Search Details

Word: stealing (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...theory, the principle ought to be easy. Looting is wrong, looters have no legal title to the things they steal, and the descendants of those looters do not gain such title merely because a half-century has closed behind the theft. There is not a single object--not a book, not a letter, not a musical manuscript, a drawing, a painting or a vase--that the Russian forces of occupation ripped off from the museums and private collections of Germany and Eastern Europe that should remain, seen or unseen, in Russian hands. And the same goes for what the Germans...

Author: /time Magazine | Title: THE SPOILS OF WAR | 4/3/1995 | See Source »

Federal authorities have warned that hackers can penetrate the Internet's sophisticated security barriers to steal information from companies and universities. But CIA officials believe their own computer system and the new Intelink are practically invulnerable to invasion by outsiders. There will always be the threat of government officials with security clearance who decide to betray their country and download intelligence files. Yet terminals inside Langley are routinely audited for suspicious activity, such as an unusual number of log-ins after hours or repeated failures to have a password accepted, usually symptomatic of a hacker testing out a host...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...operates over the Pentagon's Defense Systems Network, which has its own lines or leases special lines from phone companies to send encrypted messages. To penetrate that system, a hacker would first have to wiretap a dsnet line, then break the sophisticated encryption of its messages, as well as steal another user's password to get past the main menu...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...demand with Marilyn Monroe or your upstairs neighbor for that matter? Virtual sex would solve the perpetual problem of who to take home from a party. Who needs to settle for beer goggling when the man of your dreams in available electronically? A virtual man won't steal the covers for one thing...

Author: NO WRITER ATTRIBUTED | Title: cyber sex | 3/16/1995 | See Source »

Junior guard Elizabeth Proudfit opened the extra frame by canning a trey from the corner. Feaster converted a lay-up off a steal, Proudfit put back a miss and Feaster scored again, drilling a 16-footer...

Author: By Ethan G. Drogin, | Title: W. Cagers Sweep Weekend | 3/6/1995 | See Source »

Previous | 304 | 305 | 306 | 307 | 308 | 309 | 310 | 311 | 312 | 313 | 314 | 315 | 316 | 317 | 318 | 319 | 320 | 321 | 322 | 323 | 324 | Next