Word: stealing
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...finest performances of the afternoon belonged to sophomore Andy Lockman. With a 1:42.37 to steal firstplace honors in the 200-yd. freestyle, the Maryland native demonstrated the depth the Crimson squad will have when it arrives in Hanover, N.H., on Wednesday for the Dartmouth-hosted Eastern Seaboard Championships...
...Tigers had gone ahead by two with just four seconds left in overtime on two pressure free throws by Steve Mills, who was awarded the shots after a dubious foul called on Crimson guard Calvin Dixon. Going for the steal 30 feet out on the left wing, Dixon allegedly hit Mills' hand, and with the Crimson already in the penalty situation, the Princeton guard was granted a one-and-one foul situation...
...like them to is hard. You want to impress the professor with the clarity of your perception, which means you agree with him. But you need to distinguish yourself to the class, which means you don't. Professors in my experience get very nervous when you steal their students. But students get really snotty when they realize you're a lapdog...
...herded some 60 people -14 Americans, the rest Iranians who had gone to the consulate for visas-upstairs to the second floor. There he divided them into small groups that he dispatched downstairs to slip out onto the streets through a side door. Five Americans, including Lijek, managed to steal through back streets to the Canadian embassy, where they were hidden and soon joined by a sixth. They were all spirited back to the U.S. just a year ago this week...
...given task). Then when another programmer with higher clearance runs the program, he will unwittingly trigger the covert instructions. These unlock the guarded areas, just as the Greek soldiers hidden in the horse unlocked Troy's gates. The culprit might then transfer money to his own account, steal private information or sabotage the system itself. Other colorfully named ploys: superzapping (penetrating a computer by activating its own emergency master program, an act comparable to opening a door with a stolen master key); scavenging (searching through stray data or "garbage" for clues that might unlock still other secrets); and piggybacking...