Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
Related Quotes:
" If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection. "
Kevin Mitnick
You
Service
Hacker
" I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government. "
Kevin Mitnick
Magic
Hacker
Government
" The Internet is like the phone. To be without it is ridiculous. "
Kevin Mitnick
Ridiculous
Internet
Without
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. "
Kevin Mitnick
Enough
Government
Stupid
" Of course I'm sure half the people there hate me and half the people like me. "
Kevin Mitnick
Half
Hate
Sure
" Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!' "
Kevin Mitnick
You
Bank
Giving
" I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later. "
Kevin Mitnick
Witness
Guy
Source
" One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone. "
Kevin Mitnick
Class
Company
Home
" A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. "
Kevin Mitnick
Company
Technology
Security
" The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications. "
Kevin Mitnick
Government
Everyone
Patriot
" Hacking is exploiting security controls either in a technical, physical or a human-based element. "
Kevin Mitnick
Physical
Technical
Hacking
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
Kevin Mitnick
You
Data
Back
" I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked. "
Kevin Mitnick
Technology
Me
Hacking
" I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities. "
Kevin Mitnick
Up
Time
Security
" Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate. "
Kevin Mitnick
Social
Used
Hybrid
" Choosing a hard-to-guess, but easy-to-remember password is important! "
Kevin Mitnick
Important
Choosing
" It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills. "
Kevin Mitnick
Skill
Computers
People
" Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders. "
Kevin Mitnick
Human
Human Nature
Nature
" Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms. "
Kevin Mitnick
Hacker
Become
Security
" Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker. "
Kevin Mitnick
Action
Organization
Influence
" The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network. "
Kevin Mitnick
Engineering
Key
Information
" Some people think technology has the answers. "
Kevin Mitnick
Think
People
Some People
" When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care. "
Kevin Mitnick
More
Media
Care
" Anything out there is vulnerable to attack given enough time and resources. "
Kevin Mitnick
Enough
Time
Attack
" I characterize myself as a retired hacker. I'm applying what I know to improve security at companies. "
Kevin Mitnick
Security
Know
Improve
" For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me. "
Kevin Mitnick
Thought
Time
Story
" Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail. "
Kevin Mitnick
Human
Engineering
Deception
" But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive security actually returns, gives them a return on investment, it's still a hard sell for people. "
Kevin Mitnick
Investment
See
Look
" It doesn't work the same way everywhere. The Americans are the most gullible, because they don't like to deny co-workers' requests. People in the former Soviet bloc countries are less trusting, perhaps because of their previous experiences with their countries' secret services. "
Kevin Mitnick
Co-Workers
Work
Way