Search Details

Word: computerize (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

The way the majority of World Wide Web services work, however, allows such information to pass unaltered throughout the Internet's cabling. Any computer connected to a cable used to transmit such information could then easily intercept it. And a user of such a computer could then proceed to wreak...

Author: NO WRITER ATTRIBUTED | Title: Elliot Shmukler's Tech Talk | 12/8/1998 | See Source »

Thus, although various computers on the Internet can still intercept the information you are transmitting, the encrypted nature of this information renders it meaningless. Attempts to decrypt the information, by anyone but the intended receiver, involves the commitment of years of computer time, frequently more years than the average human...

Author: NO WRITER ATTRIBUTED | Title: Elliot Shmukler's Tech Talk | 12/8/1998 | See Source »

SSL is a general technology, allowing the secure transmission of any information that is meant to be safe from prying Internet eyes. It is SSL, for example, that secures the transmission of the course grades you can retrieve from the Harvard Registrar's on-line site, thus making sure that...

Author: NO WRITER ATTRIBUTED | Title: Elliot Shmukler's Tech Talk | 12/8/1998 | See Source »

With the growth of the Internet as a major form of communication, millions of people across the world can now exchange ideas and transmit information via computer in a matter of seconds. However, the recent spate of hacker-related incidents at Harvard, and throughout the world, have students and administrators...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

"Hackers like to attack prominent targets like Harvard," Franklin "Frank" M. Steen, director of Harvard Arts and Sciences Computer Services, writes in an e-mail message. "We understand this, and security is a high priority."

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | Next