Search Details

Word: thenetwork (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Network users can send untraceable fake e-mailthrough port 25--an "open base" or area in thenetwork used to send and receive messages-in orderto avoid detection...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

HASCS personnel can sanction students withoutconsulting the Ad Board either by shutting offaccounts or limiting students' access to thenetwork whenever they see fit. HASCS usually putsthe account of a student accused of wrongdoing onhold, Steen says...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...provided that implementation proceeds asscheduled, all undergraduates will be able toconnect directly to the Internet through datajacks in their rooms by the end of this semester .Already about 750 students are hooked up to thenetwork from their dorm rooms, and Steen expectsthat number to double or triple by next fall...

Author: By Andrew L. Wright, | Title: University Moves Onto Infohighway | 4/5/1994 | See Source »

Kyungmann Kim, a statistcian at the School ofPublic Health, says he reads news items ofinterest via Usenet and does some research usingvarious information servers available over thenetwork...

Author: By Andrew L. Wright, | Title: University Moves Onto Infohighway | 4/5/1994 | See Source »

...addition, Many faculty members are using thenetwork in their classes. Assistant Professor ofComputer Science Margo I. Seltzer, who teaches herdepartment's introductory course, "ComputerScience 50," is one of several faculty members whorequire their students to have e-mail accounts...

Author: By Andrew L. Wright, | Title: University Moves Onto Infohighway | 4/5/1994 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | Next