Word: coded
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
Advocating numerous tax cuts for families and the tripling of deductibles for children, Alexander touted his plan as a morally-conscious tax code...
...first, brief mission in space was a tube of applesauce he sucked through a straw. The shuttle offers a decidedly better bill of fare, including such delicacies as smoked turkey, Kona coffee and dried apricots. All the meals are sealed in plastic packets, each of which is coded with a colored dot to indicate which crew member it is intended for. The color code for Brown, the commander, is red; for Glenn, a payload specialist, it's purple. "The shrimp cocktail they fix is very, very good," says Glenn, "as good as what you'd get at Delmonico's. Curt...
...April 1997 a fully detailed plan complete with maps, diagrams and operational data had been drafted and printed in the form of a half-inch-thick booklet with an orange cover; code name: Operation Amber Star. It called for a two-pronged raid involving several hundred soldiers in which helicopter-borne French troops would "neutralize" the 30-man guard around Karadzic, while an elite U.S. commando force would move in and seize the suspect. Depending on the circumstances, those roles could be reversed. But such a hazardous operation could not proceed without head-of-state approval...
...based mailing list that tracks PC-security issues, and quietly reached some Microsoft techies. Ed Muth, who oversees security issues for Microsoft, says he's checking to see whether the company's response was tardy. Muth, by the way, disputes my thesis that fevered competition is causing half-baked code to be rushed out the door. A 10 million-line test failed to catch the bug, he says...
...heard about all the trouble with Microsoft's Outlook Express and Netscape Mail, the gaping holes in the code that might allow hackers to sneak in an attachment that screws up your PC. In desperation, you turned to the supposedly bug-free Eudora from Qualcomm. Now, on Friday, reports emerge that Eudora, too, can be transformed into a Trojan horse -- that hackers can write a nasty little Java Script program and disguise it as an HTML link. You click on the link and, in theory, bang goes your hard drive. What's a self-respecting e-mailer...