Search Details

Word: users (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...User assistants declined to comment on the policy change, but a former assistant familiar with University-Microsoft negotiations said he believed Microsoft changed its policy for fear of losing money due to piracy...

Author: By Erica R. Michelstein, CRIMSON STAFF WRITER | Title: Microsoft Restricts Usage Of Networked Software | 3/25/1999 | See Source »

...User assistants declined to comment on the policy change, but a former assistant familiar with University-Microsoft negotiations said he believed Microsoft changed its policy for fear of losing money due to piracy...

Author: By Erica R. Michelstein, CRIMSON STAFF WRITER | Title: Microsoft Restricts Use of Network Software | 3/25/1999 | See Source »

...network hub and the modem or high-speed connection for accessing the Internet. Many agree with 3Com that Ethernet remains the most reliable option, particularly for small businesses and home offices with no time to be anyone's beta tester. OfficeConnect looks easy enough, but it still requires users to string new cables and install circuit boards inside their computers. "Those add-in cards pretty much eliminate the casual user," says Bruce Kasrel, analyst with Forrester Research. "A lot of people who own PCs are afraid to open them." He expects to see, before long, more home-networking products make...

Author: /time Magazine | Title: Computers and People: Superconnected | 3/22/1999 | See Source »

...trouble. Guess what? All our networks--at least, the ones without encryption keys or extremely alert administrators--are in trouble. Why? Because this is the information age, and the average computer gives up far too much information about itself. Because a network is only as strong as its weakest user. And because the most common log-on password in the world, even in non-English speaking countries, is "password." With users like this, who needs enemies...

Author: /time Magazine | Title: Cracking The Code | 3/22/1999 | See Source »

...problem is this in the real world? "Rarely is there a moment when a hacker isn't trying to get into our networks," says a senior Microsoft executive. "People go looking for that weak link." Recently hackers found a backdoor through a user in Europe--an administrator, no less--with a blank password. This allowed the hacker root access--the ability to change everyone else's password, jump onto other systems and mess up the payroll file...

Author: /time Magazine | Title: Cracking The Code | 3/22/1999 | See Source »

Previous | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | Next