Search Details

Word: password (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

TOUCH AND GO Admit it. Your company spends thousands of dollars on a secure computer network, and you keep your password on a Post-it note stuck to the monitor. Siemens thinks it has a better way--a mouse ($150 at siemensidmouse.com that doubles as a security system. A silicon plate embedded in the top of the device reads your fingerprint and confirms your identity by matching it to a digital image. Fingerprints make excellent passwords, says Siemens spokesman Thomas Tesluk: you can't forget them, and if you lose one, hey, you've got nine others...

Author: /time Magazine | Title: In Brief: Nov. 20, 2000 | 11/20/2000 | See Source »

...classified computer in the X Division, where nuclear warheads are designed and assessed, to download voluminous mathematical descriptions of the characteristics and performance of various thermonuclear warheads to an unsecure portion of the computer-storage system. Prosecutors say he stored the data in a subdirectory protected only by a password that consisted of his initials. Then, the evidence showed, he went to another division at Los Alamos and borrowed a colleague's computer that came with a device for making backup tapes. On that machine, the government charged, Lee downloaded the data from the subdirectory onto 10 tapes. Only...

Author: /time Magazine | Title: The Long Way Home | 9/25/2000 | See Source »

...classified computer in the X Division, where nuclear warheads are designed and assessed, to download voluminous mathematical descriptions of the characteristics and performance of various thermonuclear warheads to an unsecure portion of the computer-storage system. Prosecutors say he stored the data in a subdirectory protected only by a password that consisted of his initials. Then, the evidence showed, he went to another division at Los Alamos and borrowed a colleague's computer that came with a device for making backup tapes. On that machine, the government charged, Lee downloaded the data from the subdirectory onto 10 tapes. Only...

Author: /time Magazine | Title: Wen Ho Lee's Long Way Home | 9/17/2000 | See Source »

Ifilmpro.com is a high-powered Hollywood website featuring movie-industry data and showcasing new talent. But the part of the site that has everyone talking is "The Buzz," an anonymous chat section restricted by password to industry insiders. In "Executive Shuffle," studio brass dish on who's up and who's down. "Assistant Central" is a drone's-eye view of life in Tinseltown...

Author: /time Magazine | Title: Technology: Click Here For A Hot Rumor About Your Boss | 9/11/2000 | See Source »

...tool," or simply "it," as the program is now gingerly called, doesn't sweep the Internet for key words in text or subject line. Rather, deployed within an Internet service provider network known to be used by a criminal suspect, it searches out unique "authentication strings" - screen name, password, telephone number - that are generated whenever the suspect connects to the ISP. All the e-mails identified by those strings are downloaded to an FBI computer housed in a closed container at the ISP office. When the surveillance is over, the FBI computer returns to the field office. FBI officials...

Author: /time Magazine | Title: Ooops! Maybe 'Carnivore' Was Too Meaty... | 7/23/2000 | See Source »

Previous | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | Next