{"image_url":null,"author_name":"rubato","published":"2004-07-28 00:00:01","blog_title":"\u3042\u304d\u307d\u3093\u65e5\u8a18","description":"\u53d6\u308a\u5408\u3048\u305a\u3001\u4eca\u66f4\u30e1\u30e2\u3002\u8aad\u307f\u305f\u3044\u3051\u3069\u3001\u8aad\u3093\u3067\u308b\u6642\u9593\u3042\u308b\u306e\u304b\uff1f\u3002\u305d\u30fc\u8a00\u3048\u3070\u3001\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u8abf\u67fb\u30ac\u30a4\u30c9\u2015rootkit\u306e\u691c\u51fa\u3068TCT\u306e\u4f7f\u3044\u65b9\u3082\u307e\u3060\uff08\u3063\u3066\u304a\u3044\uff01\uff09\u8cb7\u3063\u3066\u3044\u306a\u3044\u306e\u3067\u3059\u304c\u3001\u3053\u308c\u3063\u3066\u6539\u8a02\u7248\u3068\u304b\u51fa\u308b\u306e\u3067\u3057\u3087\u3046\u304b\uff1f\u3002\u6050\u3089\u304f\u5185\u5bb9\u7684\u306b\u306f\u53e4\u304f\u306a\u3063\u3066\u3044\u308b\u3068\u601d\u3044\u307e\u3059\u3051\u3069\u3002","version":"1.0","categories":["Book"],"width":"100%","title":"Know Your Enemy: Learning About Security Threats","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Frubato.hatenadiary.org%2Fentry%2F20040728%2Fp2\" title=\"Know Your Enemy: Learning About Security Threats - \u3042\u304d\u307d\u3093\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://rubato.hatenadiary.org/entry/20040728/p2","blog_url":"https://rubato.hatenadiary.org/","height":"190","author_url":"https://blog.hatena.ne.jp/rubato/","type":"rich","provider_url":"https://hatena.blog","provider_name":"Hatena Blog"}