Search Details

Word: trojan (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...condom cache resides in a non-descript black box on the laundry room wall. A quarter full, it offers three types of condoms: Trojan lubricated with spermicide, Trojan lubricated without spermicide and LifeStyles non-lubricated. The extensive instructions include details and pictures about condom use, as well as a section of "Tips for Success," which advises that "Oil rots rubber," and condoms should not be stored in one's wallet...

Author: By Emily F. Oster, | Title: Looking for Rubbers | 2/11/1999 | See Source »

...departments in California already use electric bicycles, mostly made by ZAP Power Systems, a U.S. market leader. Later this year EVG plans to introduce a folding electric bike, which Iacocca figures is just the accessory for the life-style-conscious drivers of minivans and SUVs. "It's like the Trojan Horse," says the prince of promotion. "If I can get enough bikes into garages, then eventually kids are going to pressure the old man to make an electric vehicle the family's third...

Author: /time Magazine | Title: Iacocca Gets New Wheels | 2/1/1999 | See Source »

...Game, two older men hold a pawn before the eyes of a blindfolded, timid man. The mouths of the elders begin to explain the beginning and rules of the game. Some sets of Bak's work show pawns escaping from a toy horse, an allusion to a Trojan horse, only to win the game. The notion of a battle won by the supposed weaker player is an idea that radiates from these rare, passionate pieces of Bak's paintings. In Symposium, sagacious men discuss where to replant their tree which floats above, its roots emerging from an egg, its branches...

Author: By Nicole A. Lopez, CONTRIBUTING WRITER | Title: The Spirit of Samuel Bak | 12/4/1998 | See Source »

...more sophisticated--and malicious--hands, the defect can be used to insert a "Trojan horse," a program that can stealthily take over your PC and, for instance, grab your passwords. More than 17 million PCs have the affected versions of Microsoft's Outlook 98 and Outlook Express and Netscape's Communicator...

Author: /time Magazine | Title: Bugs Of Summer | 8/10/1998 | See Source »

...Express and Netscape Mail, the gaping holes in the code that might allow hackers to sneak in an attachment that screws up your PC. In desperation, you turned to the supposedly bug-free Eudora from Qualcomm. Now, on Friday, reports emerge that Eudora, too, can be transformed into a Trojan horse -- that hackers can write a nasty little Java Script program and disguise it as an HTML link. You click on the link and, in theory, bang goes your hard drive. What's a self-respecting e-mailer...

Author: /time Magazine | Title: Return of the Trojan Horse | 8/7/1998 | See Source »

Previous | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | Next