Search Details

Word: finger (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Steen said that the "last" and "finger"commands are currently of greatest concern...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...Finger" is another Unix command that givessimilar information. It reports the name of thelast computer a student used and when they usedit...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...unlikely that the "finger" commandwill be altered anytime soon...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...Some commands are so entrenched into Unix thatyou just can't remove them," Gwertzman said. "Inorder to verify some users, World Wide Web serversfinger the person accessing them and they won'twork if finger doesn't work...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...there is some functionality with the lastand finger command--it's useful to see if someonelogged in since you sent them e-mail to see ifthey got it," Tarr added. "I don't know what todo...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Previous | 342 | 343 | 344 | 345 | 346 | 347 | 348 | 349 | 350 | 351 | 352 | 353 | 354 | 355 | 356 | 357 | 358 | 359 | 360 | 361 | 362 | Next