Word: password
(lookup in dictionary)
(lookup stats)
Dates: during 1980-1989
Sort By: most recent first
(reverse)
...list reads like a disjointed combination of Password and Jeopardy: The Yard, The Quad, The Quadrangle, The Green, The Diag, Old Campus. What is, a big open space where students congregate...
...running the NSC computer -- unbeknownst to North and his colleagues -- were keeping backup tapes of each file in the system, a routine practice. These backups, which are typically made on a daily or weekly basis, included copies of files containing the private notes of every NSC officer with a password. In response to requests from the Tower commission, White House Communications Agency programmers searched their storage tapes for NSC memos and eventually turned over a stack of printouts nearly 4 ft. high. Explains Donn Parker, a computer security specialist at SRI International: "It is so ingrained in computer operators that...
...does not have to be a whiz kid to uncover secrets hidden in a computer. Many large office systems have a hierarchy of password privileges that gives supervisors access to the files of subordinates and systems operators access to everything. At the San Francisco Examiner, which like most modern newspapers is highly computerized, employees have to be reminded from time to time that "cruising the baskets" (reading the private files) of their co- workers is a serious breach of privacy...
...Conservative Club and the Harvard Administration. The next time they are smitten with the urge to confer freedom of speech on Pretoria's spokesmen, they should: (a) not publicize the event, (b) restrict entry only to members of the Conservative Club who can give out the correct password, (c) gag, bind and blindfold members of the audience before entry, (d) have a water cannon handy, just in case, (e) cordon off the campus to outside agitators (and Channel 7), (f) hold the event in Dean Archie Epps' office...
...will ask you to sign-in. Type ANONYMOUS for your user id, and type username for your password. Once connected to the remote system, a couple of commands are necessary to examine and transfer programs. First, LS prints out the directory of files. CD changes the directory level, so that other files can be accessed...