Search Details

Word: hack (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...unspectacular $25.12. Just when Buy.com chief executive Gregory Hawkins should have been popping champagne corks, he was hunkering down in an emergency session with his techies. "I'm not going to kid you," says Hawkins. "My stomach did drop." That sinking-stock feeling spread the next day as the hack attack contributed to a market-wide sell...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

...1990s, after all, were a decade when first liberals, then conservatives, scored thrilling political victories, only to find those victories strikingly irrelevant to society at large. For 12 long years, Democrats watched Ronald Reagan and George Bush hack at the government safety net they held dear. Finally, in 1992, the party wrenched itself from its stupor, shook off its dead weight and found a winner. But when the Clintonites showed up for work, sleeves rolled up and ready to reverse years of trickle-down social policy, they received some bad news. In the post-cold war world, their new Wall...

Author: /time Magazine | Title: Will Politicians Matter? | 2/21/2000 | See Source »

With the level of frustration on both teams rising, a late hack by N.U. sophomore winger Willie Levesque started a goal-crease scuffle that left Harvard with four men in the box and the Huskies with a five-on-three advantage...

Author: By Timothy Jackson, SPECIAL TO THE CRIMSON | Title: Prestifilippo Shines in Beanpot Consolation Win | 2/15/2000 | See Source »

When a site has been hacked, its appearance is often altered by chest-beating hackers who leave the cyber equivalent of a "Kilroy was here" scrawl. This week's attacks, on the other hand, bombarded various high-traffic sites with an overflow of information, effectively shutting down normal operations. How do the perpetrators send so much data so quickly? Apparently, the most recent assaults are not typical denial of service pranks, which generally are sent from only one or two computers at a time. "These people scan the Internet for vulnerable systems, and they hack into those systems, and then...

Author: /time Magazine | Title: Classic Hackers Decry Heavy-Handed Upstarts | 2/9/2000 | See Source »

...team's new part-owner and president of basketball operations is putting his new squad through the paces. Taking his duties so far as to hack around with players, Jordan has taken a strong hand since his Jan. 19 arrival in the city...

Author: By Vasugi V. ganeshananthan, | Title: Mr. Jordan Goes to Washington | 2/4/2000 | See Source »

Previous | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | Next