Search Details

Word: logins (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...most of the time, your computer only views what is intended for it. However, there are tools that allow access to all network traffic on a subnet. Such a technique is referred to as IP-sniffing, and if put to malicious use someone can, for example, collect all the login information flying across the subnet...

Author: NO WRITER ATTRIBUTED | Title: BARATUNDE R. THURSTON'S TechTalk | 9/29/1998 | See Source »

...addition to preventing students from deleting software, a Windows NT system makes bypassing the network login impossible and makes crashes less likely, Steen said...

Author: NO WRITER ATTRIBUTED | Title: Harvard Gets Windows 98 | 7/10/1998 | See Source »

...name which fit nicely into the eight-character limit for accounts on the FAS network's operating systems. My request was denied because my full name is Jennifer and not Jenny. I was told that HASCS changed e-mail accounts only on certain occasions--for example, when the resulting login name was a profane word in another language...

Author: By Jennifer . Lee, | Title: Me and My Number | 3/9/1998 | See Source »

...hardware restructuring now allows technicians to change the size and configuration of the system, allowing repair to begin without a system shutdown and the number of login machines grew from four...

Author: By Scott A. Resnick, CONTRIBUTING WRITER | Title: FAS Server Shut Down To Fix Slower E-Mail | 12/11/1997 | See Source »

...Even if I am checking e-mail, by just typing my login name, I start to have pain and have to put on my braces," she says...

Author: By Rachel K. Sobel, CONTRIBUTING WRITER | Title: Coping With RSI on Campus | 12/2/1997 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | Next