Word: computerize
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
These commands are widely known and used by computer literate students at Harvard. I e-mailed the Harvard Computer Security Group about this last year, and received a terse reply that should I feel that someone is invading my privacy, I should consult my Senior Tutor.
Leaving aside that fact that I can't know who has "finger"ed or "last"ed me and thus have no basis for complaint, the idea that privacy should be protected only when someone feels in personal danger is rubbish. They also remarked that to disable the "last" command, or...
Some people find finger a useful tool; those in the know use it to "talk" friends across campus, to see if someone's read their mail or just to keep tabs on their friends. Some people have what the computer literate refer to as a "stalk script" to let them...
I suggest that "finger" provide only a person's real name, his or her ".plan" file and where the person is logged on only if the person is currently at the terminal. Computer stalking is, unfortunately, not rare. I know at least three students who have felt that someone was...
Harvard Security right now has a very limited ability to respond to computer stalking, since valid and not valid uses are indistinguishable by automatic checks. Please e-mail Harvard Computer Security (security@fas.harvard.edu) and ask them why they haven't followed the lead of many other campuses including Cornell and Brown...