Search Details

Word: codes (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...pomp of the new Pope's appointment has passed, and that most anticipated churchcentric film, The Da Vinci Code, is still a year away. Fortunately, we're seeing a, well, mass of Catholic faith-based films and shows--including Kingdom of Heaven, starring a conflicted, crusading ORLANDO BLOOM--to keep audiences in the spirit...

Author: /time Magazine | Title: Popcorn Post-Passion | 5/8/2005 | See Source »

...Bush haters. But a comedy routine that was at times racy is a reminder that Laura is not a founding member of Focus on the Family. Whatever hard-core Democrats may imagine, she has never been a nodding Stepford wife. Her bookshelves contain Gore Vidal and The Da Vinci Code. In Austin, Texas, she had out-there, colorful friends like Kinky Friedman, the writer-musician who toured with his band the Texas Jewboys. She told TIME last year that she had no problem with a gay couple staying at the White House, although she wouldn't necessarily know their sexual...

Author: /time Magazine | Title: Stand-Up For Her Man | 5/8/2005 | See Source »

...37—Regan decides to use her powers for evil instead of good, printing an expose for The Vermillion on Kevin’s breaching of the TF moral code...

Author: By Amos Barshad, CONTRIBUTING WRITER | Title: Ivory Tower Saga Retold | 5/5/2005 | See Source »

...uncommon. HCS has suffered a handful over the past year, the web server for the Electrical Engineering and Computer Science (EECS) department has been similarly attacked, and the people.fas server, which holds student home pages, is at the very least vulnerable, if anyone is running poorly written code on it (and, surely, someone is). To be fair, these attacks aren’t terribly dangerous—barring deeper security problems, they can’t really do much more damage than messing up a few web sites, and clever configuration can even further limit the extent of the harm...

Author: By Matthew A. Gline, CRIMSON STAFF WRITER | Title: Anatomy of an Attack | 5/3/2005 | See Source »

They also don’t require much ingenuity on the part of the hacker—they tend to be based on publicized security flaws in widely used pieces of software. A company tells all users of their code that it’s broken in a particular way and should be updated, and then attackers do a Google search, find reams of out-of-date insecure code, and follow the bouncing ball. It’s a little like walking through a house mail center turning all the combination locks until you’ve found one whose...

Author: By Matthew A. Gline, CRIMSON STAFF WRITER | Title: Anatomy of an Attack | 5/3/2005 | See Source »

Previous | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 248 | 249 | 250 | 251 | 252 | 253 | 254 | 255 | Next