Search Details

Word: hacked (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...hardly deny that director Taylor Hackford (The Devil's Advocate) is a skilled craftsman (although I've always wondered how a filmmaker can make it when he has the word "hack" in his name). Proof of Life is a handsome and intelligent picture that's both paced and shot beautifully. The breath-taking, ultra-gritty finale, in which Thorne and his team of mercenaries attempt a daring rescue operation, is reminiscent of the best work of Michael Mann. And yet the finale is also the only point in the movie in which Hackford the storyteller is truly allowed to cast...

Author: By William Gienapp, CRIMSON STAFF WRITER | Title: JUNGLE BOOGIE: Meg Ryan and Russell Crowe Search for 'Proof of Life' | 12/8/2000 | See Source »

...Beach, Roberts has become for Democrats what Harris has become for Republicans. Says county commissioner Mary McCarty, a Republican: "She's the Joan of Arc of the Democratic Committee right now." Other names haven't been so lofty--if they are at all printable. "You are such a Democratic hack," wrote a woman in one of 3,000 e-mails sent to Roberts. "People are laughing at you all over...

Author: /time Magazine | Title: Punch-Out in Palm Beach | 11/27/2000 | See Source »

...hand, destroys files and prevents a user from accessing certain websites. Even more dangerous than such worms, possibly, are Trojans. These virus-type programs allow someone else access to your computer. Once they're loaded on, the hacker can do almost anything with your system, from using it to hack other systems to opening new files from anywhere they choose to be. In the words of former Crimson editor Kevin S. Davis '96, Director of Residential Computing at Harvard, "If your computer starts acting like it's possessed--mouse randomly moving, messages appearing on the screen, CD popping open, that...

Author: By Rohan R. Gulrajani, | Title: Computer Contagion | 11/20/2000 | See Source »

...when the president was viewed as commander in chief of a nation on constant alert. The end of the Cold War has left the U.S. uncertain of its interests and role in a wider world, and under those circumstances the nation's politicians have been inclined to hack away at the authority not only of Bill Clinton himself, but of the office he occupies. Presidential authority, of course, applies primarily to matters of foreign policy - the constitutional separation of powers has traditionally limited the executive branch's authority at home...

Author: /time Magazine | Title: Has America Become a Headless Superpower? | 11/14/2000 | See Source »

...fallout from last week's hack attack on Microsoft just gets more embarrassing for BILL GATES & Co., especially given the part played by the company's software. The unidentified intruders were able to root around inside Microsoft's network for six weeks, steal passwords and sneak looks at the vital source code for future (not current) products, using a Trojan-horse virus called QAZ that's written in a Microsoft programming language (Visual C++). The pilfered passwords were sent to an e-mail address registered in St. Petersburg, Russia, through Hotmail--another Microsoft service. Even worse, Vincent Gullotto, head...

Author: /time Magazine | Title: Where Do Today's Hackers Want to Go? Microsoft | 11/6/2000 | See Source »

Previous | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | Next