Word: hack
(lookup in dictionary)
(lookup stats)
Dates: during 2000-2009
Sort By: most recent first
(reverse)
...every primary there is a moment of revelation, and in South Carolina mine came the day I grabbed my bags and jumped off George W. Bush's bus. Most media hacks listen to the same speech three times daily, delivered ad nauseam to the 2% of the population that shows up at political rallies. But this hack was curious about the other 98%, and so I wandered into coffeehouses and barbecue joints, and eventually I came upon a place the Zagat restaurant guide missed altogether--the Roadkill Grill...
...unspectacular $25.12. Just when Buy.com chief executive Gregory Hawkins should have been popping champagne corks, he was hunkering down in an emergency session with his techies. "I'm not going to kid you," says Hawkins. "My stomach did drop." That sinking-stock feeling spread the next day as the hack attack contributed to a market-wide sell...
...1990s, after all, were a decade when first liberals, then conservatives, scored thrilling political victories, only to find those victories strikingly irrelevant to society at large. For 12 long years, Democrats watched Ronald Reagan and George Bush hack at the government safety net they held dear. Finally, in 1992, the party wrenched itself from its stupor, shook off its dead weight and found a winner. But when the Clintonites showed up for work, sleeves rolled up and ready to reverse years of trickle-down social policy, they received some bad news. In the post-cold war world, their new Wall...
With the level of frustration on both teams rising, a late hack by N.U. sophomore winger Willie Levesque started a goal-crease scuffle that left Harvard with four men in the box and the Huskies with a five-on-three advantage...
When a site has been hacked, its appearance is often altered by chest-beating hackers who leave the cyber equivalent of a "Kilroy was here" scrawl. This week's attacks, on the other hand, bombarded various high-traffic sites with an overflow of information, effectively shutting down normal operations. How do the perpetrators send so much data so quickly? Apparently, the most recent assaults are not typical denial of service pranks, which generally are sent from only one or two computers at a time. "These people scan the Internet for vulnerable systems, and they hack into those systems, and then...