act
they are not -- they're system problems that result from hardware failures,
operator mistakes, and t... were
consuming practically all resources as the result of processing three
inconsistent routing updates... ent
Alarms", the software kept restarting as the result of overloading. Turned
out the radar switch was... (AP) - Something just didn't add up.
And the result is: five nuclear power plants are shut down;
mil
uble-helping of outrageous hacker legendry. As
a result, Condor was kept in solitary confinement for seve... based on cleverness and technical
mastery. As a result, it often seemed that the HEAVIER the
hackers wer... effective police protection, then vigilantism can result.
Telcos, banks, credit companies, the major corpo... nd made them fight it out all by themselves. The result
was a rather dire one for the Secret Service, for
RSONAL STYLE (STYLE, BY THE WAY, IS PRIMARILY THE
RESULT OF LIMITATIONS. TRY TO KEEP AN OPEN MIND AND DEVE... RUN THE PROGRAM. CHANCES ARE VERY GOOD THAT THE RESULT
WILL BE A COPYA VERSION OF THE DISK. BE AWARE, H... THE BYTES READ IN ARE
EOR'ED TOGETHER, AND IF THE RESULT, SHIFTED LEFT ONCE, IS NOT ZERO, THE READ IS
REDO... CE THE
ORIGINAL NIBBLES OF DF AND AA WERE NOT THE RESULT OF A PRENIBBLIZING PROCESS,
THEY WILL HAVE DISAPP
ding files to
the same other machine. This could result in connections with the following
parameters:
... sk one of the LCS
servers about BORAX. The final result would be the Internet address for
BORAX.LCS.MIT.E... g device at the SUBSCRIBER PREMISES will
result in a voltage change of less than 0.5 volt when me... vice at the CENTRAL OFFICE LOCATION will
result in a voltage change of less than 0.2 volt when me
spread through the Internet. This analysis is the result of a
study performed on three separate reverse-e... ed with
the value returned by netmaskfor and the result was passed to the
attack_network routine. If an ... -2a. Finally, it called
waithit and returned the result code of that routine. The object
files shipped a... crypt with the password attempt and compared
the result against the encrypted password in the pwd entry f
send, raising it to the power y and taking the
result (mod pq). The risky step (meeting to exchange ci... ,
I raise my plaintext a to your x and take the result (mod
your pq) and send that.
However, if... and
raise it to my (secret) power y , take the result (mod my
pq), then raise that result to your x (mod your pq) and
send this, then even after you have
lectric systems can be prone
to false alarms as a result of birds or wind-blown debris passing through t... yped to the computer. For example I(escape) would result
in the command INFORMATION. For further informati... spray painted onto the source's T-shirt.)
As a result, the interrogator loses sight of his objective an... ral uncertainty and guilt which a source has as a result of being detained
and questioned. Use of this tec
loss to person or damage to property which might result
from use of the partner's facilities. ...
Divide the result by 5.
The result is your percentage purity.
subject -- a New Jersey
newspaperman.... The result was a five-page, single-
spaced, typed report... hat privacy policies in
traditional media are the result of hard-won wisdom gained
from long experience.
This article is the result of contributions by people from every
facet of the Atari community. Many than... t are
unacceptably high on the download side may result in censure by
the sysop or loss of access. If a