´ÙÀ½ ÀÌÀü Â÷·Ê

2. Âü°í ÀÚ·á(Related Reading)

À¥¿¡¼­ Âü°íÇÑ ¹®¼­´Â ``What to do when Tk says that your display is insecure'', http://ce-toolkit.crd.ge.com/tkxauth/ÀÌ´Ù. Kevin Kenny¿¡ ÀÇÇؼ­ ¾²¿©Á³´Ù. ÀÌ ¹®¼­¿¡ ¿¢½º À©µµ¿ì ÀÎÁõ(Xauth)¿¡ ´ëÇÑ ºÎºÐ°ú À¯»çÇÑ ÇØ°áÃ¥À» Á¦¾ÈÇÑ´Ù. ±×·¯³ª, KevinÀº ´ç½Å¿¡°Ô XauthÀ» ¼³¸íÇÒ¶§ xdmÀ» ÀÌ¿ëÇÏ´Â °æ¿ì¿¡ ´õ ¸¹ÀÌ ÁßÁ¡À» µÐ´Ù.

O'Reilly and Associates·ÎºÎÅÍ ÃâÆÇµÈ X Window System Vol. 8 ``X Window System Administrator's Guide'' ¶ÇÇÑ Á¤º¸ÀÇ Ãâó·Î½á ³ªÀÇ ÁÖÀǸ¦ ²ø¾î¿Ô´Ù. ºÒÇàÇÏ°Ôµµ, ³ª´Â ±×°ÍÀ» ´Ù ÀÐÀ» ¼ö ¾ø´Â »óÅ¿¡ ÀÖ´Ù.

´Ù¸¥ ¹®¼­´Â, ´ç½ÅÀÌ Áö±Ý ´çÀå ÀÐÀ¸·Á¸é http://ciac.llnl.gov/ciac/documents/ciac2316.html¿¡¼­ ±¸ÇÒ ¼ö ÀÖ´Â, ``Securing X Windows'' ¶õ Á¦¸ñÀÇ ¹®¼­¸¦ ¹«Ã´ ÁÁ¾ÆÇÑ´Ù.

comp.windows.x, comp.os.linux.x, comp.os.linux.networking°ú °°Àº À¯Áî³Ý ´º½º±×·ìµé¿¡µµ Àß °®Ãß¾îÁ® ÀÖÀ½À» ¾Ë±â ¹Ù¶õ´Ù.


´ÙÀ½ ÀÌÀü Â÷·Ê