Bob Toxen (May–June 2007), “The Seven Deadly Sins of Linux Security”, Queue (ACM, New York, USA) 5 (4): 38–47, doi:10.1145/1255421.1255423, ISSN1542-7730, "Most recent vulnerabilities are not directly exploitable remotely on most systems. This means that most systems are not at risk for remote attack from the Internet. Many of the vulnerabilities may be taken advantage of by someone with a regular shell account on the system."
linuxjournal.com
Michael K. Johnson (April 1996), “Choosing an Internet Service Provider”, Linux Journal (Specialized Systems, Seattle, USA) (24), ISSN1075-3583, http://www.linuxjournal.com/article/1233, "If you are comfortable with the command-line interface that Linux provides, you will probably be comfortable with a Shell account on a Linux or Unix computer managed by an ISP. Once your modem connects to the other modem and you log in, it is the same as an xterm session or a console login (without graphics capabilities) on your Linux box, except that the remote computer you are logged into is connected to the Internet. You usually use a standard Unix shell, with roughly the same choices available on your own Linux system, although some shell accounts also provide an optional menu interface similar to what a BBS provides."
Michael K. Johnson (April 1996), “Choosing an Internet Service Provider”, Linux Journal (Specialized Systems, Seattle, USA) (24), ISSN1075-3583, http://www.linuxjournal.com/article/1233, "If you are comfortable with the command-line interface that Linux provides, you will probably be comfortable with a Shell account on a Linux or Unix computer managed by an ISP. Once your modem connects to the other modem and you log in, it is the same as an xterm session or a console login (without graphics capabilities) on your Linux box, except that the remote computer you are logged into is connected to the Internet. You usually use a standard Unix shell, with roughly the same choices available on your own Linux system, although some shell accounts also provide an optional menu interface similar to what a BBS provides."
Bob Toxen (May–June 2007), “The Seven Deadly Sins of Linux Security”, Queue (ACM, New York, USA) 5 (4): 38–47, doi:10.1145/1255421.1255423, ISSN1542-7730, "Most recent vulnerabilities are not directly exploitable remotely on most systems. This means that most systems are not at risk for remote attack from the Internet. Many of the vulnerabilities may be taken advantage of by someone with a regular shell account on the system."
yossman.net
“Glossary”. yossman.net (December 29, 1996). 27 September 2010閲覧。