Search Details

Word: packets (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...process of selling tickets to Harvard sports events has changed greatly since last year. In the past, students received a packet of coupons at registration and filled out a form to redeem these tickets at the ticket office; the tickets were later distributed to students through House secretaries...

Author: By Stephen E. Sachs, CONTRIBUTING WRITER | Title: Ticket Sales for Harvard-Yale Game Off to Sluggish Start | 10/14/1998 | See Source »

...This is not the first time we have had asecurity compromise along with a packet snifferinstalled on our network. We see incidents likethis occurring multiple times per year," Osterbergsaid...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

...Packet sniffers gather all information, including usernames and passwords, passing over the network while the program is running. This information is then available to the hacker, according to Osterberg...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

...resident stopped the packet sniffer program Sunday night and notified FAS Computer Services Monday morning. In turn, Computer Services then ordered the re-authentication process. Any Eliot residents who were logged on to the same portion of the network as the hacker received an explanatory note explaining the breach the next time they telnetted to the FAS network...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

According to Osterberg, the University isconsidering several "long-term" plans to bolsternetwork security. The first is "switchednetworking," a system in which every datajack iscompletely isolated from every other datajack.While this prohibits packet sniffing, it is a verycostly procedure which would require extensiverewiring of hundreds of datajacks...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

Previous | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | Next