Search Details

Word: users (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...frightening evidence of how, as the medium has matured, its architects' noble commitment to the user's privacy was becoming inverted. What was once a protective shield has now morphed into an obscuring cloak of anonymity. Inventive screen names and coy e-mail addresses have replaced those conventional signs of identity: a name, a face. Under the banner of privacy, Internet anonymity has become the ultimate plain brown wrapper. Some parents who decline to monitor their kids' online chatting liken it to eavesdropping on their phone calls, which they say they would never do. But there's a difference: when...

Author: /time Magazine | Title: Raising Kids Online | 5/10/1999 | See Source »

...process is relatively painless. First you register your eBook on the Internet to get the user name and password you'll need to make purchases online. Then you browse the B&N website. When you select a book you want, it's encrypted and beamed to your desktop computer. You can store it there or send it on to your eBook using a simple "librarian" software interface...

Author: /time Magazine | Title: E-Book Report | 5/3/1999 | See Source »

Ways to do this could be through this very mouthpiece of popular information consumption, making sure that entryway tutors announce it at the mandatory meetings at the beginning of each year, or coming up with a more user-friendly interface for the University alcohol policy. In any case, though, the events I witnessed last Saturday night lead me to believe that the current state of affairs may be a tragedy waiting to happen. Dan Epstein Dan Epstein '99 is a Slavic languages and literatures concentrator in Quincy House...

Author: NO WRITER ATTRIBUTED | Title: Ignorance Can Be Lethal | 4/30/1999 | See Source »

...They [the Science Center User Assistants] told me my hard drive was erased and that they couldn't see me until next Sunday," Eil said. "That doesn't help much...

Author: By Robin M. Wasserman, CONTRIBUTING WRITER | Title: Chernobyl Virus Strikes Harvard Computers | 4/28/1999 | See Source »

According to the CERT Welside the virus, which only affects computers running Windows 95 or 98, overwrites part of a computer's hard drive with random data. This leads the computer to think that the hard drive is empty, preventing a user from accessing the drive's files...

Author: By Robin M. Wasserman, CONTRIBUTING WRITER | Title: Chernobyl Virus Strikes Harvard Computers | 4/28/1999 | See Source »

Previous | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | Next