Search Details

Word: gain (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...through the Visiting Director's Project (once every four semesters) and the HPT. Actors in Pudding shows interact with professional directors, choreographers, costume designers, music directors, vocal trainers, etc. The Pudding show is also the only long-run production during the year, as well as the only company to gain national attention (for its Actress and Actor-of-the-Year Awards). Actors gain experience, exposure and prestige from being in the show...

Author: By Matthew E. Johnson, | Title: Time to Put Women in Drag, Too | 12/10/1998 | See Source »

...that time of the year again--the time when city boulevards and student dorm rooms gain the peculiar glow of holiday lighting; the time when everything from our televisions to our radios becomes infected with the holiday spirit; the time when uncounted throngs of shoppers brave long lines in order to buy the perfect gift, or at least one that is merely good enough...

Author: NO WRITER ATTRIBUTED | Title: Elliot Shmukler's Tech Talk | 12/8/1998 | See Source »

Nearly two months ago, a hacker used the computer of an Eliot House resident to gain access to the user names and passwords of other Eliot House residents...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

...Changing your password is one of the most important things you can do to maintain the security of your own FAS e-mail account," Osterberg says. "Each insecure individual account is a weak link in the chain, which may allow a malicious outside user to gain access to our system. By doing what we can to maintain the security of the individual accounts, we increase the overall security of the system as a whole...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

...logging in as root, a person gains universal access to do whatever they want to the files on that server. For hackers, this generally entails first changing passwords, so that only they can gain access to the server, and then altering the site, while taking care to delete all the logs that might be used later on to identify them...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | Next