Word: hellos
(lookup in dictionary)
(lookup stats)
Dates: during 1980-1989
Sort By: most recent first
(reverse)
...Hello, Banana? Change money?" That sales pitch, unusually direct for China, was routinely delivered last week by jeans-clad youths outside Peking's Jianguo Hotel. The bananas, mostly imported from Ecuador, were the vendors' customary, and legal, merchandise. The offer to trade currency was neither normal nor legal-especially since the trade was 150 Chinese renminbi for 100 of the foreign-exchange certificates issued to non-Chinese that are officially valued...
...telephone answering machine subverts time: one leaves a surrogate self back in a little box at home, frozen in time, waiting to be roused by a ring: "Hello," one says, disembodied. "This is Carl. I'm sorry I can't come to the phone...
...machines can park words outside time. But there are situations in which that won't do. The Governor calls at one minute to midnight. Ring. Click. "Hello, this is Warden Parker. I'm attending an execution at the moment, but if you'll leave your . . . Or the President of the U.S. gets on the hot line and reaches the Kremlin's answering machine: "... So please just leave your message at the sound of the boom...
...York area of the national system that ties more than 1200 computers together into a setup open to about 150,000 paying customers. Accessing systems almost at random, the student gave the name set of standard answers to demands for password identification from the large computers on the network--hello, test, sysop--ht might type, as his screens filled with logos from systems thousands of miles away. Finally he hit the jackpot, Instead of a flat "password invalid" message the screen filled with additional information: how to open files, change the names of things, even rewrite the operating language...
...frequent password changes, and constant monitoring of computer users. "The lay thing to implementing the systems," says Jeff Gibson director of Security at Digital Equipment Company. "If people don't change the passwords then if a computer manufacturer is making xyz's and every xyz has a password of 'hello' and someone knows he's talking to an xyz than he can gain entry," he adds. "The biggest single problem is making people aware of the problem," Kay says...