Search Details

Word: trojan (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Eagle-eyed analysts have seen a slow, steady price rise on high-profit stuff like electronics. And the enormous premium that Greenlight.com is paying for placement on the site could be a sign of things to come, says Mike May, senior analyst at Jupiter Communications. "Increasingly, retailing is a Trojan horse for high-margin business like advertising," he notes...

Author: /time Magazine | Title: All Boxed In | 9/4/2000 | See Source »

...Guzman never got academic credit for "E-mail Password Sender Trojan." But the proposal's mangled syntax--de Guzman described a program that "catched and retrieved all lose passwords that users can enjoy"--was a dead giveaway. The proposal appears to have been a blueprint for the Love Bug virus that wreaked havoc on e-mail systems around the world, from the Pentagon to the British Parliament, and caused as much as $15 billion in damage. The skinny 23-year-old de Guzman came out of hiding last week for a press conference at which he came close to admitting...

Author: /time Magazine | Title: School for Hackers | 5/22/2000 | See Source »

When Onel de Guzman's thesis proposal, titled "E-mail Password Sender Trojan," was rejected by Manila's AMA Computer College in February, the thesis committee gave a distinctly nonscholarly reason. "This is illegal!" the school's dean fumed. De Guzman wanted to write a program to "steal and retrieve Internet accounts of the victim's computer," allowing people to use those stolen log-ins to access the Internet free. The response from a faculty member, scrawled in the margin of the page: "We do not produce burglars...

Author: /time Magazine | Title: School for Hackers | 5/22/2000 | See Source »

...FRANKENFOOD MONITORS Not sure what's for dinner? With a little genetic tinkering, fast-growing fish and freeze-resistant fruits will help feed an overpopulated planet, but such hybrids could unwittingly wipe out the food chain. Eco-scouts will be on the lookout for so-called Trojan gene effects, and bounty hunters will help the USDA eliminate transgenic species that get out of hand...

Author: /time Magazine | Title: What Will Be the 10 Hottest Jobs? | 5/22/2000 | See Source »

Suspicion fell quickly on a possible culprit in the Philippines, in part because the virus' eight pages of computer code contained a tantalizing word: Barok. A search of virus registries quickly revealed that it was the name of a so-called Trojan horse, a stealthy software program that filches passwords, written by a Filipino hacker last year. Still, the transparency of this clue suggested that the word might have been inserted as a deliberate smoke screen to fool the computer sleuths. By week's end, the work of investigators was further complicated by the appearance of a number of copycat...

Author: /time Magazine | Title: Attack Of The Love Bug | 5/15/2000 | See Source »

Previous | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | Next