Choose language

Forgot your password?

Need a Spoofbox account? Create one for FREE!

No subscription or hidden extras

Login

#hacker

Read through the most famous quotes by topic #hacker




Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.


Kevin Mitnick


#again #beating #because #become #best

Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.


Kevin Mitnick


#any #cause #conduct #degree #depends

I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.


Kevin Mitnick


#characterize #companies #hacker #i #improve

I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.


Kevin Mitnick


#better #company #control #fascinated #get

I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.


Kevin Mitnick


#authorization #before #compared #did #difference

It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.


Kevin Mitnick


#become #becoming #better #bugs #code

New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.


Kevin Mitnick


#because #between #constantly #full #game

Should we fear hackers? Intention is at the heart of this discussion.


Kevin Mitnick


#fear #hackers #heart #intention #should

The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.


Kevin Mitnick


#allows #engineering #gain #hacker #influencing

When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.


Kevin Mitnick


#along #another #attack #company #departments






back to top