Search Details

Word: ring (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...After more than an hour of balancing at the front of the canoe to hack and kick at the door, Will finally got it open. He retrieved the two cats and the owner's wedding ring, then grabbed some clean clothes and got back into the canoe. Nearly four hours after we met at the water's edge, we were ready to paddle back to our cars...

Author: /time Magazine | Title: Canal Street By Canoe | 9/6/2005 | See Source »

...make a difference by herself. Kathleen McClaskey Amherst, New Hampshire, U.S. In your report, columnist and life coach Jane Glenn Haas advised midlife women to put themselves first. Haas writes that "it's O.K. to have a facial, travel by yourself or have a relationship without a wedding ring." Although it's very healthy to take good care of yourself, selfishness can lead to unhappiness; whereas sacrificing for loved ones brings lasting joy. Having an affair, while potentially exciting, can be emotionally destructive. Physical intimacy outside of marriage undermines self-esteem. Women need to make emotionally healthy choices. Laurie Stoker...

Author: /time Magazine | Title: A Female Turning Point | 9/5/2005 | See Source »

...hackers he was stalking, part of a cyberespionage ring that federal investigators code-named Titan Rain, first caught Carpenter's eye a year earlier when he helped investigate a network break-in at Lockheed Martin in September 2003. A strikingly similar attack hit Sandia several months later, but it wasn't until Carpenter compared notes with a counterpart in Army cyberintelligence that he suspected the scope of the threat. Methodical and voracious, these hackers wanted all the files they could find, and they were getting them by penetrating secure computer networks at the country's most sensitive military bases, defense...

Author: /time Magazine | Title: The Invasion of the Chinese Cyberspies | 8/29/2005 | See Source »

...story: Sometime on November 1st, 2004, hackers sat down at computers in southern China and set off once again on their daily hunt for U.S. secrets. Since 2003 the group had been conducting wide-ranging assaults on U.S. government targets to steal sensitive information, part of a massive cyberespionage ring that U.S. investigators have codenamed Titan Rain. On this particular night, the hackers' quarry was military data, and they were armed with a new weapon to reach out across cyberspace...

Author: /time Magazine | Title: Inside the Chinese Hack Attack | 8/25/2005 | See Source »

...themselves with black...others with white, others with red, and others with such colors as they can find." Columbus could have hardly foreseen that more than five hundred years later his description of Americans as a multicolored tribe inventing their identity from a dazzling palette of countless hues would ring uncannily true...

Author: /time Magazine | Title: Influencing America | 8/13/2005 | See Source »

Previous | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | Next