Search Details

Word: stealingly (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Crimson showed tremendous heads-up play in the bottom of the second. Anderson and Liz McNamara pulled off a daring second-home double steal to put Harvard on the scoreboard. Katy Frucher alertly kept the inning alive by hustling to first after the catcher dropped the third strike pitch. But the threat was turned down when Frucher was cut down stealing on a perfect throw to second...

Author: By Jonathan D. Unger, | Title: Batswomen, Black Bears Split | 4/15/1989 | See Source »

...most memorable pieces, Shinkaretsky posed as a worker in a sausage factory. Passing several indifferent guards, he walked out the factory gate and headed toward a hidden television camera. Pulling a large ham from under his coat, he told viewers, "You see how easy it is to steal here." After the report was aired, the factory tightened security...

Author: /time Magazine | Title: Oh, No, Here Comes Joe | 4/10/1989 | See Source »

...main attraction of such a system is that it is virtually foolproof. Keys can be copied, combination locks cracked, and the computerized cards used to open doors in fancy hotels can be stolen. But no one can steal or copy a fingerprint. Another advantage: people who use biometric locks no longer have to worry about forgetting their keys...

Author: /time Magazine | Title: Technology: Putting The Finger on Security | 4/3/1989 | See Source »

Twenty seconds later, Salton, setting up a breakaway with a steal, passed the ball to Faro, who swam down the length of the pool with no Brown defenders in sight. Harvard 2, Brown 0. The rout had begun...

Author: By Julio R. Varela, | Title: Aquawomen Rip Bruins, 15-5 | 3/22/1989 | See Source »

Last week the U.S. arrested and then expelled a Soviet military attache for allegedly trying to steal details of computer-security programs. The incident, as well as the arrest earlier this month of three West German computer hackers suspected of spying for the Soviet Union, highlighted the extent to which rival intelligence agencies are scrambling to devise ways to penetrate one another's security systems...

Author: /time Magazine | Title: Spying And Sabotage by Computer | 3/20/1989 | See Source »

Previous | 369 | 370 | 371 | 372 | 373 | 374 | 375 | 376 | 377 | 378 | 379 | 380 | 381 | 382 | 383 | 384 | 385 | 386 | 387 | 388 | 389 | Next