Search Details

Word: thwarting (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...going over to the dark side of computer warfare. But ethically, of course. The Defense Department, like most other large organizations, has recognized that no wall is high enough to keep out skilled and determined hackers for keeps. Instead, it has decided that in order to anticipate and thwart attacks, it needs to know what the hackers know...

Author: /time Magazine | Title: To Battle Computer Hackers, the Pentagon Trains Its Own | 3/18/2010 | See Source »

...farmers' lobby. BT brinjal backers also question why Ramesh disregarded scientific evidence from field trials that indicated the brinjals are safe. That evidence had been approved by the government's Genetic Engineering Approval Committee. "This decision is certainly a big setback for biotechnology and I am afraid it will thwart further investment in agri-biotech research," says Kiran Mazumdar-Shaw, head of Indian biotech firm Biocon. (See the top 10 scientific discoveries...

Author: /time Magazine | Title: What an Eggplant Uproar Says About India's Economy | 2/15/2010 | See Source »

...Force wants the ability to burrow into any computer system anywhere in the world "completely undetected." It wants to slip computer code into a potential foe's computer and let it sit there for years, "maintaining a 'low and slow' gathering paradigm" to thwart detection. Clandestinely exploring such networks, the Dominant Cyber Offensive Engagement program's goal is to "stealthily exfiltrate information" in hopes it might "discover information with previously unknown existence." The U.S. cyberwarriors' goal: "complete functional capabilities" of an enemy's computer network - from U.S. military keyboards. The Army is developing "techniques that capture and identify data traversing...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

...late for the U.S. to play defense (it takes 300 milliseconds for a keystroke to travel halfway around the world). Far better to be on the prowl for cybertrouble and - with a few keystrokes or by activating secret codes long ago secreted in a prospective foe's computer system - thwart any attack. Cyberdefense "never works" by itself, says the senior Pentagon officer. "There has to be an element of offense to have a credible defense...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

...health experts normally view as a minimum threshold for an infectious-disease vaccine. Even further behind in development, but still promising, are two new antibodies identified by a group of researchers working at a number of labs that, at least in a dish, seem to neutralize the virus and thwart attempts to infect healthy cells...

Author: /time Magazine | Title: David Ho: The Man Who Could Beat AIDS | 1/25/2010 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | Next