Search Details

Word: password (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Right now, passwords travel unencoded acrossthe wires, and any knowledgeable user can view thenon-encrypted password. Kerberos would guaranteethat the passwords traveling over the network werescrambled...

Author: By Douglas M. Pravda, | Title: Over Past Year, Big Changes at HASCS | 5/1/1995 | See Source »

...outsiders. There will always be the threat of government officials with security clearance who decide to betray their country and download intelligence files. Yet terminals inside Langley are routinely audited for suspicious activity, such as an unusual number of log-ins after hours or repeated failures to have a password accepted, usually symptomatic of a hacker testing out a host of computer-generated passwords. During their first polygraph, job applicants are now asked if they've ever tried hacking. The agency will also stage "red-team" exercises, during which computer experts try to hack the system from terminals...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...Defense Systems Network, which has its own lines or leases special lines from phone companies to send encrypted messages. To penetrate that system, a hacker would first have to wiretap a dsnet line, then break the sophisticated encryption of its messages, as well as steal another user's password to get past the main menu...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...contractors who on a lark have tried to hack parts of the agency's computer system that are closed off to them. A hacker from Canada almost daily tries to break past the CIA's Internet link to get to the agency's secret files. He once used the password "Clinton," thinking that would give him access to any secret. It didn't. "We know who he is," a CIA official said with a smile. "But there's no damage he can do because there's nothing on the other side of that Internet link" with the agency...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...addition, while Leeson could call up the error account on the company computer, most of his colleagues, who lacked the special password, did not have access to it. And last week members of Leeson's trading team in Singapore admitted to police that he had instructed them to put only a certain number of specific trades in the error account...

Author: /time Magazine | Title: Nicholas Leeson: GOING FOR BROKE | 3/13/1995 | See Source »

Previous | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | Next