Search Details

Word: users (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...seem to have been wired since birth. During the first month of her course, teacher Fulton, who designed the class two years ago, exhorts her students to conquer the Net before they do anything else. They become comfortable using BBSs (bulletin-board systems), IRC (Internet Relay Chat), MUDs (multiple-user dungeons), Usenet newsgroups and such World Wide Web browsers as Mosaic and Gopher. But Fulton also engages them in discussions of related social and political issues such as privacy, universal access and the role of governmental regulation...

Author: /time Magazine | Title: 2001: A MEDIA ODYSSEY | 3/1/1995 | See Source »

...half of West Coast cyberspace into an electronic brawl and got myself banished from the WELL. (They let me back two months later.) I moved on to the big commercial services: CompuServe, Prodigy, GEnie, Delphi and America Online, as well as half a dozen Internet systems. I had more user IDs (electronic addresses) than I sometimes had dollars in my bank account...

Author: /time Magazine | Title: CONFESSIONS OF A CYBERHOLIC | 3/1/1995 | See Source »

...drink, he pours me a glass. He's already banished his two sons to the Home Theater. They have cranked up the set-top box they got for Christmas. Patch this baby into your HDTV, and you can cruise the Metaverse, wander the Web and choose from among several user-friendly operating systems, each one rife with automatic help systems, customer-service hot lines and intelligent agents. The theater's subwoofer causes our silverware to buzz around like sheet-metal hockey players, and amplified explosions knock swirling nebulas of tiny bubbles loose from the insides of our champagne glasses. Those...

Author: /time Magazine | Title: THE GREAT SIMOLEON CAPER | 3/1/1995 | See Source »

...women who, in person, were much the same as they were online. That is often not the case. The disembodied voices that whisper through cyberspace can often be manufactured identities that can disguise, distort or amplify aspects of a user's personality. Fortunately, only a relative few -- Lotharios who woo indiscriminately, for example, or pederasts who prey on vulnerable children -- have a devious and potentially dangerous intent. Most Net users are more likely to project aspects of the person they wish they could be. Paulina Borsook, author of Love over the Wires, calls this ``selective lying by omission''; psychologist Kenneth...

Author: /time Magazine | Title: INTIMATE STRANGERS | 3/1/1995 | See Source »

PASSWORD SNIFFERS: These tiny programs are hidden on a network and instructed to record logons and passwords, which are then stored in a secret file. By the end of a week, this file can contain hundreds of user names and their associated passwords. Last year an advisory from Carnegie Mellon University's Computer Emergency Response Team warned that, as a result of a rash of sniffing attacks, tens of thousands of passwords had been stolen and were presumed to be compromised...

Author: /time Magazine | Title: CRACKS IN THE NET | 2/27/1995 | See Source »

Previous | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | Next