UNIX éçºè ã®ä¸äººã§ãã Ken Thompson ãåæã® UNIX ã«ããã¯ãã¢ãä»æãã¦ããã¨è¨ããã¦ããé称 Thompson hack ãèªä½Cã³ã³ãã¤ã©ã§åç¾ãã¦ã¿ã¾ããã Thompson hack 㯠UNIX ã®ãã°ã¤ã³å¦çã®ã³ã³ãã¤ã«æã«ããã¯ãã¢ãä»æãããããªã³ã³ãã¤ã©ãä½ããããã«ã³ã³ãã¤ã©ã®ã½ã¼ã¹ã³ã¼ããããã®çè·¡ãæ¶ãå»ãã¨ããç¥æ¥ã§ãã å ãã¿ã¯ Reflections on Trusting Trust ã¨ãã1983å¹´ã« Ken Thompson ã Dennis Ritchie ã¨å ±ã«ãã¥ã¼ãªã³ã°è³ãåè³ããéã®è¨å¿µå ¬æ¼ã§ãã Ken Tohmpson ã¯ãã®ç´°å·¥ãããã³ã³ãã¤ã©ãé å¸ãããã¨ã¯ãªãã¨ä¸»å¼µãã¦ããããã§ããããã®ããã¯ãã¢ãå©ç¨ããã¨è¦ãããä¸å¯©ãªãã°ã¤ã³ããã£ãã¨ããå ±åããã£ãã¨ã®ãã¨ã§ãå®éã«ã¯ãã«ç 究æã®å¤é¨ã«é å¸ããã¦ãã
{{#tags}}- {{label}}
{{/tags}}