Search Details

Word: users (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...user who viewed this file could read the names of students sending email and the recipients of their meassages...

Author: By Jonathan A. Lewin, | Title: Computer Changes Delayed | 2/3/1995 | See Source »

Currently the names of the files studentsdownloaded are still in the log file, though theycan only be read by someone with "super user"privileges...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...outlined three common situations of piracywhich could make a criminal of a friendly-andunaware-computer user: copying commercial softwarefrom a friend, allowing a friend to copycommercial software from you, or using sharewarewithout registering...

Author: By Douglas M. Pravda, | Title: MIT Piracy Case Shows Technology Laws Lacking | 2/1/1995 | See Source »

There are about 10,000 user accounts on "fas," and over 2000 megabytes of disk space are dedicated to the mail spool. If too many individual users unwittingly let their inboxes grow without deleting or filing old mail, the overall mail spool may fill to capacity (currently it hovers around 87 percent). A full mail spool means that nobody's incoming mail can be stored--and thus the e-mail system comes to a screeching halt...

Author: By Eugene Koh, | Title: The Mail Spool Tragedy | 2/1/1995 | See Source »

...User who do not tidy up their inboxes after two warnings will have the contents of their inboxes transferred to their personal directories automatically. Mail privileges will not be revoked, and no mail will be lost in the process. But for users unfamiliar with the UNIX "compress" program, retrieving these messages may be an unpleasant experience...

Author: By Eugene Koh, | Title: The Mail Spool Tragedy | 2/1/1995 | See Source »

Previous | 281 | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 289 | 290 | 291 | 292 | 293 | 294 | 295 | 296 | 297 | 298 | 299 | 300 | 301 | Next