Search Details

Word: packets (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Ross then prints out the electronic form, attaches it to the receipts and NERF form. She tracks down the hypothetical foreign-student-book-buyer, who must sign the NERF form, makes a photocopy of the whole packet, and brings it to the chemistry department's business office for approval...

Author: By Tova A. Serkin and Michael L. Shenkman, CRIMSON STAFF WRITERSS | Title: In the Trenches: A Staffer Struggles with ADAPT | 3/21/2000 | See Source »

Galluccio's appointments for the city council's numerous committees were made public last night in the council's agenda packet...

Author: By Imtiyaz H. Delawala, CRIMSON STAFF WRITER | Title: Mayor Galluccio Leads First Cambridge City Council Meeting | 3/7/2000 | See Source »

...terms of my release permitted me to do so, I'd tell the people running the sites that were hit three things, all of which they may have done by now: 1) use a network-monitoring tool to analyze the packets being sent to determine their source, purpose and destination; 2) place your machines on different subnetworks of the larger network in order to present multiple defenses; and 3) install software tools that use packet filtering on the router or fire wall to reject any packets from known sources of denial-of-service traffic...

Author: /time Magazine | Title: The World's Most Hunted Hacker | 2/21/2000 | See Source »

Avery included in a packet to committee members various grant applications from other groups on campus, including the Harvard College Student Activities Fund, the Office for the Arts, the Undergraduate Council, RUS, the Institute of Politics and the Harvard Foundation for Intercultural and Race Relations...

Author: By Joyce K. Mcintyre, CRIMSON STAFF WRITER | Title: Radcliffe Trust Committee Holds First Meeting | 2/17/2000 | See Source »

...attackers brought down eBay and other sites using a method called "denial of service," or DOS. On a regular computer network, one computer sends a packet, or a bit of information, to another computer, and waits for a "ping" in return to verify that the information was received...

Author: By Shira H. Fischer, CRIMSON STAFF WRITER | Title: Stanford Computers Exploited | 2/15/2000 | See Source »

Previous | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | Next