Word: hacker
(lookup in dictionary)
(lookup stats)
Dates: during 2000-2009
Sort By: most recent first
(reverse)
...starting March 16), the spin-off that is about to make them TV's unlikeliest leading men this side of Jeff Probst. Seven seasons ago, they assumed the comic-relief parts would be, at best, an occasional paycheck. "The first three years," says Haglund, 34, who plays snide computer hacker Langly, "I'd have a different set of glasses on each time, because I'd just throw them back into the prop bag." None of the trio have much recognition, or extensive resumes, outside the sci-fi series. "And then," Braidwood gamely offers, "there's the ugly factor." ("The unconventionally...
...Infamous hacker KEVIN MITNICK is forbidden by the terms of his prison release to use a computer or the Internet. But those hackers are a wily sort. Using his father as an agent, Mitnick has been conducting an online celebrity auction (if you consider a techno-felon a celebrity), selling off his cell phone for $355 and getting $510 for his TRS-80 computer. Geek love ran wild when Mitnick's prison ID card went up for sale; that's when eBay decided there might be some legal issues here. After the site stopped the auction and Yahoo and Amazon...
...read. Chad was the most looked-up word on merriam-webster.com last Friday. One possible derivation is from chat--small, white pieces of rock produced in lead mining. But what rock and paper have to do with each other (particularly without scissors) is unclear. Another theory, advanced by the New Hacker's Dictionary, is that chad stems from the "Chadless" paper punch, thought to be named after its inventor, that keeps the little pieces off the floor--ergo the pieces must be chad. "There is a legend that the word was originally acronymic," the dictionary adds, "standing for Card Hole Aggregate...
...stole passwords and credit card numbers; the MTX virus, on the other hand, destroys files and prevents a user from accessing certain websites. Even more dangerous than such worms, possibly, are Trojans. These virus-type programs allow someone else access to your computer. Once they're loaded on, the hacker can do almost anything with your system, from using it to hack other systems to opening new files from anywhere they choose to be. In the words of former Crimson editor Kevin S. Davis '96, Director of Residential Computing at Harvard, "If your computer starts acting like it's possessed...
...white pickup skids to a halt, the driver spotting a white-tailed doe and a buck in the brush off Sucker Creek Road in Alcona County. The deer are on private property, so if this hacker grabs his rifle and takes a shot, he's under arrest. Bob Mills, my partner, radios to our backups, Sergeant Pete Malette and Officer Warren MacNeill, who are hiding in a nearby grove. "We've got a looker," Mills tells them...