Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me. "
Kevin Mitnick
I Am
Well
Want
Related Quotes:
" It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker. "
Kevin Mitnick
Security
True
Better
" I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization. "
Kevin Mitnick
Hacking
Hacker
Never
" Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else. "
Kevin Mitnick
People
Control
Management
" I was an accomplished computer trespasser. I don't consider myself a thief. "
Kevin Mitnick
Accomplished
Thief
Myself
" I did get a huge endorphin rush when I was able to crack a system because it was like a video game. "
Kevin Mitnick
Like
Because
Crack
" Anything out there is vulnerable to attack given enough time and resources. "
Kevin Mitnick
Enough
Time
Attack
" When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no. "
Kevin Mitnick
You
Identity
Information
" For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me. "
Kevin Mitnick
Thought
Time
Story
" I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company. "
Kevin Mitnick
Hacker
Better
Control
" Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws. "
Kevin Mitnick
Dive
People
Data
" I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. "
Kevin Mitnick
Where
Computer
Case
" My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime. "
Kevin Mitnick
Crime
Punishment
Argument
" Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties. "
Kevin Mitnick
Say
Results
Serious
" I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything. "
Kevin Mitnick
Me
Myself
Support
" I made stupid decisions as a kid, or as a young adult, but I'm trying to be now, I'm trying to take this lemon and make lemonade. "
Kevin Mitnick
Young
Now
Stupid
" Sometimes I get a call from my bank, and the first thing they ask is, 'Mr. Mitnick, may I get your account number?' And I'll say, 'You called me! I'm not giving you my account number!' "
Kevin Mitnick
You
Bank
Giving
" Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause. "
Kevin Mitnick
Legal
Actions
Degree
" The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme. "
Kevin Mitnick
Enough
Government
Stupid
" I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. "
Kevin Mitnick
School
Teacher
Think
" I saw myself as an electronic joy rider. "
Kevin Mitnick
Myself
Rider
Saw
" I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government. "
Kevin Mitnick
Magic
Hacker
Government
" The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president! "
Kevin Mitnick
Parking
Hacker
Creating
" A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people. "
Kevin Mitnick
Important
Fire
Train
" My primary goal of hacking was the intellectual curiosity, the seduction of adventure. "
Kevin Mitnick
Adventure
Curiosity
Goal
" If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk. "
Kevin Mitnick
People
Risk
Circle
" New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing. "
Kevin Mitnick
Security
New
Game
" One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone. "
Kevin Mitnick
Class
Company
Home
" A log-in simulator is a program to trick some unknowing user into providing their user name and password. "
Kevin Mitnick
Some
Program
Trick
" Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. "
Kevin Mitnick
Details
Numbers
Important
" I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there. "
Kevin Mitnick
Future
Jail
Learn