Search Details

Word: filewith (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...resubject to all sorts of scrutiny. People depend onus."DesignBenjamin I. LimaTracking Compute Usage Until yesterday, itwas possible for any student with a computeraccount to view the system's log file, whichrecords the names of files users transfer andpeople they email. This is a copy of a log filewith the specific details altered...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

| 1 |