Search Details

Word: hacks (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...blur in this hypnotic story of Scottish jazz trumpeter Joss Moody, who, like the real Billy Tipton, is shockingly discovered after his death to have been a woman. Told from the point of view of his grief-stricken widow Millie, his adopted son Colman and Sophie Stones, a tabloid hack hot on Moody's trail, Trumpet is about the walls between what is known and what is secret. "Every person goes about their life with a bit of perversion that is unadmittable, secretive, loathed," Kaye writes. Marred by a central inconsistency--could Joss Moody have been both such a wonderful...

Author: /time Magazine | Title: Books: Trumpet By Jackie Kaye | 4/19/1999 | See Source »

...scroll down the list far enough, hundreds of entries deep, and you'll find this hidden Rosebud of cyberspace: "Enquire Within Upon Everything"--a nifty little computer program written nearly 20 years ago by a lowly software consultant named Tim Berners-Lee. Who knew then that from this modest hack would flow the civilization-altering, millionaire-spawning, information suckhole known as the World Wide...

Author: /time Magazine | Title: Network Designer Tim Berners-Lee | 3/29/1999 | See Source »

They say that one sign of a good cook is being a good eater. By that measure, I should be a very good cook. Instead, I'm a hack in the kitchen. Every meal I make starts with a package of boneless, skinless chicken breasts or a box of pasta (or both). One summer I got my roommate sick by cooking week-old chicken. I learned all I know about cooking from "The Frugal Gourmet" and "Great Chefs" on TV. (Those were the bad old days before Emeril and the Food Network...

Author: By Andrew S. Chang, | Title: My Favorite Class at Harvard | 3/24/1999 | See Source »

...dress code is business casual--no jeans allowed, not to mention pierced noses. It's the first day of class--hacking class--and the instructors, smartly attired in matching corporate polo shirts, point at screens full of code and step-by-step directions on how to hack a host computer. "Get this: No username, no password, and we're connected," says one. "I'm starting to get tingles. They're going to be toast pretty quick." Geekspeak, at least, is still de rigueur...

Author: /time Magazine | Title: Cracking The Code | 3/22/1999 | See Source »

...easy is it to hack? If these guys can teach a novice like me how to break through a firewall, I figure, then all our networks are in trouble. Guess what? All our networks--at least, the ones without encryption keys or extremely alert administrators--are in trouble. Why? Because this is the information age, and the average computer gives up far too much information about itself. Because a network is only as strong as its weakest user. And because the most common log-on password in the world, even in non-English speaking countries, is "password." With users like...

Author: /time Magazine | Title: Cracking The Code | 3/22/1999 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | Next