Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...down TIME.com poll popularity into three categories of voting results: the thousands, the tens of thousands, and the hundreds of thousands (and up). It's simple statistical penetration: How many web users come to a posted poll before one of them happens to be a serious -- and seriously skilled -- hacker? A mild-mannered TIME Daily poll such as "No more Independent Counsels?" fell into the first category -- fewer than 2,000 votes in its first week -- and it tantalized no intruders...

Author: /time Magazine | Title: When Robots Attack Online Polls: A Report on Ourselves | 2/26/1999 | See Source »

...entertainment-industry consulting firm. "Morality is what the community consensus decides is morality. And they're a tribe of cannibals out there." A typical consumer is American University freshman Jaymin Patel. "I've had MP3s for about two years now," he says. "I first learned about them from a hacker friend who told me I'd never have to buy a CD again...

Author: /time Magazine | Title: You've Got Music! | 2/22/1999 | See Source »

...disagree that these commands should be removed. By disabling commands, one reduces the ability of the network to function as intended. In addition, one can introduce a security hole in the system. For example, a hacker figures out my password and logs in to my account to run amok in the network. I use the "last" command to see when I last logged in, and I notice a location or time that I know I did not login. (One caveat--"last" only works on the current machine, for example, login4, so to be thorough, one must...

Author: NO WRITER ATTRIBUTED | Title: `Plea for Privacy' Misguided | 1/22/1999 | See Source »

...Hackers are very competitive about trying to break into the most difficult systems. A hacker who is able to break into a very secure and protected system is respected and considered to be a better hacker...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

...purpose of the hack was to protest the role Times reporter John. Markoff played in the imprisonment of hacker Kevin Mitnick...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | Next