Search Details

Word: passwords (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...over that hurdle, setup is pretty straightforward. You plug a standard phone line into one hole in the back of the box and a standard telephone receiver into the other. You use the telephone to dial your Internet provider and to punch in your log-in and password. Then the Aplio--with its built-in modem--takes over, connecting you to the party you are trying to speak to. It connects you, that is, if the party has an Aplio synched to yours, which probably requires enough prearrangement by telephone to eat up most of that 95% saving...

Author: /time Magazine | Title: Phone Free | 10/19/1998 | See Source »

...process required the residents to provide their Harvard ID number and their birthdate and then change their password...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

...just glad that they caught it quickly.Changing your password it is a lot better thanhaving someone use your account maliciously," saidGabrielle B. Dreyfus...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

...This isn't any more of a concern than somebodygetting the password for the site and putting anobscene article on there," he said...

Author: By Suzanne M. Pomey, CONTRIBUTING WRITER | Title: Hacker Pranks 'Poon Web Site | 10/1/1998 | See Source »

...termination points for a subnet are the ethernet datajacks in student rooms. Within the subnet, the traffic on the network actually travels to all points, so that when you enter your password, the information is broadcast across the subnet to every datajack...

Author: NO WRITER ATTRIBUTED | Title: BARATUNDE R. THURSTON'S TechTalk | 9/29/1998 | See Source »

Previous | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | Next