Word: snooping
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
...fact, the snoop-to-student ratio at Webster is quite high. Voss has selected 60 kids for her Principal's Student Leadership Group, whose duties include reporting any incidents or smoldering resentments that might lead to trouble. Kids who look or act different at Webster know the walls have ears. Meanwhile, Voss and her assistants, walkie-talkies in hand, routinely roam the halls between classes. In order to avoid the appearance of a police state, it seems, Webster Groves has had to create a real...
...golf and tennis club with a spacious veranda meant to re-create the look of a Louisiana plantation. But denizens were somewhat unnerved last year to learn that five of the leading gangsta rappers in the world had moved in: Master P, C-Murder, Silkk the Shocker, Mystikal and Snoop Dogg...
...browser tool bar will produce a list of links to every site the computer has visited recently. It's true that any canny 13-year-old knows how to delete potentially incriminating evidence from the history files. Already, though, there are several programs available, such as Cyber Snoop (at least the manufacturer doesn't euphemize), that create a tamperproof database--a trail of bread crumbs, as it were--so parents can examine every Web address the computer has visited since the last time Dad checked in. But consider this evidence of the complexity of the privacy issue: Susan Getgood...
...parental supervision, blocking programs--NET NANNY, SURFWATCH and CYBERSITTER--can help keep your kids away from the raunchiest sites. But be warned: these programs can wreak havoc with your system software and may pass judgments you don't agree with (e.g., barring info on contraception). Another option is CYBER SNOOP, which creates a tamper-proof list of the sites your kids surf...
...easiest way to snoop on your kids' surfing is to check the HISTORY FILE in Internet Explorer or CACHE in Netscape Navigator (type about:global in the address field). Beware: both files can be tampered with easily...