7%e3%83%9e%e3%83%b3%e3%83%86%e3%83%83%e3%82%af%e3%80%81linux%e3%81%ab%e6%84%9f%e6%9f%93%e3%81%99%e3%82%8b%e7%99%ba%e8%a6%8b%e3%81%95%e3%82%8c%e3%81%ab%e3%81%8f%e3%81%84%e3%83%90%e3%83%83","status":"publish","type":"post","link":"https:\/\/begi.net\/news\/archives\/4798.html","title":{"rendered":"\u30b7\u30de\u30f3\u30c6\u30c3\u30af\u3001Linux\u306b\u611f\u67d3\u3059\u308b\u767a\u898b\u3055\u308c\u306b\u304f\u3044\u30d0\u30c3\u30af\u30c9\u30a2\u306b\u95a2\u3059\u308b\u767a\u8868"},"content":{"rendered":"<p><A HREF=\"http:\/\/www.symantec.com\/\">\u30b7\u30de\u30f3\u30c6\u30c3\u30af<\/A>\u306f11\u670814\u65e5\uff08\u73fe\u5730\u6642\u9593\uff09\u3001\u300cLinux Back Door Uses Covert Communication Protocol\u300d\u3068\u984c\u3057\u305fBlog\u3092\u767a\u8868\u3057\u305f\u3002<\/p>\n<p>\u3053\u306eBlog\u3067\u306f\u3001\u767a\u898b\u3055\u308c\u306b\u304f\u3044\u901a\u4fe1\u30d7\u30ed\u30c8\u30b3\u30eb\u3092\u4f7f\u3046Linux\u30d0\u30c3\u30af\u30c9\u30a2\u306b\u3064\u3044\u3066\u7d39\u4ecb\u3057\u3066\u3044\u308b\u3002\u3053\u306e\u30d0\u30c3\u30af\u30c9\u30a2\u306f\u3001\u305f\u3068\u3048\u3070sshd\u306b\u4ed5\u8fbc\u307e\u308c\u305f\u5834\u5408\u3001\u901a\u5e38\u306f\u6b63\u5e38\u306a\u52d5\u4f5c\u3092\u3059\u308b\u305f\u3081\u3001\u30e6\u30fc\u30b6\u306b\u306f\u30d0\u30c3\u30af\u30c9\u30a2\u304c\u4ed5\u8fbc\u307e\u308c\u305f\u3053\u3068\u306b\u6c17\u3065\u304b\u306a\u3044\u3002\u3068\u3053\u308d\u304c\u3001\u305f\u3068\u3048\u3070\u300c:!;.\u300d\u3068\u3044\u3046\u6587\u5b57\u5217\u3092\u53d7\u4fe1\u3057\u305f\u5834\u5408\u3001\u305d\u306e\u5f8c\u306b\u7d9a\u304f\u6587\u5b57\u5217\u3092\u30b3\u30de\u30f3\u30c9\u3068\u3057\u3066\u51e6\u7406\u3059\u308b\u3002\u30b3\u30de\u30f3\u30c9\u3068\u3057\u3066\u51e6\u7406\u3055\u308c\u308b\u6587\u5b57\u5217\u306f\u6697\u53f7\u5316\u3055\u308c\u3066\u3044\u308b\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u30b5\u30fc\u30d0\u3067\u4efb\u610f\u306e\u30b3\u30de\u30f3\u30c9\u3092\u5b9f\u884c\u3057\u305f\u308a\u3001\u60c5\u5831\u3092\u76d7\u307f\u51fa\u3057\u305f\u308a\u3057\u3066\u3044\u308b\u3068\u3044\u3046\u3002<\/p>\n<p>\u3053\u306e\u30d0\u30c3\u30af\u30c9\u30a2\u3067\u306f\u3001\u4ed5\u8fbc\u307e\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u6c17\u3065\u304b\u308c\u306a\u3044\u3088\u3046\u306b\u5de7\u307f\u306b\u632f\u308b\u307e\u3063\u3066\u3044\u308b\u305f\u3081\u3001\u4ed5\u8fbc\u307e\u308c\u3066\u3082\u7ba1\u7406\u8005\u5074\u304c\u975e\u5e38\u306b\u6c17\u3065\u304d\u306b\u304f\u304f\u3001\u4e00\u5b9a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u65bd\u7b56\u3092\u884c\u3063\u305f\u3068\u3057\u3066\u3082\u5b89\u5fc3\u306f\u3067\u304d\u306a\u3044\u3053\u3068\u306b\u306a\u308b\u3002\u653b\u6483\u8005\u306f\u3001\u69d8\u3005\u306a\u624b\u6cd5\u3092\u99c6\u4f7f\u3057\u3066\u60c5\u5831\u306e\u596a\u53d6\u3092\u8a66\u307f\u3066\u304a\u308a\u3001\u7ba1\u7406\u8005\u5074\u3082\u5e38\u306b\u5bfe\u7b56\u3092\u610f\u8b58\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3001\u3068\u3057\u3066\u3044\u308b\u3002<\/p>\n<p align=\"right\">(\u5ddd\u539f \u9f8d\u4eba\/\u3073\u304e\u306d\u3063\u3068)<\/p>\n<p><b>[\u95a2\u9023\u30ea\u30f3\u30af]<\/b><br \/>\n<A HREF=\"http:\/\/www.symantec.com\/connect\/blogs\/linux-back-door-uses-covert-communication-protocol\">Blog\u306b\u3088\u308b\u8a18\u4e8b<\/A><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30b7\u30de\u30f3\u30c6\u30c3\u30af\u306f11\u670814\u65e5\uff08\u73fe\u5730\u6642\u9593\uff09\u3001\u300cLinux Back Door Uses Covert Communication Protocol\u300d\u3068\u984c\u3057\u305fBlog\u3092\u767a\u8868\u3057\u305f\u3002 \u3053\u306eBlog\u3067\u306f\u3001\u767a\u898b\u3055\u308c\u306b\u304f\u3044\u901a\u4fe1\u30d7\u30ed\u30c8\u30b3\u30eb [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-4798","post","type-post","status-publish","format-standard","hentry","category-17"],"_links":{"self":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/4798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/comments?post=4798"}],"version-history":[{"count":1,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/4798\/revisions"}],"predecessor-version":[{"id":4799,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/posts\/4798\/revisions\/4799"}],"wp:attachment":[{"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/media?parent=4798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/categories?post=4798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/begi.net\/news\/wp-json\/wp\/v2\/tags?post=4798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}