Search Details

Word: exploiter (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

GINGRICH: Who is screaming? If the ones screaming are the school-lunch association, who want their annual trip to Washington, don't let them exploit children as the excuse for their trip...

Author: /time Magazine | Title: THE PARALLEL IS F.D.R. | 4/10/1995 | See Source »

Possibly lost in the rising tide of rhetoric is the potential for much consensus between both parties. Both parties want to increase jobs. Both recognize the poor shape of the American job machine relative to its historical performance in past expansions and recessions. The best way to exploit this fertile common ground may be a recapitulation by the Clinton Administration of the educational tax cut as a retooled and newly-labeled 'human capital (gains) tax cut' complemented by other measures to increase its effectiveness...

Author: By Peronet DESPEIGNES Jr., | Title: Cut the Human Capital Tax | 3/22/1995 | See Source »

...also said that in some instances, America must exploit its national power to advance the cause of human rights...

Author: By Joe Mathews, | Title: Panels Highlight Human Rights | 3/13/1995 | See Source »

...long been accused of shady practices, including diversion of public funds for his own use. There are also suggestions, as yet unproved, that each man knew about the illicit dealings of the other; whoever emerged on top of the postelection pile would be in a position to exploit his information to destroy his rival. When Ruiz Massieu was killed, he was the No. 2 official in the P.R.I. and slated to become party leader in the Chamber of Deputies...

Author: /time Magazine | Title: THE SPREADING SCANDAL | 3/13/1995 | See Source »

SPOOFING: This is a technique for getting access to a remote computer by forging the Internet address of a trusted or "friendly" machine. It's much easier to exploit security holes from inside a system than from outside; the trick is to gain "root" status, the top-level access that the computer's administrator enjoys. With root status, a hacker could install a password sniffer or bogus software, like a "back door"-a secret return path into the machine. Mitnick was able to break into Shimomura's Fort Knox-like computer using a spoof...

Author: /time Magazine | Title: CRACKS IN THE NET | 2/27/1995 | See Source »

Previous | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | Next