シェルアカウント (Japanese Wikipedia)

Analysis of information sources in references of the Wikipedia article "シェルアカウント" in Japanese language version.

refsWebsite
Global rank Japanese rank
8,246th place
low place
5th place
19th place
3rd place
61st place
low place
low place
5,701st place
4,366th place
2nd place
6th place

books.google.com

  • Young, Margaret Levine (1999), Margaret Levine Young, ed., Internet: the complete reference (3 ed.), Osborne/McGraw-Hill, p. 11, ISBN 978-0-07-211942-8, https://books.google.com/books?id=gPdSAAAAMAAJ 

doi.org

  • Bob Toxen (May–June 2007), “The Seven Deadly Sins of Linux Security”, Queue (ACM, New York, USA) 5 (4): 38–47, doi:10.1145/1255421.1255423, ISSN 1542-7730, "Most recent vulnerabilities are not directly exploitable remotely on most systems. This means that most systems are not at risk for remote attack from the Internet. Many of the vulnerabilities may be taken advantage of by someone with a regular shell account on the system." 

linuxjournal.com

slashdot.org

ask.slashdot.org

worldcat.org

search.worldcat.org

  • Michael K. Johnson (April 1996), “Choosing an Internet Service Provider”, Linux Journal (Specialized Systems, Seattle, USA) (24), ISSN 1075-3583, http://www.linuxjournal.com/article/1233, "If you are comfortable with the command-line interface that Linux provides, you will probably be comfortable with a Shell account on a Linux or Unix computer managed by an ISP. Once your modem connects to the other modem and you log in, it is the same as an xterm session or a console login (without graphics capabilities) on your Linux box, except that the remote computer you are logged into is connected to the Internet. You usually use a standard Unix shell, with roughly the same choices available on your own Linux system, although some shell accounts also provide an optional menu interface similar to what a BBS provides." 
  • Bob Toxen (May–June 2007), “The Seven Deadly Sins of Linux Security”, Queue (ACM, New York, USA) 5 (4): 38–47, doi:10.1145/1255421.1255423, ISSN 1542-7730, "Most recent vulnerabilities are not directly exploitable remotely on most systems. This means that most systems are not at risk for remote attack from the Internet. Many of the vulnerabilities may be taken advantage of by someone with a regular shell account on the system." 

yossman.net

  • Glossary”. yossman.net (December 29, 1996). 27 September 2010閲覧。