Search Details

Word: users (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Experts have long predicted that personal computers would be a great new market, but sales were hindered because the equipment was too complicated for most people. Now manufacturers have started marketing products that are both cheaper and less technically complex. In the jargon of the business, computers have become "user friendly...

Author: /time Magazine | Title: Small-Computer Shootout | 3/2/1981 | See Source »

...assume that all street marijuana is contaminated with a number of fungi and molds that can be inhaled by the user," Kagan said in Milwaukee last week, adding that illegal marijuana is "a significant health hazard...

Author: By Janet F. Fifer, | Title: Scientist Finds Fungus In Marijuana | 2/24/1981 | See Source »

Recognizing the threat from computer cons, many banks have installed complex safeguards. Complicated codes are used to thwart unauthorized computer use, and some systems use special programs called audit trails that record every transaction and the user. Computer-security experts, however, admit that many criminals are easily staying one step ahead of the precautions. Says Robert Campbell, president of Advanced Information Management Inc.: "I guess we're at the same stage as when we first started putting locks on the doors of our houses. They kept schoolchildren and stray animals out, but for the person who is really determined...

Author: /time Magazine | Title: The Wells Fargo Stickup | 2/16/1981 | See Source »

Epps made an agreement last spring allowing Olive to make restitution payments for the money allegedly embezzled because he thought the former manager was "a drug user" and needed help. Olive recently paid back $5000 to HDNS...

Author: NO WRITER ATTRIBUTED | Title: University Officials to Discuss HDNS | 1/13/1981 | See Source »

...named ploys: superzapping (penetrating a computer by activating its own emergency master program, an act comparable to opening a door with a stolen master key); scavenging (searching through stray data or "garbage" for clues that might unlock still other secrets); and piggybacking (riding into a system behind a legitimate user...

Author: /time Magazine | Title: Science: Superzapping in Computerland | 1/12/1981 | See Source »

Previous | 388 | 389 | 390 | 391 | 392 | 393 | 394 | 395 | 396 | 397 | 398 | 399 | 400 | 401 | 402 | 403 | 404 | 405 | 406 | 407 | 408 | Next