Search Details

Word: finger (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...secondary roles are competently filled. Coventry Edwards-Pitt as the matronly Zita has a strong voice with just a touch of roughness. A hunched-over, finger-wagging Steven R. Bocchino plays an appropriately avuncular Simone...

Author: By John D. Shepherd, | Title: Dunster House Scales Puccini | 2/23/1995 | See Source »

Because husc7 is a shared computer (more precisely, a UNIX machine), all I would need to do to determine cmhornby's identity is type "finger cmhornby." This is not a violation of Catharine's privacy, since by registering to have a user account she agreed to be added to the public database of users. Moreover, since address and phone information for students is part of the public record at Harvard, I could use the program "ph" (described in detail last semester in this column) to find out exactly where Catharine lives...

Author: By Eugene Koh, | Title: 'Net No Place for Privacy | 2/15/1995 | See Source »

...Yugoslavia for The Armour of God, he missed a tree branch, hit his head on a rock and almost died. Chan has a memento of the accident: a thimble-size hole in the right side of his head. If you ask nicely, he'll let you put your finger...

Author: /time Magazine | Title: JACKIE CAN! | 2/13/1995 | See Source »

...closure of some tunnels under the river as a precaution. But the exemption did not mean that Paris was ignoring the ordeals going on around it. The world's heaviest concentration of chattering raisonneurs were quick to join critics in the Low Countries and Germany to point the finger of blame. In their view, the great flood's archvillain was a usual suspect: overdevelopment...

Author: /time Magazine | Title: MAN THE DIKES! | 2/13/1995 | See Source »

...College should send e-mail messages to all network users to make them aware of the system's capabilities and failures, and of their own responsibilities within that system. In addition, if HASCS makes users aware that harmless commands such as 'finger' allow others to note their last log-in times, users will not have unrealistic expectations for complete network anonymity. Without articulating exactly what constitutes inappropriate behavior on the network, there is no standard by which any behavior can be judged...

Author: NO WRITER ATTRIBUTED | Title: HASCS Must Have Policy on Privacy | 2/8/1995 | See Source »

Previous | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | Next