Search Details

Word: passwords (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...users to give a long Web site link a short alias, which can help hide the link’s true destination. “I feel really dumb for doing it,” said Sarah H. Arshad ’09, who entered her user name and password only to see a random, nonsensical video appear on her screen. “I mean, it’s funny because I instinctively felt I shouldn’t be doing it, but I clearly did it anyway. I should know better by now,” Arshad said...

Author: By Peter F. Zhu, CRIMSON STAFF WRITER | Title: Google Talk Users Tricked By A Misleading Video Link | 2/25/2009 | See Source »

...Labour veteran had lost something potentially far more inconvenient than a wallet: the password to his Hotmail account. He is the latest - and highest profile - victim of a widespread "phishing" scam, which starts when the target receives an e-mail warning that the account will be suspended unless he or she revalidates it by clicking a link. This leads to a phony website that demands the account password. The scammers immediately hijack the account and use the address book to send out phishing letters. Often the supposed sender explains that he or she is "really sorry I didn't inform...

Author: /time Magazine | Title: Cabinet Minister Needs Cash: The Jack Straw Scam | 2/25/2009 | See Source »

...American past, one as sentimental and archaic as a Norman Rockwell painting. In a passage that appears, oddly, twice, as dialogue in two different characters' mouths, Grisham attempts to awe us with the high-level security surrounding Scully & Pershing's ultra-secret document room: "Pass codes change every week. Passwords every day, sometimes twice a day." I work for a magazine, and my e-mail password changes every 30 seconds. Where are the biometrics? Likewise Grisham thinks we need to be told that cubicles are nicknamed "cubes," and requests our amazement at the fact that the copiers...

Author: /time Magazine | Title: John Grisham's Charming Novel About Nothing | 1/24/2009 | See Source »

...While we regret this, we really believe that the risk of access to this data is extremely low,” London said. “We want to emphasize that the data on the tape was password-protected and anyone trying to gain access to it would have to have specialized equipment and skills...

Author: By Gordon Y. Liao, CONTRIBUTING WRITER | Title: Law School Loses Backup Tape Containing Client Info | 11/7/2008 | See Source »

...Virgin America's economy seats. As with most HP business-class computers, you get a slate of useful little features, like a teeny LED night-light at the top of the screen that pops out to illuminate your keyboard, minimizing spousal irritation. A fingerprint reader allows you to bypass password protection and log in to the laptop, or even to websites, with a thumb swipe. And a nifty built-in business-card scanner lets you line up a card along the front edge of the machine, tilt the laptop's screen down and snap a picture of it; included with...

Author: /time Magazine | Title: The Klutz's Companion | 10/2/2008 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | Next