Search Details

Word: finger (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Because husc7 is a shared computer (more precisely, a UNIX machine), all I would need to do to determine cmhornby's identity is type "finger cmhornby." This is not a violation of Catharine's privacy, since by registering to have a user account she agreed to be added to the public database of users. Moreover, since address and phone information for students is part of the public record at Harvard, I could use the program "ph" (described in detail last semester in this column) to find out exactly where Catharine lives...

Author: By Eugene Koh, | Title: 'Net No Place for Privacy | 2/15/1995 | See Source »

...Yugoslavia for The Armour of God, he missed a tree branch, hit his head on a rock and almost died. Chan has a memento of the accident: a thimble-size hole in the right side of his head. If you ask nicely, he'll let you put your finger...

Author: /time Magazine | Title: JACKIE CAN! | 2/13/1995 | See Source »

...closure of some tunnels under the river as a precaution. But the exemption did not mean that Paris was ignoring the ordeals going on around it. The world's heaviest concentration of chattering raisonneurs were quick to join critics in the Low Countries and Germany to point the finger of blame. In their view, the great flood's archvillain was a usual suspect: overdevelopment...

Author: /time Magazine | Title: MAN THE DIKES! | 2/13/1995 | See Source »

...College should send e-mail messages to all network users to make them aware of the system's capabilities and failures, and of their own responsibilities within that system. In addition, if HASCS makes users aware that harmless commands such as 'finger' allow others to note their last log-in times, users will not have unrealistic expectations for complete network anonymity. Without articulating exactly what constitutes inappropriate behavior on the network, there is no standard by which any behavior can be judged...

Author: NO WRITER ATTRIBUTED | Title: HASCS Must Have Policy on Privacy | 2/8/1995 | See Source »

...although finger and last could be seen asan invasion of privacy, they were from days whenprivacy wasn't even an issue," Tarr says...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Previous | 341 | 342 | 343 | 344 | 345 | 346 | 347 | 348 | 349 | 350 | 351 | 352 | 353 | 354 | 355 | 356 | 357 | 358 | 359 | 360 | 361 | Next