Search Details

Word: logged (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Read the Complete Interrogation Log: From the TIME Archive Jun 20, 2005 Inside the Interrogation of Detainee 063To get the "20th hijacker" to talk, the U.S. used a wide range of tactics...

Author: /time Magazine | Title: Detainee 063: A Broken Man? | 3/2/2006 | See Source »

...taking a quick breather. This was most apparent Friday night, as the Crimson built a 22-13 lead over Penn, only to have the Quakers storm right back as Harvard substituted out its starters.That led Sullivan to stick with his starting five down the stretch, forcing each starter to log between 36 and 43 minutes, a key source of the fatigue that the Crimson experienced the following evening.“Regardless of whether you play at Penn or at Princeton first, the Friday night game is always the one that takes a lot of energy...

Author: By Michael R. James, CRIMSON STAFF WRITER | Title: Issues on Bench Cause Problems in Key Games | 2/26/2006 | See Source »

While males do come to Wellesley to party, Wellesley students log most of their partying hours off campus...

Author: By Alexandra M. Gutierrez, CRIMSON STAFF WRITER | Title: The Girls Next Door | 2/22/2006 | See Source »

...Facebook.com office. Having undergone a major facelift, the website now features photo album tools, friend connection descriptions, and the ever-exciting Pulse. Swell as all of these developments are, I have a proposal for Mr. Zuckerberg. Mark, something is missing from your website. Something big. Every time I log onto Facebook (read: 30-some times a day) and scroll through my own profile, I feel as though an enormous piece of me is absent. Sure, listed are my interests, my favorite music and movies, and my favorite quote, but an entire element of my personality is left out: my aversions...

Author: By Lucy M. Caldwell, | Title: Putting On a Face | 2/13/2006 | See Source »

...unique users as of December, there are certainly enough eyes out there.HOW SECURE IS YOUR PORN?In February 1995, The Crimson determined that it was possible to identify Harvard network users who were downloading pornography and to read the names of the files that they transferred. A computer service log file was accidentally made public through the Harvard network. The Crimson, accessing this file, found the names of 21 undergraduates and seven graduate students who had used the Harvard network to download pornography. In response to the investigation, Harvard tightened its network security and fixed the loophole in the system...

Author: By Adam P Schneider, CRIMSON STAFF WRITER | Title: How Much About You Is Out There? | 2/8/2006 | See Source »

Previous | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | Next