Search Details

Word: hack (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...course, there are some tricks one can employ in order to simply sidestep lack-of-content syndrome. I could write a meta-column about writing a column. However, any delusions of column grandeur would soon dissipate because this idea has been employed by every hack since the invention of language. Most scholars do not even bother to read Homer’s first work—10,000 tired lines of dactylic hexameter about a blind guy trying to write a timeless epic. Homer was able to learn from his mistake and went on to compose the legendary Odyssey...

Author: By Vali D. Chandrasekaran, CRIMSON STAFF WRITER | Title: {Untitled} | 4/5/2002 | See Source »

...Clifford Odets - once the great Red hope of the Group Theatre, now considered, too facilely, as a genius that Hollywood crushed into a hack - was hired to punch up the dialogue. And did he ever! On location in New York, writing scenes just before they were to be shot (he pulled all-nighters in his room at the Essex House, or sat in a production van, typewriter on his lap, while the actors froze outside), Odets gave flesh to Lehman's figures, then flayed them with the word-knives of a sadist surgeon. Every line parades its cutting cleverness, exposes...

Author: /time Magazine | Title: That Old Feeling: Sidneyland | 3/22/2002 | See Source »

...curling you have two key variables, one is weight—how hard you push the stone and how fast you come out of the hack,” Lincoln said. “The other thing is your line—whether you’re making a curl along the right trajectory. This weekend it just seemed like we’d make one shot and we’d either have the weight or the line...

Author: By Jessica T. Lee, CRIMSON STAFF WRITER | Title: Curling Gains Popularity, Club Travels to Nationals | 3/20/2002 | See Source »

...problem - for those who know what they're doing, IMEIs can be almost as easy to alter as they are to access. Although some operators already bar stolen handsets from their networks, others say IMEI-based measures are ineffective, because criminals with access to the right software can hack into stolen phones and change the serial number, possibly to duplicate a legitimate IMEI. Block-ing stolen IMEIs looks "like a nice gesture towards the customers, but has no real impact," says Petr Stoklasa of the Czech Republic's RadioMobil. He says RadioMobil will embrace IMEI-based measures once manufacturers come...

Author: /time Magazine | Title: A Call For Help | 3/4/2002 | See Source »

...goose the process along, Wagner decided to write a program called Replayer that lets people hack into their Replay 4000 and transfer files to their PC. Once the shows are in the computer, users are free to squeeze them down further, burn them onto a CD or DVD or trade them online. It took Wagner less than a week to crack the box's coding...

Author: /time Magazine | Title: The Pirates Of Prime Time | 2/25/2002 | See Source »

Previous | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | Next