Search Details

Word: coded (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...organization that could capitalize on the potential of bootlegging ... There was enough intraorganizational feuding to fill a graveyard ... To stop the killing, said [the Mob's modern founding father Salvatore] Maranzano, the gangs ... would henceforth be recognized as families, each with its own territorial limits ... The organization's code of conduct [was] a combination of such qualities as manliness, honor and willingness to keep secrets. Its requirements have never changed. The penalty for breaching the code: death...

Author: /time Magazine | Title: Letters | 4/19/2004 | See Source »

...mails moving across the Internet—one out of every 12 e-mails processed—according to the e-mail-filtering firm MessageLabs. The virus launched a vengeance Denial of Service attack against the SCO Group, a company that has claimed ownership of some of the code used in open-source Linux distributions. With millions of computers sending token bits of data 12 times every second, Mydoom’s attack would have easily overrun SCO’s servers. But SCO just changed its domain name temporarily and avoided the Mydoom-mediated wrath of its pro-open...

Author: By Alex Slack, | Title: Byting Bagles | 4/13/2004 | See Source »

...found on systems it infected. The war had begun, and l33t h4x0Rs on both sides struck back in the only way they could: “Hey, NetSky, fuck off you bitch, don’t ruine our bussiness, wanna start a war?” read the internal code of a new Bagle variant...

Author: By Alex Slack, | Title: Byting Bagles | 4/13/2004 | See Source »

Soon Mydoom joined the verbal assault against Netsky in a new variant, Mydoom.G. Part of the internal code drew a poor comparison between Netsky and the “Skynet” of the Terminator movies: “imho, skynet is a decentralized peer-to-peer neural network. we have seen P2P in Slapper in Sinit only. they may be called skynets, but not your shitty...

Author: By Alex Slack, | Title: Byting Bagles | 4/13/2004 | See Source »

...cards, he and IBM engineer Franco Motika set about developing a new generation of smart cards. The recently patented, theftproof card contains a computer chip and features a tiny numerical keypad right on its face. The cardholder inputs a PIN, stored directly in the card's circuitry; the same code must be entered before each use. The PIN turns the card on and generates a unique one-time-only transaction code. For approval, that code has to synch with an algorithm run by the credit-card company's computer. The smart card isn't on the market...

Author: /time Magazine | Title: Money: A Card That Asks For ID | 4/12/2004 | See Source »

Previous | 292 | 293 | 294 | 295 | 296 | 297 | 298 | 299 | 300 | 301 | 302 | 303 | 304 | 305 | 306 | 307 | 308 | 309 | 310 | 311 | 312 | Next