Search Details

Word: passworded (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

Representatives from each school agreed to create a cohesive system where users can access the wireless network at any school with their own username and password...

Author: By Katharine A. Kaplan, CRIMSON STAFF WRITER | Title: Wireless Ethernet Advances Haltingly | 3/12/2003 | See Source »

...don’t set a password, anyone with the right software can take control of your computer and install software to let them do whatever they want,” Davis said...

Author: By Laura L. Krug, CONTRIBUTING WRITER | Title: Computer Hackings Plague Harvard | 10/30/2002 | See Source »

...lack of an administrative password, Martin said, that was probably the vulnerability that allowed her computer to be attacked. She had disabled the password in order to try to network two computers and the attack likely happened during that time...

Author: By Laura L. Krug, CONTRIBUTING WRITER | Title: Computer Hackings Plague Harvard | 10/30/2002 | See Source »

...important messages, hackers and security types alike realize that while encryption is hard, people are easy. All too often, the best-scrambled plans of cryptographers are laid waste by an overworked IT guy who forgot to flip the encryption switch or a lazy user who picked a too obvious password...

Author: /time Magazine | Title: Beating the Snoops | 10/28/2002 | See Source »

Students can update their password-protected file at any time to track their most recent drinking habits and can also read up on articles such as “Beer Bellies: What really causes that not-so-cute tummy?” and “Having Sober Sex: Leaving the Love Light...

Author: By Mary KATHRYN Burke, CONTRIBUTING WRITER | Title: Website Charts Alcohol Abuse | 10/16/2002 | See Source »

Previous | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | Next