Search Details

Word: users (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

This information was logged in a file that could be read by any user who knew its location...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...grey area whether looking at the logfile breaks our rules," Steen said. "We say youcannot look at a user's files if they leave themopen by accident, but these files were [not] ownedby [any specific student...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

When combined, these commands allow a user topiece together some of the information in the logfile, as well providing users the means to observeothers' activities...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Steen said he is considering making the "last"command list the login times of only the user whois running...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

According to an FBI spokesperson in Washington,D.C. the agency could take legal action against aHarvard computer user if it had evidence that theuser transported obscene materials...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

Previous | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 289 | 290 | 291 | 292 | 293 | 294 | 295 | 296 | 297 | 298 | 299 | 300 | 301 | 302 | Next