Search Details

Word: spoofing (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Fans of the PBS children's show The Electric Company will recall a spoof of old radio detective programs; it was called Fargo North, Decoder. This indelible cultural reference aside, North Dakota's largest city has not received much media attention. So when Time correspondents Wendy Cole and Michael Duffy went to Fargo to report this week's story on the expected impact of federal budget cuts, the locals were flattered. "Countless times during my 10 days there," Cole says, "people asked what other towns we were visiting. When I told them none, they had trouble believing that their laid...

Author: /time Magazine | Title: To Our Readers: May 22, 1995 | 5/22/1995 | See Source »

...scratching, pesticide spraying assistant and helps ruin (if inadvertantly) his own party. Bob's penchant for poetry, pastels and pathetic pronouncements--"Hardly anyone flosses anymore, what's the points?--keeps his "Birthday" very much unlike any kind of morality play on again and marriage, which instead it chooses to spoof...

Author: By Sarah C. Dry, | Title: 'Spike and Mike' Do It Again | 4/27/1995 | See Source »

Written by Jordan M. Singer '97, the play combines a murder mystery with a spoof of college life at Harvard and is audience-interactive...

Author: By Alison D. Overholt, | Title: New Theater Group to Premiere This Spring | 4/18/1995 | See Source »

...first-year parody builds on a tradition begun in April of 1993 when a group of first-year students of the class of 1996 got together to produce "The Real Class of 1996," a spoof of an unsuccessful FOX television program of a similar name...

Author: By Amita M. Shukla, | Title: `Class of '98' Appears at Union | 4/14/1995 | See Source »

...SPOOFING: This is a technique for getting access to a remote computer by forging the Internet address of a trusted or "friendly" machine. It's much easier to exploit security holes from inside a system than from outside; the trick is to gain "root" status, the top-level access that the computer's administrator enjoys. With root status, a hacker could install a password sniffer or bogus software, like a "back door"-a secret return path into the machine. Mitnick was able to break into Shimomura's Fort Knox-like computer using a spoof...

Author: /time Magazine | Title: CRACKS IN THE NET | 2/27/1995 | See Source »

First | Previous | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | Next | Last