Search Details

Word: encrypt (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Falun Gong is a techno-savvy group. It has a coterie of underground activists that stay in touch through encrypted e-mails and temporary mobile-phone numbers. Hacking into a cable network is as simple as hooking up a portable DVD player to one of the cable's unprotected transmission points. It takes about 10 min. and "everything they need is available at Radio Shack," says a foreign cable executive in China. There's not much the government can do except encrypt transmissions or lay state-of-the-art digital cable lines?both far too expensive solutions for rusting industrial...

Author: /time Magazine | Title: Starting Time | 3/11/2002 | See Source »

...Many sites don’t encrypt Webmail, which means your password and all your e-mail are travelling in clear text, and any hacker can get at them,” Davis wrote in an e-mail to the Winthrop House e-mail list...

Author: By Blythe M. Adler, CONTRIBUTING WRITER | Title: Web-Based E-mail in the Works | 12/13/2001 | See Source »

...Here's the idea: the new company, China Broadcast Satellite Transmission Co., will receive all foreign and domestic satellite feeds at a special government facility in Beijing. It will encrypt the signals, uplink them to a satellite and beam them down to the public. The objective is a double dose of control: the state will be the monopoly provider of satellite television broadcasting on the mainland, and foreign networks will have to pay to get their signals into China. In addition, authorities will be able to censor foreign satellite broadcasts with a simple push of a button...

Author: /time Magazine | Title: Tying Up the Tube | 7/30/2001 | See Source »

...open. Because nobody's going to take on AOL. [Note: As the parent of TIME.com, AOL Time Warner owns this article.] Realistically, technology is going to find a way to stay ahead - the RIAA is never going to be able to stop this from their end. You can't encrypt sound...

Author: /time Magazine | Title: The End of Napster As We Know It | 3/3/2001 | See Source »

...observed, between two sets of "codes." There's the legal code, or set of laws, that could end up endorsing file sharing or driving it into the criminal underworld, and there's the software writer's code, or computer instructions, that can create programs for sharing copyrighted information or encrypt files so they can never be shared...

Author: /time Magazine | Title: A Crisis of Content | 10/2/2000 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | Next