{"categories":["sec-summary","\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u30fb\u8aad\u307f\u7269"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fnaoe.hatenadiary.org%2Fentry%2F20070310%2Fp2\" title=\" - naoe\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","image_url":null,"version":"1.0","blog_title":"naoe\u306e\u65e5\u8a18","description":"\u30bb\u30ad\u30e5\u30a2\u306aLinux\u74b0\u5883\u3078\u306e\u8fd1\u9053\u2015\u2015Damn Vulnerable Linux\u306e\u7121\u9632\u5099\u3055\u3092\u6975\u3081\u308d\uff01 http://www.itmedia.co.jp/enterprise/articles/0703/07/news026.html \uff03\u308f\u3056\u3068\u8106\u5f31\u306a\u30d0\u30fc\u30b8\u30e7\u30f3\u306e\u30ab\u30fc\u30cd\u30eb\u3084\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u7528\u610f\u3059\u308b\u3053\u3068\u3067 \uff03\u30da\u30cd\u30c8\u30ec\u30fc\u30b7\u30e7\u30f3\u30c6\u30b9\u30c8\u306e\u88ab\u5bb3\u8005OS\u3068\u3057\u3066\u6d3b\u8e8d\u3059\u308b\u306e\u304b\u3082\uff0e \uff03\u3053\u3046\u3044\u3046\u306e\u306f\u4fbf\u5229\u304b\u3082\uff0e\u6559\u6750\u3068\u3057\u3066\u4f7f\u3048\u308b\u304b\u691c\u8a0e\u3057\u3066\u307f\u3088\u3046\uff0e \u300cSecurity of HTTPHeader\u300d http://rocketeer.dip.jp/secProg/HttpSecurity001.pdf \uff03\u65e5\u672c\u8a9e \u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u300c\u2026","title":"","author_url":"https://blog.hatena.ne.jp/naoe/","width":"100%","provider_url":"https://hatena.blog","blog_url":"https://naoe.hatenadiary.org/","height":"190","url":"https://naoe.hatenadiary.org/entry/20070310/p2","type":"rich","published":"2007-03-10 00:00:01","provider_name":"Hatena Blog","author_name":"naoe"}