Search Details

Word: pilfering (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...year-old grandmother who had been standing at the meat counter next to me was only biding her time before jumping me. For several weeks, my irrational paranoia led me to believe that any stranger within two miles of me was almost certainly a sociopath waiting to pilfer my vintage Nokia. For the rest of the summer, I only visited the ATM wearing running shoes so that I could sprint the three blocks back to my apartment. Logically, I knew that the odds of getting mugged again were about the same as going to Friday morning lecture, but I couldn?...

Author: By Peter W. Tilton, CRIMSON STAFF WRITER | Title: One Night in Bogotá... | 4/15/2010 | See Source »

Café operations manager Mark A. Terrelonge ’10 said from his perch behind the counter late last night that even when the cafe was locked-down after 2 a.m., desperate students appeared able to pilfer fuel for their cram sessions...

Author: By Bonnie J. Kavoussi | Title: Students Steal Red Bulls for All-Nighters, Lamont Retaliates | 9/23/2009 | See Source »

...owner Andy Shallal describes his joint's vibe - Busboys and Poets is where anarchy may ensue. A sweep of its clientele reveals a young crowd, Googling and iPhoning away. A strongly community-oriented spot, all are welcome, even if you only order one coffee to share between three and pilfer the WiFi. Humming, breathless chatter between foxy patrons and staff adds to the intrigue of the place, where the famished can nosh on Mahi Mahi sandwiches or wheatberry salads and the thirsty can swig anything from aromatic coffee to the DC Tap Water cocktail, a popular favorite according to manager...

Author: /time Magazine | Title: A D.C. Club Guide for Inaugural Weekend | 1/17/2009 | See Source »

...make matters worse, there are plenty of other weapons in the cybercriminal's arsenal. It's also possible, for example, to pilfer confidential data from secure networks by mounting Trojan e-mail attacks. These infect a PC by e-mail, using a program that runs undetected in the background. Free to perform tasks usually reserved for the system's owner, the invader can remotely swipe passwords, upload documents and transmit new attacks. In a report published in 2005, Britain's government-backed National Infrastructure Security Co-ordination Centre released details of a series of Trojan e-mail attacks...

Author: /time Magazine | Title: Under Attack, Over the Net | 5/31/2007 | See Source »

...also “I read your blog.” Bet she’s never gotten that pick-up line before. Some Quincy seniors dressed as Harlem Globetrotters practiced routines for the AD, and rounded off the night attempting to pilfer cookie dough from the Grille. Also: cops came to Story Street! And: the Lampoon had a party! The Christmas decor at FM’s resident misogynist’s house was featured in this month’s Milwaukee Home Magazine...

Author: NO WRITER ATTRIBUTED | Title: Chatter | 11/1/2006 | See Source »

| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | Next