Search Details

Word: passwords (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Your login file is stored in your FAS directory and tells UNIX what to do after you type in your username and password. You can edit your login file so that all sorts of interesting things will happen before you get to the fas% prompt...

Author: By David M. Rosenblatt, | Title: Fifteen Minutes: The ABC's of CRT | 11/18/1999 | See Source »

While students must register a name and password to submit surveys, there is no mechanism to ensure that the Ivy League survey respondents actually attended the school they were commenting on. The site also allows visitors to submit an unlimited number of surveys...

Author: By Marla B. Kaplan, CONTRIBUTING WRITER | Title: Web Site Ranks Harvard Behind Rival Princeton | 11/10/1999 | See Source »

...user in Santa Barbara, Calif. Last month she received mail from an official-looking AOL address offering a month's free service to make up for recent difficulties with her phone line. All she had to do was "log on"--that is, reply with her username and password. She duly did so. The next weekend she started getting angry notes from strangers, demanding that she stop sending them pornography...

Author: /time Magazine | Title: Don't Be E-Hoaxed | 11/8/1999 | See Source »

...first e-mail, of course, had not come from AOL HQ. Some enterprising (and cowardly) porn-site operator had been looking for an AOL account to "bounce" his spam mailings out of--in this case, 1,700 of them. Once someone has your password, it's child's play for him to pass out, under your name, anything he wants. Sending a fake e-mail to elicit the necessary information is called password fishing, and Holderman is by no means the first to fall for it. Remember, the Melissa virus was first sent from an unsuspecting AOL user's account...

Author: /time Magazine | Title: Don't Be E-Hoaxed | 11/8/1999 | See Source »

...here's the good news. Such attacks are still rare; they can easily be detected; and all it takes to prevent them is common sense. Turn off file sharing in your network control panel. Add password protection to your most precious files. And for goodness' sake, don't ever, ever open an e-mail attachment from someone you don't know and trust like family...

Author: /time Magazine | Title: Hacker's Delight | 11/1/1999 | See Source »

Previous | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | Next