Search Details

Word: ips (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...this story. According to Hoctor, Harvard made several key suggestions that were eventually implemented, such as the necessity of making DiscoveryGate compatible with Macintosh computers in order for it to be viable in academic and corporate research and integrating a searchable index into the software. Anyone with a Harvard IP address can download the DiscoveryGate software platform through https://discoverygate.com...

Author: By Yelena S. Mironova, CONTRIBUTING WRITER | Title: Harvard Buys Chemical Software | 10/31/2006 | See Source »

...Brazilian prosecutors say that pedophiles, anti-Semites and racists are also using Orkut to peddle less innocuous messages. And they accuse Google of protecting them by balking at revealing the IP addresses and other information that could help law enforcement track them down. A judge last week gave Google 15 days to hand over the incriminating data or face a daily fine equal to $900,000. "Making it easier for those Brazilians who use anonymity of Orkut to commit crimes of child pornography and racism reflects a profound disrespect for national sovereignty," Judge Jos? Marcos Lunardelli said in last week...

Author: /time Magazine | Title: Google and the Pedophiles | 9/6/2006 | See Source »

...Manar, widely considered a mouthpiece for Hizballah and categorized as a terrorist group by the U.S., linked to the small cable company's IP (Internet Protocol) address, which can be thought of, in simple terms, as a telephone number. Hizballah essentially added an extension on that telephone line allowing their traffic to flow. Hizballah then gets the word out through e-mail and blogs that it can be found at that IP address and the hijack is complete. If the hijack is not detected, the IP address can be linked to a new domain name and that opens...

Author: /time Magazine | Title: How Hizballah Hijacks the Internet | 8/8/2006 | See Source »

...self-described "freelance counterterrorists" who sit in home offices and dens tracking jihadist activity on the Internet. In turn, they alert the media or simply call the hijacked company. Alerted to the south Texas hijack, the cable company's communications provider reported the incident to U.S. authorities and the IP address was shut down...

Author: /time Magazine | Title: How Hizballah Hijacks the Internet | 8/8/2006 | See Source »

...technology and our mole, posing as the subject's longtime friend, who asked to use his computer to check e-mail but, when the subject was in the bathroom, actually viewed his browser's history. Please note that while the usage is confirmed as the subject's, the actual IP address originates with his elderly next-door neighbor's wireless connection...

Author: /time Magazine | Title: Googling for the CIA | 6/23/2006 | See Source »

First | Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | Next | Last