Word: lone
(lookup in dictionary)
(lookup stats)
Dates: during 2000-2009
Sort By: most recent first
(reverse)
...many Israelis, Saturday's killings recalled the assassination of Prime Minister Yitzhak Rabin in November 1995, when a lone shooter capped months of hate-filled rhetoric against Israel's elder statesman by gunning him down as he left a peace rally in the same city. "The pistol did not act on its own, the gunman did not act on his own - what stood behind him was incitement and hatred," Labor lawmaker Shelly Yachimovich said at an impromptu gathering near the site of the shootings on Sunday, consciously echoing comments made after Rabin's assassination...
...seated until the music motivated her to begin. Once she took the stage, the others concentrated on her movements and kept time according to her lead, with a complex rhythmic pattern emerging from the clapping, finger snapping, and lighting quick clicking of their heels. Interwoven through it all, the lone female singer called plaintively...
...right next door to a licensed ammunition dealer, across the street from a well-kept park with a picket fence. A few kids shoot hoops nearby at a shabby basketball court whose bent rims possibly never even had nets. Somewhere in the direction of the town's lone evangelical church, a weed-whacker hums...
...right there." No chance for tickets, now. A crowd of people—including us—shrug shoulders and kick the dirt. Most pack up, disperse. Jun spots a friend and I encourage her to wrangle his extra ticket. Hey, it's a tough world and the lone wolf survives. No luck...
Then there's the nature of the attacks: crude and essentially harmless. Cyberexperts call them denial-of-service (DOS) attacks, because they do no more harm than slow down or temporarily shut down networks. No sensitive government network was affected: the hackers (or lone hacker, since this could easily be the work of one person) only went after unrestricted, so-called public-facing sites. The assumption among some cyberexperts is that such unsophisticated attacks must come from an unsophisticated source...