Search Details

Word: tarr (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...today's world, I do think there should besome type of control over records of who logged inand where from," Tarr said...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...there is some functionality with the lastand finger command--it's useful to see if someonelogged in since you sent them e-mail to see ifthey got it," Tarr added. "I don't know what todo...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...point was just to make the computer work,"Tarr said. "The original designers never intendedUnix to be this operating system that governs theInternet. It was never supposed to be more thanthe system for two guys who wanted to program...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...these mechanisms have been around sincethe early days of Unix," Tarr said. "And in thosedays the Internet was not used as commonly as itis today and issues of privacy were not asprevalent...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...although finger and last could be seen asan invasion of privacy, they were from days whenprivacy wasn't even an issue," Tarr says...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Previous | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | Next