Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms. "
Kevin Mitnick
Hacker
Become
Security
Related Quotes:
" I wasn't a hacker for the money, and it wasn't to cause damage. "
Kevin Mitnick
Damage
Cause
Hacker
" The Internet is like the phone. To be without it is ridiculous. "
Kevin Mitnick
Ridiculous
Internet
Without
" Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. "
Kevin Mitnick
Big
Business
Curiosity
" Choosing a hard-to-guess, but easy-to-remember password is important! "
Kevin Mitnick
Important
Choosing
" I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control. "
Kevin Mitnick
Short
Enough
Control
" Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis. "
Kevin Mitnick
Proactive
People
Thinking
" The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. "
Kevin Mitnick
Enough
Government
Stupid
" A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted. "
Kevin Mitnick
Company
Technology
Security
" I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. "
Kevin Mitnick
Where
Computer
Case
" Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes. "
Kevin Mitnick
You
Data
Back
" My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims. "
Kevin Mitnick
Actions
Pure
Government
" No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems. "
Kevin Mitnick
Way
Break
Government
" I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. "
Kevin Mitnick
Curiosity
Adventure
Challenge
" People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures. "
Kevin Mitnick
Information
People
Nice
" Some people think technology has the answers. "
Kevin Mitnick
Think
People
Some People
" I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. "
Kevin Mitnick
School
Teacher
Think
" For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system. "
Kevin Mitnick
Free
Average
Personal
" My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems. "
Kevin Mitnick
I Can
Security
Exploring
" Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws. "
Kevin Mitnick
Dive
People
Data
" All they need to do is to set up some website somewhere selling some bogus product at twenty percent of the normal market prices and people are going to be tricked into providing their credit card numbers. "
Kevin Mitnick
Need
Website
Credit
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" What I found personally to be true was that it's easier to manipulate people rather than technology. "
Kevin Mitnick
Be True
True
Technology
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Kevin Mitnick
Now
Job
Back
" We have problems with our physical security, operational security through to management. "
Kevin Mitnick
Through
Management
Problems
" So what I was essentially doing was, I compromised the confidentiality of their proprietary software to advance my agenda of becoming the best at breaking through the lock. "
Kevin Mitnick
Through
Lock
Software
" I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator. "
Kevin Mitnick
School
Me
Computers
" I was an accomplished computer trespasser. I don't consider myself a thief. "
Kevin Mitnick
Accomplished
Thief
Myself
" Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!' "
Kevin Mitnick
You
Bank
Giving
" Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. "
Kevin Mitnick
Say
Results
Serious
" When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no. "
Kevin Mitnick
You
Identity
Information