Search Details

Word: clean-cut (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...students at Kilgore College and members of Phi Theta Omega. Joey Johnson had been "Mr. Overton High School" in his senior year. David Maxwell, president of the fraternity, worked at the chain restaurant to put himself through college and support his pregnant wife. Friends remembered Monty Landers as a "clean-cut, good guy." Landers, the only victim not employed by Kentucky Fried Chicken, and Maxwell, who was off duty, had dropped in after 10 p.m. to pick up their fraternity brother Johnson...

Author: /time Magazine | Title: Texas Massacre | 10/10/1983 | See Source »

...Good to see those clean-cut men instead of those dirty hippies...

Author: /time Magazine | Title: At Liberty but All Keyed Up | 7/4/1983 | See Source »

...only presence with the posture of a T square. Standing there on Duval Street, where most of the bars are, how you longed to grow your hair. And yet there was the chief of police telling reporters, "It feels good to look down Duval and see those clean-cut men instead of those damn dirty hippies we always...

Author: /time Magazine | Title: At Liberty but All Keyed Up | 7/4/1983 | See Source »

...complexion who swills soft drinks, lives on candy bars and spends most of his waking hours in front of a terminal, playing games or trying to penetrate Defense Department networks. (So far as is known, no one has succeeded in breaching a classified Pentagon system.) Dress ranges from the clean-cut, Ken-and-Barbie look to the torn jeans and tie-dyed couture of the Woodstock generation. Beards and glasses are popular hacker accessories...

Author: /time Magazine | Title: In Pittsburgh, Hacking the Night Away | 5/9/1983 | See Source »

...years ago Vince Fuller, a clean-cut C.M.U. junior known then as a computer prankster, used his terminal to sneak into Columbia University's computer system via an electronic link between the two schools. He could have damaged Columbia's main computer by exploiting a "bug," or error, in the operating system, but instead he quickly notified authorities of the problem. Two months ago a more diabolical hacker broke into C.M.U.'s DEC-20 system and misused an authorization code to destroy student, faculty and researcher files. It took university programmers 23 hours to restore the lost...

Author: /time Magazine | Title: In Pittsburgh, Hacking the Night Away | 5/9/1983 | See Source »

Previous | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | Next