Search Details

Word: unix (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

Students close to HASCS said this week thatHASCS has only two Unix programmers and needs tohire more to adequately handle the work of serving10,000 users...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...Finger" is another Unix command that givessimilar information. It reports the name of thelast computer a student used and when they usedit...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...Some commands are so entrenched into Unix thatyou just can't remove them," Gwertzman said. "Inorder to verify some users, World Wide Web serversfinger the person accessing them and they won'twork if finger doesn't work...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

History of Unix...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Steen said one reason that HASCS is dealingwith these issues on a case by case basis is thehistory of Unix, the operating system that runsmost of the HASCS machines...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Previous | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | Next