Search Details

Word: files (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...either over the last eight years. Our government's duty is to protect the private information of the American people, not use it for political purposes. This is a serious matter that merits a complete investigation, and we demand to know who looked at Senator Obama's passport file, for what purpose, and why it took so long for them to reveal this security breach," said Obama campaign spokesman Bill Burton...

Author: /time Magazine | Title: Snooping Into Obama's Passport | 3/21/2008 | See Source »

...slowing your studious Internet endeavors, Selsby notes that Harvard is purposely tempering Internet related activities that “don’t have a direct academic purpose.”“There are certain types of applications which we specifically limit, like file-sharing apps,” he says. “If you don’t control that on our network, it will literally eat up the entire network. [...] Yes, those apps will run slowly, and that is by design.”In addition to trouble connecting in the first place, some students...

Author: By Vidya B. Viswanathan, CONTRIBUTING WRITER | Title: Reading the Signals | 3/19/2008 | See Source »

These losses are tough on all recipients, but the rank and file suffers most. Many top execs have been bailed out with supplemental grants and so-called reloads. What may be most interesting about this saga, though, is that after stock prices tumbled from 2000 to 2002 and another bull market was calving, broad-based stock-option plans began to fade. Some 8 million workers received grants in 2000; the number dropped to 3 million by last year, Kay says. The total value of grants has slipped by a third, says the NCEO...

Author: /time Magazine | Title: Consider Your Options | 3/13/2008 | See Source »

...those individuals.” The University has contracted the security firm Kroll Inc. to offer identity protection services, including credit reports and setting up fraud alerts. The hacker made a portion of the server’s contents available for download through a popular BitTorrent peer-to-peer file sharing site, “The Pirate Bay,” where users can easily obtain large files. The data made available through that site contained no personal information, Moriarty said, but the hacker would have had access to all the information on the server. Moriarty added that the server?...

Author: By Clifford M. Marks, CRIMSON STAFF WRITER | Title: Personal Data at Risk in Hack | 3/13/2008 | See Source »

...messages that still haven't been definitively authenticated - an audio file delivered to a specialized U.S. intelligence website, and a written communiqué to an Algerian daily - the Algerian group al-Qaeda in Islamic Maghreb (AQIM) claimed responsibility this week for kidnapping two Austrian tourists on Feb. 22. A man identifying himself as an AQIM spokesman said the couple - identified by Austrian media as Andrea Kloiber, 43, and Wolfgang Ebner, 51 - were in good condition, but warned that any armed attempt to free the captives would gravely imperil their lives...

Author: /time Magazine | Title: Al-Qaeda Threat to N. Africa Tourists | 3/13/2008 | See Source »

Previous | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | Next