Search Details

Word: password (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...addition, while Leeson could call up the error account on the company computer, most of his colleagues, who lacked the special password, did not have access to it. And last week members of Leeson's trading team in Singapore admitted to police that he had instructed them to put only a certain number of specific trades in the error account...

Author: /time Magazine | Title: Nicholas Leeson: GOING FOR BROKE | 3/13/1995 | See Source »

...PASSWORD SNIFFERS: These tiny programs are hidden on a network and instructed to record logons and passwords, which are then stored in a secret file. By the end of a week, this file can contain hundreds of user names and their associated passwords. Last year an advisory from Carnegie Mellon University's Computer Emergency Response Team warned that, as a result of a rash of sniffing attacks, tens of thousands of passwords had been stolen and were presumed to be compromised...

Author: /time Magazine | Title: CRACKS IN THE NET | 2/27/1995 | See Source »

...Internet address of a trusted or "friendly" machine. It's much easier to exploit security holes from inside a system than from outside; the trick is to gain "root" status, the top-level access that the computer's administrator enjoys. With root status, a hacker could install a password sniffer or bogus software, like a "back door"-a secret return path into the machine. Mitnick was able to break into Shimomura's Fort Knox-like computer using a spoof...

Author: /time Magazine | Title: CRACKS IN THE NET | 2/27/1995 | See Source »

...think writing letters is a lot more personal," says Greek student Natasha Covas '96, who says she regularly e-mails her friends in England and Greece. "And it's a lot more private--people can get into your e-mail account if they have your password, and read your mail...

Author: By H. NICOLE Lee, | Title: International Students Say The Internet Helps Them Save Money on Calls Home | 2/6/1995 | See Source »

...Tarr has held the password for at least ayear, according to system log files...

Author: By Jonathan A. Lewin, | Title: Computer Changes Delayed | 2/3/1995 | See Source »

Previous | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | Next