Search Details

Word: hack (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...dress code is business casual--no jeans allowed, not to mention pierced noses. It's the first day of class--hacking class--and the instructors, smartly attired in matching corporate polo shirts, point at screens full of code and step-by-step directions on how to hack a host computer. "Get this: No username, no password, and we're connected," says one. "I'm starting to get tingles. They're going to be toast pretty quick." Geekspeak, at least, is still de rigueur...

Author: /time Magazine | Title: Cracking The Code | 3/22/1999 | See Source »

...easy is it to hack? If these guys can teach a novice like me how to break through a firewall, I figure, then all our networks are in trouble. Guess what? All our networks--at least, the ones without encryption keys or extremely alert administrators--are in trouble. Why? Because this is the information age, and the average computer gives up far too much information about itself. Because a network is only as strong as its weakest user. And because the most common log-on password in the world, even in non-English speaking countries, is "password." With users like...

Author: /time Magazine | Title: Cracking The Code | 3/22/1999 | See Source »

Meanwhile, Janowski had her way inside against an undersized Columbia squad. Despite only attempting nine shots, the senior center hit five of those and went 6-of-8 from the charity stripe when the Lions had no choice but to hack at her. Janowski also pulled down six rebounds...

Author: By Eduardo Perez-giz, SPECIAL TO THE CRIMSON | Title: W. Hoopsters Slip Again; Title Almost Gone | 2/16/1999 | See Source »

...anything, and we may be married. Write on both sides of the page--single bluebook finals look like less work to grade and win points. This chic, shaded calligraphic script so many are affecting lately is handsome, and is probably worth a good extra five points if you can hack...

Author: NO WRITER ATTRIBUTED | Title: A Grader's Reply | 1/15/1999 | See Source »

...purpose of the hack was to protest the role Times reporter John. Markoff played in the imprisonment of hacker Kevin Mitnick...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | Next