Search Details

Word: coded (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...entryway crushes (code name: Salt...

Author: By Victoria C. Hallett, CRIMSON STAFF WRITER | Title: Room by Room: The Story of One Entryway | 6/8/2000 | See Source »

...Illingworth said FAS would be willing to invest money--on the order of $25,000--to bring the building up to code if it meant undergraduates would be able to use the space next year...

Author: By Joyce K.mcintyre, CRIMSON STAFF WRITER | Title: Struggling for Space: University Looks To Expand | 6/8/2000 | See Source »

Still, a DEA source theorizes, even as a mentor, Gravano "seems to have forgotten all he learned. He just did everything wrong. He used his own house for meetings and to store drugs. He used his own telephone without even trying to use code words. He drove a flashy Lexus that made him stand out. He left records of the transactions around. He used his wife to monitor the money and kids to run the operation. He prided himself on being a mobster. But he sure forgot what John Gotti taught...

Author: /time Magazine | Title: Happiness Is...A Pill?: Crime: Ecstasy In Arizona: A Cop and Bull Story | 6/5/2000 | See Source »

...front and bits of Velcro tape on the back. Called a "skimmer," the device can read and store the data embedded within a charge card's magnetic stripe--not only the name, number and expiration date that appear on the card's face but also an invisible, encrypted verification code that is transmitted electronically from merchant to card issuer to confirm a card's validity at the point of sale. By copying that code, the counterfeiter has all the data needed to create a perfect clone of the charge card...

Author: /time Magazine | Title: A New Credit-Card Scam | 6/5/2000 | See Source »

...journalists need to read a little more carefully. He said if it "can" be knocked out. It is feasible to engineer systems that are exceedingly difficult to knock out without incurring significant costs. The Love Bug exploits a system that was designed to encourage promiscuous behavior. Windows is a code-running slut, a code Casanova. JOHN KAWAKAMI Los Angeles...

Author: /time Magazine | Title: Letters: Jun. 5, 2000 | 6/5/2000 | See Source »

Previous | 464 | 465 | 466 | 467 | 468 | 469 | 470 | 471 | 472 | 473 | 474 | 475 | 476 | 477 | 478 | 479 | 480 | 481 | 482 | 483 | 484 | Next