Search Details

Word: hack (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Cooper says the town gossips didn't bother themmuch. The two friends spent many afternoons aloneat the Shawnee Bend golf course, playing thenine-hole layout. "At the beginning at least, wewere hack golfers, though Brad was on the highschool team. It was a good break from the rurallife...

Author: By Joe Mathews, | Title: Shooting To the Right | 6/8/1995 | See Source »

...Leer, who as a fledgling writer excites his protective instincts. Grady and James share what Grady calls the "midnight disease" of the writer, a sense of their own strangeness that isolates them from the world. This dark side of writing is introduced in the person of Albert Vetch, a hack horror writer whose suicide Grady witnessed as a child. Vetch floats over the book as a symbol of the true artist, the estate to which Grade aspires: "He was the first real writer I knew, because he was the first to have the midnight disease; to have the rocking chair...

Author: By Adam Kirsch, | Title: Chabon's Wonder Boys Romps Through the Absurd | 4/6/1995 | See Source »

...turncoat Aldrich Ames was uncovered, the Directorate took its E-mail address list off the main computer system, fearing that future moles could browse through it to identify case officers. (Fortunately for the cia, Ames told agency investigators after he was captured that the Russians never asked him to hack the system, mainly because his computer-illiterate handlers were clueless about...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...audited for suspicious activity, such as an unusual number of log-ins after hours or repeated failures to have a password accepted, usually symptomatic of a hacker testing out a host of computer-generated passwords. During their first polygraph, job applicants are now asked if they've ever tried hacking. The agency will also stage "red-team" exercises, during which computer experts try to hack the system from terminals in the building, probing for weaknesses...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

Cyber bandits keep probing nonetheless. TIME has learned that CIA security officers have caught at least half a dozen agency employees and contractors who on a lark have tried to hack parts of the agency's computer system that are closed off to them. A hacker from Canada almost daily tries to break past the CIA's Internet link to get to the agency's secret files. He once used the password "Clinton," thinking that would give him access to any secret. It didn't. "We know who he is," a CIA official said with a smile. "But there...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

Previous | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | Next