Search Details

Word: passwords (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...lucky, some good samaritan will come along and log her off. If she is unlucky, she may come back the next day and find herself not able to get into her account as a result of some hacker's installing a new password unknown...

Author: By Haibin Jiu, | Title: P.C. CORNER | 11/30/1993 | See Source »

Some users are responsible enough to remember to log out every time they finish an e-mail session. But they might not be cautious enough to safeguard their passwords. Giving away your e-mail account password is like telling someone your PAC. The possible consequences are easy to imagine...

Author: By Haibin Jiu, | Title: P.C. CORNER | 11/30/1993 | See Source »

...mail projects an illusion of personal communication. Assuming a persona is part of the technical process of using an e-mail account. Every time you use the system, you must supply an alias and a password. You are no longer yourself--you're a computer assigned eight-character-or-less string, which, if you find favor with the computer gods, will actually bear some resemblance to your true name...

Author: By Ethan M. Tucker, | Title: Get Yourself Connected | 11/13/1993 | See Source »

...password creates a delusion of self-importance. Although 11,000 of your closest friends may be on the network at the same time as you, your password deceives you into thinking you have been granted privileged access to a new high-tech world...

Author: By Ethan M. Tucker, | Title: Get Yourself Connected | 11/13/1993 | See Source »

...PASSWORD...

Author: By Seth Mnookin, CRIMSON STAFF WRITER | Title: Katie Roiphe and Her Neverending Polemic | 10/7/1993 | See Source »

Previous | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | Next