Search Details

Word: foes (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...victory in the 126th playing of The Game last November. They were also fighting for relevance in the minds of the Crimson student body. For though Harvard-Yale weekend is historic in its own right, the Bulldogs can no longer be considered the Crimson’s most hated foe...

Author: By Christina C. Mcclintock, CRIMSON STAFF WRITER | Title: Big Red Usurps Yale As Top Rival | 2/17/2010 | See Source »

...peasant braid like a crown, became Yushchenko's Prime Minister, but disagreements between the two hindered their attempts to govern. When the financial crisis hit in 2008, wiping 50% off the Ukrainian currency's value in a few weeks, Yushchenko tried to disband Parliament to oust his foe. "It's depressing," said one Western banker at the time. "The economy is falling apart, and all he cares about is destroying Tymoshenko." Once seen as a Barack Obama figure with approval ratings topping 70%, the sitting President finished fifth in first-round voting on Jan. 17 with just...

Author: /time Magazine | Title: In Ukraine, the Death of the Orange Revolution | 2/3/2010 | See Source »

...Force wants the ability to burrow into any computer system anywhere in the world "completely undetected." It wants to slip computer code into a potential foe's computer and let it sit there for years, "maintaining a 'low and slow' gathering paradigm" to thwart detection. Clandestinely exploring such networks, the Dominant Cyber Offensive Engagement program's goal is to "stealthily exfiltrate information" in hopes it might "discover information with previously unknown existence." The U.S. cyberwarriors' goal: "complete functional capabilities" of an enemy's computer network - from U.S. military keyboards. The Army is developing "techniques that capture and identify data traversing...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

...will be too late for the U.S. to play defense (it takes 300 milliseconds for a keystroke to travel halfway around the world). Far better to be on the prowl for cybertrouble and - with a few keystrokes or by activating secret codes long ago secreted in a prospective foe's computer system - thwart any attack. Cyberdefense "never works" by itself, says the senior Pentagon officer. "There has to be an element of offense to have a credible defense...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

...take away your electricity, take away the radio, infect your phone," he explains. "Now you don't know where I'm coming from, or if you do, you can't tell the rest of your force what's going on." More insidiously, the U.S. can doctor the information the foe gets. "I can alter the messages coming across," he says...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | Next