Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade. "
Kevin Mitnick
Young
Now
Stupid
Related Quotes:
" Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. "
Kevin Mitnick
Difficult
Key
Against
" Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis. "
Kevin Mitnick
Proactive
People
Thinking
" A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. "
Kevin Mitnick
Company
Technology
Security
" New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing. "
Kevin Mitnick
Security
New
Game
" I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities. "
Kevin Mitnick
Up
Time
Security
" Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. "
Kevin Mitnick
Big
Business
Curiosity
" The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president! "
Kevin Mitnick
Parking
Hacker
Creating
" A log-in simulator is a program to trick some unknowing user into providing their user name and password. "
Kevin Mitnick
Some
Program
Trick
" At the end of the day, my goal was to be the best hacker. "
Kevin Mitnick
Best
Day
End
" The hacker mindset doesn't actually see what happens on the other side, to the victim. "
Kevin Mitnick
Hacker
Victim
Side
" Should we fear hackers? Intention is at the heart of this discussion. "
Kevin Mitnick
Discussion
Intention
Heart
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology. "
Kevin Mitnick
Learning
Technology
Obstacles
" Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn't have enough space on my 200 megabyte hard drive. "
Kevin Mitnick
Hard
University
Space
" Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced. "
Kevin Mitnick
Expert
Needs
Funding
" My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems. "
Kevin Mitnick
I Can
Security
Exploring
" I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast. "
Kevin Mitnick
Joy
Like
Myself
" Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else. "
Kevin Mitnick
People
Control
Management
" The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care. "
Kevin Mitnick
Care
Interesting
Reality
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" We have problems with our physical security, operational security through to management. "
Kevin Mitnick
Through
Management
Problems
" Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me. "
Kevin Mitnick
I Am
Well
Want
" You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk. "
Kevin Mitnick
Possible
Never
You
" The hacking trend has definitely turned criminal because of e-commerce. "
Kevin Mitnick
Hacking
Criminal
Because
" Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984. "
Kevin Mitnick
Ear
Computers
Set
" My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime. "
Kevin Mitnick
Crime
Punishment
Argument
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Kevin Mitnick
Legal
Actions
Degree
" I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything. "
Kevin Mitnick
Me
Myself
Support
" I was an accomplished computer trespasser. I don't consider myself a thief. "
Kevin Mitnick
Accomplished
Thief
Myself
" I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator. "
Kevin Mitnick
School
Me
Computers