Search Details

Word: using (lookup in dictionary) (lookup stats)
Dates: during 2000-2000
Sort By: most recent first (reverse)


Usage:

Tort reform seemed inevitable, but after six weeks of negotiations in the spring of 1995, the package stalled over the issue of capping the punitive damages that juries use to punish defendants. Bush and the Republicans wanted a cap of $100,000; Bullock and the Democrats wanted it set at $1 million. When Bush refused to budge, state senator David Sibley, a Republican ally, told him the bill could die. Bush invited Sibley to the mansion for dinner that night. While they were eating, the phone rang. It was Bullock, calling to deliver something he was famous...

Author: /time Magazine | Title: Campaign 2000: Bush and McCain: Who Is The Real Reformer? | 2/21/2000 | See Source »

...supporters in the U.S. are twisting arms too, and it may be working. The same day Mandelson announced the suspension, the body in charge of decommissioning reported "valuable progress" from the I.R.A.'s representative, who declared that the group will now "consider how to put arms and explosives beyond use." That was too elliptical to keep Mandelson from pulling the plug, but it offers hope for a relatively short hiatus...

Author: /time Magazine | Title: Armed and Not Ready | 2/21/2000 | See Source »

...this was not mere vandalism either; too much planning had gone into it. Phase 1 took place as early as last year. The culprit first scanned the Internet for vulnerable networks to use as unwitting allies in the final attack. Small businesses and universities, where security is often more lax, are prime targets. Both Stanford and the University of California at Santa Barbara had been co-opted. A UCSB computer participated in the CNN website attack. Even the Navy's computers may have been enlisted as unwilling dupes...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

...terms of my release permitted me to do so, I'd tell the people running the sites that were hit three things, all of which they may have done by now: 1) use a network-monitoring tool to analyze the packets being sent to determine their source, purpose and destination; 2) place your machines on different subnetworks of the larger network in order to present multiple defenses; and 3) install software tools that use packet filtering on the router or fire wall to reject any packets from known sources of denial-of-service traffic...

Author: /time Magazine | Title: The World's Most Hunted Hacker | 2/21/2000 | See Source »

With history as our guide, we can expect that the government will use this event to push through legislation authorizing digital wiretapping without court orders, to outlaw encryption that the government cannot crack and to track the location of cell-phone users without their knowledge. They'll push laws that eliminate individual rights in exchange for more government "protection" against cybercrime...

Author: /time Magazine | Title: The World's Most Hunted Hacker | 2/21/2000 | See Source »

First | Previous | 371 | 372 | 373 | 374 | 375 | 376 | 377 | 378 | 379 | 380 | 381 | 382 | 383 | 384 | 385 | 386 | 387 | 388 | 389 | 390 | 391 | Next | Last