Search Details

Word: logged (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

There are some things that just bug the heck out to me. For instance, I hate it when people wear dirty shoes into my bedroom. And I hate it when it takes forever to log on to one of the Science Center mainframes because every computer science course has a problem set due at the same time...

Author: By Tehshik P. Yoon, | Title: A Dangerous Form Of Tolerance | 5/18/1994 | See Source »

...first two instrumental discs, one dealingwith 50s and one with 60s, are good and fun, butnot great. Most of the tracks log in at adisappointingly short two minutes, and some of theselections seem devoid of any musical explorationat all. Still, each disc contains some pearls: theDuane Eddy (with his Twangy Guitar) tracks on the50s disc kick ass (the disc also contains"Tequila" of Pee-Wee's Big Adventure fame), andThe Rebels' "Wild Weekend" from the 60s disc makesyou want to shuffle on down to your local frathouse (or wherever it was that college-types wentto party in the early...

Author: By Seth Mnookin, | Title: Of Tango, Bluegrass, and surf Music... | 4/7/1994 | See Source »

While frequent enough to cause alarm, break-inslike the ones on McAfee's account are not the mostcommon form of security violations, Kim, thecomputer society president, says violations oftenoccur after a person has left a computer andforgotten to log out--leaving all personal filesavailable for inspection...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...addition, Kim says that by placing a specialtext file in another person's account, an intrudercan log in whenever he wants...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...People can mess around with other people'saccounts without them knowing," says Rolland W. Ho'97, the business manager of the Harvard ComputerSociety. "If you forget to log out, people canleave hidden files in your account which willredirect your e-mail...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

Previous | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | Next