Search Details

Word: kim (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...very simple to send fake e-mail toanyone," says Eugene E. Kim '96, president of theHarvard Computer Society. "I would say it's fairlycommon. Most people don't do it maliciously--ittends to be more of a practical joke than anythingelse. It's very easy to do if you know...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

While frequent enough to cause alarm, break-inslike the ones on McAfee's account are not the mostcommon form of security violations, Kim, thecomputer society president, says violations oftenoccur after a person has left a computer andforgotten to log out--leaving all personal filesavailable for inspection...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...addition, Kim says that by placing a specialtext file in another person's account, an intrudercan log in whenever he wants...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...system administrators at Harvard can readevery person's e-mail over the [network] and a lotof people don't realize this," Kim says. "That's abig issue that's going to grow a lot bigger asmore and more people sign up and get accounts...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...biggest problem is the lack of awarenesson the part of Harvard's Ad Board," Kim says. "Ifyou don't understand how the computer works,you're not going to understand a lot of thecontext of the ethical issues...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

Previous | 815 | 816 | 817 | 818 | 819 | 820 | 821 | 822 | 823 | 824 | 825 | 826 | 827 | 828 | 829 | 830 | 831 | 832 | 833 | 834 | 835 | Next