Search Details

Word: password (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

BILLER-DIRECT PAYMENT Many credit-card companies and other big billers allow you to pay through their websites. This requires some setup--you generally need a user ID number and password--but after that it's easy. You can see your most recent statements and transactions online and choose how much you want to pay. Print a receipt, and you're done. By coupling biller direct with direct debiting, you can sizably reduce the number of checks you write without fully automating. The downside: you have to travel from site to site...

Author: /time Magazine | Title: The Check Is in the Mail. Not! | 10/14/2002 | See Source »

...heavy user of post-Napster file-sharing programs like Morpheus or Kazaa, both known distributors of spyware, you're probably already infected. Sometimes spyware masquerades as cookies, those little files websites leave on your computer so you don't have to type your name and password every time you visit. Once on your PC, spyware can sequester itself deep inside your operating system in what are called registry files. Anti-virus software won't spot it, because it looks like something you chose to install...

Author: /time Magazine | Title: What Spies Beneath | 10/7/2002 | See Source »

...fried chicken at a drive-through restaurant in San Francisco was handed two bags of marijuana by the clerk at the service window. The driver gave the bags back and called the police, who arrested Carlos Ayala, 26. Authorities allege Ayala was selling pot to customers who knew the password...

Author: /time Magazine | Title: World Watch | 9/29/2002 | See Source »

According to the report, LeMenager entered Yale’s admission website using a Princeton applicant’s name, birth date and social security number on April 3, the day after Princeton had sent out the last of its admissions decisions. He expected to be asked for a password or ID number, but found that there was no security beyond what information he had already provided...

Author: By Eugenia B. Schraa, CRIMSON STAFF WRITER | Title: Princeton Ends Internal Investigation | 8/16/2002 | See Source »

When the victim returned to his room, another PalmPilot, bought to replace the stolen one, was missing. Additionally, the victim said that although his laptop computer was locked to the desk, a password had been set so that he could not access his own computer files...

Author: By Jenifer L. Steinhardt, CRIMSON STAFF WRITER | Title: Two Greenough Students Focus Of Theft Case | 5/1/2002 | See Source »

Previous | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | Next