Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...read. Chad was the most looked-up word on merriam-webster.com last Friday. One possible derivation is from chat--small, white pieces of rock produced in lead mining. But what rock and paper have to do with each other (particularly without scissors) is unclear. Another theory, advanced by the New Hacker's Dictionary, is that chad stems from the "Chadless" paper punch, thought to be named after its inventor, that keeps the little pieces off the floor--ergo the pieces must be chad. "There is a legend that the word was originally acronymic," the dictionary adds, "standing for Card Hole Aggregate...

Author: /time Magazine | Title: Ask Dr. Notebook | 11/27/2000 | See Source »

...stole passwords and credit card numbers; the MTX virus, on the other hand, destroys files and prevents a user from accessing certain websites. Even more dangerous than such worms, possibly, are Trojans. These virus-type programs allow someone else access to your computer. Once they're loaded on, the hacker can do almost anything with your system, from using it to hack other systems to opening new files from anywhere they choose to be. In the words of former Crimson editor Kevin S. Davis '96, Director of Residential Computing at Harvard, "If your computer starts acting like it's possessed...

Author: By Rohan R. Gulrajani, | Title: Computer Contagion | 11/20/2000 | See Source »

...white pickup skids to a halt, the driver spotting a white-tailed doe and a buck in the brush off Sucker Creek Road in Alcona County. The deer are on private property, so if this hacker grabs his rifle and takes a shot, he's under arrest. Bob Mills, my partner, radios to our backups, Sergeant Pete Malette and Officer Warren MacNeill, who are hiding in a nearby grove. "We've got a looker," Mills tells them...

Author: /time Magazine | Title: Bambi's Got A Little Secret | 11/13/2000 | See Source »

...sugary tea in Beirut's Shi'ite Muslim stronghold. But the 38-year-old self-taught Webmaster is holed up in a secret office where the Lebanese Islamic group Hizballah operates an Internet site that blasts propaganda against Israel. With a four-person staff, Hussein is fending off a hacker assault launched by Israelis. "They're going after us!" proclaims Hussein, who loads software designed to deflect the bulk messages that become e-mail bombs when they reach Hizballah's Web address...

Author: /time Magazine | Title: Hizballah Returns to a Dangerous Business | 11/6/2000 | See Source »

...mentality, an us-vs.-them attitude toward the record labels and the press that has forced Fanning to retreat even farther into his shell. He has to monitor carefully what he says to whom and even what clothes he wears. "The cdc [the Cult of the Dead Cow, a hacker collective] guys sent me a shirt, and the lawyers told me I shouldn't wear it," he says. "It's just so tightly controlled...

Author: /time Magazine | Title: Meet the Napster | 10/2/2000 | See Source »

Previous | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | Next