Search Details

Word: passworded (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...running the NSC computer -- unbeknownst to North and his colleagues -- were keeping backup tapes of each file in the system, a routine practice. These backups, which are typically made on a daily or weekly basis, included copies of files containing the private notes of every NSC officer with a password. In response to requests from the Tower commission, White House Communications Agency programmers searched their storage tapes for NSC memos and eventually turned over a stack of printouts nearly 4 ft. high. Explains Donn Parker, a computer security specialist at SRI International: "It is so ingrained in computer operators that...

Author: /time Magazine | Title: Computers: Can A System Keep a Secret? | 4/6/1987 | See Source »

...Conservative Club and the Harvard Administration. The next time they are smitten with the urge to confer freedom of speech on Pretoria's spokesmen, they should: (a) not publicize the event, (b) restrict entry only to members of the Conservative Club who can give out the correct password, (c) gag, bind and blindfold members of the audience before entry, (d) have a water cannon handy, just in case, (e) cordon off the campus to outside agitators (and Channel 7), (f) hold the event in Dean Archie Epps' office...

Author: NO WRITER ATTRIBUTED | Title: A Modest Proposal | 3/27/1987 | See Source »

...will ask you to sign-in. Type ANONYMOUS for your user id, and type username for your password. Once connected to the remote system, a couple of commands are necessary to examine and transfer programs. First, LS prints out the directory of files. CD changes the directory level, so that other files can be accessed...

Author: By Evan O. Grossman, | Title: Getting Something-for-Nothing Through Harvard | 2/12/1987 | See Source »

Once you've logged into Class 5, the computer will ask for your USERNAME. Type JOBS. Also type JOBS return for the password. From there on, just follow the computer's instructions as you learn about exciting job offerings. If you need any additional information, just stop by the SEO in the basement of Byerly Hall...

Author: NO WRITER ATTRIBUTED | Title: Networking Your Way to the Science Center | 10/15/1986 | See Source »

...taste of what is available, type FTP HUSC6 return. You will then be asked for a Logname. Type ANONYMOUS return, and you will then by asked for a password. Type your name and return. You can type LS return to get a directory of some of the available programs. To transfer a program onto your computer, follow the directions that come with the Kermit diskette...

Author: NO WRITER ATTRIBUTED | Title: Networking Your Way to the Science Center | 10/15/1986 | See Source »

Previous | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | Next