Search Details

Word: personalizing (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...only person left in her building since the end of rent control, and has seen "at least 25" of her friends leave Cambridge because of an increase in housing costs...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Locals Battle Evictions in Holiday Rally | 12/9/1998 | See Source »

...logging in as root, a person gains universal access to do whatever they want to the files on that server. For hackers, this generally entails first changing passwords, so that only they can gain access to the server, and then altering the site, while taking care to delete all the logs that might be used later on to identify them...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Exploits are tiny programs that a hacker runs on a server to expose errors or bugs in a system. While this is a much more complicated way of hacking a Web site than through FTP, it is also much more powerful because it allows a person to hack servers that don't allow anonymous FTP access...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Generally, what a person would do is to set up an account with the target if that is possible and then view any weak spots in the system from the inside out. Each system, however, is bound to be different, so this is where a certain level of skill and experience come into play...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

...think it goes back to the sense of power," Osterberg says. "It fits in quite well with [the] teen and young adult mentality of being invincible and young adult mentality of being invincible and not really considering the consequences of actions. A more mature person may be more likely to be on the victim side of such an attack, and thus, have a better appreciation for why such things can be so damaging...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 248 | 249 | 250 | 251 | 252 | 253 | 254 | 255 | 256 | 257 | 258 | 259 | 260 | 261 | 262 | 263 | 264 | 265 | 266 | 267 | 268 | Next