Word: codes
(lookup in dictionary)
(lookup stats)
Dates: during 1980-1989
Sort By: most recent first
(reverse)
They took away a lot more than a piece of low-cost software. Hidden in nearly every disk was an extra program not supplied by any manufacturer: a snippet of computer code many consider to be the world's most sophisticated computer virus. Every time an unsuspecting user lent his new disk to a friend or colleague, and every time the disk was run on a machine shared by other users, the code spread from one computer to another. Before long, the so- called Brain or Pakistani virus had found its way onto at least 100,000 floppy disks, sometimes...
...arms control has been such a central element in superpower relations. Attempts to reconcile the deeper political disputes over the relationship between the individual and the state -- or between the Soviet state and the rest of the world -- have always failed. For example, in 1972 the superpowers signed a "code of conduct" in Moscow that included a commitment by each side not to "obtain unilateral advantage at the expense of the other." Leonid Brezhnev & Co. made a mockery of that agreement by pouring Cuban proxies into Angola and military advisers into Ethiopia. The Soviet Union has traditionally defined...
...already partially demonstrated -- willingness to use diplomacy and political maneuver, rather than the threat of force, to advance Soviet interests. Unlike 1972, when the Soviets' expansionist deeds contradicted their accommodationist words, the next few years -- and perhaps the next summit -- may offer an opportunity to formulate a meaningful, sustainable code of conduct...
...virus, whether biological or electronic, is basically an information disorder. Biological viruses are tiny scraps of genetic code -- DNA or RNA -- that can take over the machinery of a living cell and trick it into making thousands of flawless replicas of the original virus. Like its biological counterpart, a computer virus carries in its instructional code the recipe for making perfect copies of itself. Lodged in a host computer, the typical virus takes temporary control of the computer's disk operating system. Then, whenever the infected computer comes in contact with an uninfected piece of software, a fresh copy...
Bennett's code of decorous departure...