Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" A log-in simulator is a program to trick some unknowing user into providing their user name and password. "
Kevin Mitnick
Some
Program
Trick
Related Quotes:
" Should we fear hackers? Intention is at the heart of this discussion. "
Kevin Mitnick
Discussion
Intention
Heart
" I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities. "
Kevin Mitnick
Up
Time
Security
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing. "
Kevin Mitnick
Security
New
Game
" People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. "
Kevin Mitnick
Information
People
Nice
" It's kind of interesting, because hacking is a skill that could be used for criminal purposes or legitimate purposes, and so even though in the past I was hacking for the curiosity, and the thrill, to get a bite of the forbidden fruit of knowledge, I'm now working in the security field as a public speaker. "
Kevin Mitnick
Knowledge
Past
Skill
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. "
Kevin Mitnick
Day
People
Management
" Some people think technology has the answers. "
Kevin Mitnick
Think
People
Some People
" I was an accomplished computer trespasser. I don't consider myself a thief. "
Kevin Mitnick
Accomplished
Thief
Myself
" A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people. "
Kevin Mitnick
Important
Fire
Train
" I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list. "
Kevin Mitnick
Mail
Jump
Me
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Kevin Mitnick
Legal
Actions
Degree
" It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. "
Kevin Mitnick
Skill
Computers
People
" I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator. "
Kevin Mitnick
School
Me
Computers
" The Internet is like the phone. To be without it is ridiculous. "
Kevin Mitnick
Ridiculous
Internet
Without
" I was hooked in before hacking was even illegal. "
Kevin Mitnick
Hooked
Even
Hacking
" Think about it: if you were running a multi-million dollar company, and your database of customer information was stolen, would you want to tell your clients? No. Most companies did not until the laws required them to. It's in the best interest of organisations - when they're attacked and information is stolen - to tell nobody. "
Kevin Mitnick
Best
Information
Customer
" I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there. "
Kevin Mitnick
Future
Jail
Learn
" Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker. "
Kevin Mitnick
Action
Organization
Influence
" If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient. "
Kevin Mitnick
Own
Security
Know
" For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system. "
Kevin Mitnick
Free
Average
Personal
" My primary goal of hacking was the intellectual curiosity, the seduction of adventure. "
Kevin Mitnick
Adventure
Curiosity
Goal
" I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me. "
Kevin Mitnick
Credit
Me
Trust
" Of course I'm sure half the people there hate me and half the people like me. "
Kevin Mitnick
Half
Hate
Sure
" Our Constitution requires that the accused be presumed innocent before trial, thus granting all citizens the right to a bail hearing, where the accused has the opportunity to be represented by counsel, present evidence, and cross-examine witnesses. "
Kevin Mitnick
Opportunity
Innocent
Constitution
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
Kevin Mitnick
You
Data
Back
" The hacker mindset doesn't actually see what happens on the other side, to the victim. "
Kevin Mitnick
Hacker
Victim
Side
" The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network. "
Kevin Mitnick
Engineering
Key
Information
" I wasn't a hacker for the money, and it wasn't to cause damage. "
Kevin Mitnick
Damage
Cause
Hacker