Search Details

Word: password (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Though most Harvard websites with secure information require a confidential PIN or other password in addition to the ID, The Crimson has identified a number of online applications—ranging from PharmaCare to network access to mail forwarding—that require nothing more than an ID number and birthday, or ID and last name...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Drug Records, Confidential Data Vulnerable | 1/21/2005 | See Source »

...Gmail is fast, and lets you save your password, unlike Yahoo! mail,” said Timothy H. Wong ’05. “Also, you can reply to a new message without loading a new window. This was a small revolution which astounded...

Author: By Mary A. Brazelton, CONTRIBUTING WRITER | Title: Students Use Gmail Accounts | 11/8/2004 | See Source »

...concerned that the process by which seniors were notified of the opportunity to vote was flawed. A few days before each round of the election, Director of College Alumni Programs F. Hoopes Wampler sent an e-mail to seniors with a link to the voting website and a personal password...

Author: By Samantha L. Groden, CONTRIBUTING WRITER | Title: Senior Class Marshals Named | 10/12/2004 | See Source »

...encoding prowess. Boeford plagiarized a full page of Evans’s javascript for her final Computer Science 50 project. “Eager” Earl responded with a vengeance, dumping her (hard), carving Boeford’s email password and name on a tree in the Yard, and changing his name to Earl “Dirty Fingers” Smythe...

Author: By Matthew J. Amato, CRIMSON STAFF WRITER | Title: The Annotated Network Agreement | 9/30/2004 | See Source »

...cells and helped research other useful information, such as how to use computer models to determine the amount of plastic explosive required to blast through a skyscraper's concrete foundations. Pakistani investigators say Khan used different Internet cafes and relayed coded messages through secure websites that required a numbered password to gain entry. He never used a cell phone and instead made calls to operatives on pay phones...

Author: /time Magazine | Title: Al-Qaeda In America: Target: America | 8/16/2004 | See Source »

Previous | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | Next