Search Details

Word: master (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...cereal box sound philosophical - or at least as if he thought they were. From his 1978 spoken-word rendition of Elton John's "Rocket Man" to his latest lyrical spoof of Sarah Palin's farewell speech on The Tonight Show, Shatner has proven himself to be the reigning master of self-mockery. TIME spoke with the Emmy Award-winning Star Trek icon turned Priceline pitchman about his off-camera relationship with Conan O'Brien, buying dinner for J.J. Abrams and why, when it comes to musical collaborations, he's not unlike Dracula...

Author: /time Magazine | Title: William Shatner | 8/10/2009 | See Source »

Most of the President's longtime golfing buddies say the First Game is improving. After a brief flirtation with a new Nike driver, Obama has returned to his Titleist and is still struggling to master his new hybrid woods. He putts solidly and is working on his bunker shots, once an Achilles' heel...

Author: /time Magazine | Title: Barack Obama: America's (Not So Great) Golfer-in-Chief | 8/9/2009 | See Source »

DDoS attacks are surprisingly low tech. Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers. It's a brute-force approach - the network of hacker-controlled computers floods the server with requests for data until the server overloads and comes crashing down. Graham Cluley, a computer security expert, likened the attack to "15 fat men trying to get through a revolving door at the same time." The attacks do no lasting damage - user data aren't compromised, and the site isn't down for long. Once...

Author: /time Magazine | Title: How Did Hackers Cripple Twitter? | 8/6/2009 | See Source »

Adding to the chaos is the fact that the zombie computers often show no signs of being infected. Hackers look for computers with security vulnerabilities and infect them in advance of an attack. When the hackers are ready to launch the assault, the master computer awakens its zombie army, and the attack begins. Because DDoS utilizes multiple computers from multiple locations - and because hackers may use their network for only a single attack - there's no way to protect against a seemingly random array of computers suddenly going rogue. Once the attack begins, websites can try to trace the sudden...

Author: /time Magazine | Title: How Did Hackers Cripple Twitter? | 8/6/2009 | See Source »

...Quotes About: "Blackwater, in a lot of ways, reflects Prince's own personality: stubborn, driven, and obsessed with finding ways to make things happen." - Suzanne Simons, in her 2009 book, Master of War, detailing Prince's time at the helm of Blackwater...

Author: /time Magazine | Title: Former Blackwater CEO Erik Prince | 8/6/2009 | See Source »

Previous | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | Next