Search Details

Word: users (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

This information was logged in a file that could be read by any user who knew its location...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...grey area whether looking at the logfile breaks our rules," Steen said. "We say youcannot look at a user's files if they leave themopen by accident, but these files were [not] ownedby [any specific student...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

When combined, these commands allow a user topiece together some of the information in the logfile, as well providing users the means to observeothers' activities...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...informers is full of squirrelly characters is no surprise. You can't expect Boy Scouts to tell you much about the seedier corners that law enforcement needs to poke into. Even so, there may not be many government informants more rough-edged than Michael Fitzpatrick. Convicted bomber, alleged coke user, he is also the man whose accusations led to the arrest of Qubilah Shabazz, a daughter of Malcolm X, two weeks ago. In an increasingly controversial case, Fitzpatrick's credibility has become central to the government's charge that she tried to hire a hit man to kill Nation...

Author: /time Magazine | Title: FOLLOW THE LEADER | 1/30/1995 | See Source »

...more than a hot pot, it's a Hot Shot....We think it's powered by nuclear fusion," says one proud user...

Author: By Lindsey M. Turrentine, | Title: Appliance Use High in Dorms, Houses | 1/25/1995 | See Source »

Previous | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | Next