Search Details

Word: logs (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...existence of the log file is the mostdramatic example of on-line activities beingpublic, but there at least six other ways in whichusers can monitor others' activities...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Because many students now log in from thestudent network, the name of the machine fromwhich they are connecting is likely to be the nameof a machine in a student's dorm room...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...against that," said Kim, a formerpresident of HCS. He says that Steen is dealingresponsibly with privacy issues and called theavailability of the log file an "honest mistake...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Currently the names of the files studentsdownloaded are still in the log file, though theycan only be read by someone with "super user"privileges...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...making the [log file] not readable,"Steen said this week. "But I don't know whatimpact that will have. It may affect somethingelse that needs it. We'll have to wait...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Previous | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | Next