Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" Choosing a hard-to-guess, but easy-to-remember password is important! "
Kevin Mitnick
Important
Choosing
Related Quotes:
" So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock. "
Kevin Mitnick
Through
Lock
Software
" I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government. "
Kevin Mitnick
Magic
Hacker
Government
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
Kevin Mitnick
You
Data
Back
" I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree. "
Kevin Mitnick
Think
Risk
Point
" My primary goal of hacking was the intellectual curiosity, the seduction of adventure. "
Kevin Mitnick
Adventure
Curiosity
Goal
" As a young boy, I was taught in high school that hacking was cool. "
Kevin Mitnick
Boy
Young
School
" The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. "
Kevin Mitnick
Enough
Government
Stupid
" Once when I was a fugitive, I was working for a law firm in Denver. "
Kevin Mitnick
Once
Law
Firm
" To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks. "
Kevin Mitnick
Mistake
Credit
Web
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Kevin Mitnick
Legal
Actions
Degree
" When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no. "
Kevin Mitnick
You
Identity
Information
" Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets. "
Kevin Mitnick
Internet
Environment
Yourself
" I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later. "
Kevin Mitnick
Witness
Guy
Source
" Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. "
Kevin Mitnick
Say
Results
Serious
" My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems. "
Kevin Mitnick
I Can
Security
Exploring
" Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management. "
Kevin Mitnick
Day
People
Management
" I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked. "
Kevin Mitnick
Technology
Me
Hacking
" I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator. "
Kevin Mitnick
School
Me
Computers
" The hacker mindset doesn't actually see what happens on the other side, to the victim. "
Kevin Mitnick
Hacker
Victim
Side
" The Internet is like the phone. To be without it is ridiculous. "
Kevin Mitnick
Ridiculous
Internet
Without
" If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. "
Kevin Mitnick
People
Risk
Circle
" We have problems with our physical security, operational security through to management. "
Kevin Mitnick
Through
Management
Problems
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" I was an accomplished computer trespasser. I don't consider myself a thief. "
Kevin Mitnick
Accomplished
Thief
Myself
" I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it? "
Kevin Mitnick
Security
Why
Phone
" It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. "
Kevin Mitnick
Skill
Computers
People
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" So the ethic I was taught in school resulted in the path I chose in my life following school. "
Kevin Mitnick
Taught
Life
My Life
" I did get a huge endorphin rush when I was able to crack a system because it was like a video game. "
Kevin Mitnick
Like
Because
Crack
" Hacking is exploiting security controls either in a technical, physical or a human-based element. "
Kevin Mitnick
Physical
Technical
Hacking