Word: protectiveness
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
...real losers in this situation are the U.S. residents who are forced to use relatively weak software. In January, a graduate student at Duke University took only four hours to break a code similar to those Web browsers use to protect credit card numbers. Netscape and Microsoft offer strong-encryption versions of their browsers to U.S. residents who ask for them, but because of export restrictions, the weak version is the standard. Many other products are similarly affected. Also in January, two private organizations, using $250,000 in computer equipment, cracked a code standard for government agencies and financial institutions...
...personal level, the center is investigating ways to protect individual privacy in network environments...
...personal level, the center is investigating ways to protect individual privacy in network environments...
...might allow himself to be governed by international justice, but we won't truly win the war. When we devote our military to Kosovo, we have to devote all our passions and energies to the fight. Only by fighting with conviction will we win the war and protect the Kosovar's "autonomy" and "peace...
Some planners talked instead of dispatching a much smaller force of, say, 30,000 or so to carve out "safe havens." But the idea carries such a negative image after enclaves set up in Bosnia--like Srebrenica--failed so tragically to protect civilians. Others suggested turning the war over to a proxy army of K.L.A. fighters outfitted by the West with effective Stinger missiles and antitank rockets. But U.S. and NATO officials feared that arming one side would only widen the war and destabilize the entire region. By now it may simply be too late: on Friday Serb officials were...