Search Details

Word: trojan (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Harvard was forced to repeatedly foul Trojan top-scorer Muci Harris. She hit all eight of her free throws down the stretch to ice the game and leave the Crimson with its sixth straight loss...

Author: By David R. De remer, SPECIAL TO THE CRIMSON | Title: W. Basketball Snaps Seven-Game Losing Streak at BU | 1/5/2001 | See Source »

...back to World War II and into the mythical mists of the Qing dynasty. Some of our top CDs are replays of Shostakovich and Django Reinhardt. The hip place for Londoners to see modern art is in a revamped old power station. The best of theater includes a Trojan War epic and something called Hamlet. And on our fiction list, No. 4 is...Beowulf...

Author: /time Magazine | Title: The Best & Worst of 2000 | 12/18/2000 | See Source »

...TANTALUS British theater titans Peter Hall and John Barton use the mythic Trojan War as the centerpiece of their adventurously scaled, sharply written satire of modern politics. This 10-hour marathon, which premiered in Denver, bristles with enough backstabbing drama to keep the slack moments...

Author: /time Magazine | Title: Theater | 12/18/2000 | See Source »

...back to World War II and into the mythical mists of the Qing dynasty. Some of our top CDs are replays of Shostakovich and Django Reinhardt. The hip place for Londoners to see modern art is in a revamped old power station. The best of theater includes a Trojan War epic and something called "Hamlet." And on our fiction list, No. 4 is... "Beowulf...

Author: /time Magazine | Title: The Best & Worst of 2000 | 12/10/2000 | See Source »

...worms, programs that insidiously spread from one computer to another with very little human intervention. The ILOVEYOU virus stole passwords and credit card numbers; the MTX virus, on the other hand, destroys files and prevents a user from accessing certain websites. Even more dangerous than such worms, possibly, are Trojans. These virus-type programs allow someone else access to your computer. Once they're loaded on, the hacker can do almost anything with your system, from using it to hack other systems to opening new files from anywhere they choose to be. In the words of former Crimson editor Kevin...

Author: By Rohan R. Gulrajani, | Title: Computer Contagion | 11/20/2000 | See Source »

Previous | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | Next