Search Details

Word: passwords (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...seconds before moving at a newly green traffic light, or as we wring our hands when someone (heaven forbid) has checked their inbox but has not responded to our messages. We have become so paranoid about physical space that we screen calls. We finger-stalk. We struggle to remember password after password, half-recognizing that our information--our data, our ideas--could suddenly vanish if either we or our computers have a lapse in memory...

Author: By Andrew K. Mandel, | Title: Endpaper: Due Apprehension in a Brave New World | 2/18/1999 | See Source »

...disagree that these commands should be removed. By disabling commands, one reduces the ability of the network to function as intended. In addition, one can introduce a security hole in the system. For example, a hacker figures out my password and logs in to my account to run amok in the network. I use the "last" command to see when I last logged in, and I notice a location or time that I know I did not login. (One caveat--"last" only works on the current machine, for example, login4, so to be thorough, one must...

Author: NO WRITER ATTRIBUTED | Title: `Plea for Privacy' Misguided | 1/22/1999 | See Source »

...raid was the result of a months-long FBI investigation after a graduatestudent at the Yale Geology lab noticed thatLasaga's computer password had been used todownload child pornography from the Internet lastsummer. Someone else saw him transfer pictures ofnude boys and boys having sex with men onto hisSaybrook computer...

Author: By Katrina ALICIA Garcia, CRIMSON STAFF WRITER | Title: Yale Prof. Charged With Sex. Assault | 1/6/1999 | See Source »

Hence, the more heavily encrypted a password file is, the more difficult it will be for a hacker to be able to compromise...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Once connected, all the hacker has to do is take the password file and unencrypt it using a cracker program and a dictionary maker. With these programs in hand, the hacker can simply run them on the password file to get an unencrypted version of the password file...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | Next