Choose language

Forgot your password?

Need a Spoofbox account? Create one for FREE!

No subscription or hidden extras

Login

#la

Read through the most famous quotes by topic #la




A divorce lawyer is a chameleon with a law book.


Marvin Mitchelson


#chameleon #divorce #law #lawyer

My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims.


Kevin Mitnick


#claims #companies #constituted #despite #expenses

It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills.


Kevin Mitnick


#computer #computers #decades #describe #enthusiasts

Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate.


Kevin Mitnick


#appropriate #attacks #big #both #engineering

I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.


Kevin Mitnick


#back #class #computer #days #first

I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later.


Kevin Mitnick


#actually #allegedly #apparently #appeal #case

No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.


Kevin Mitnick


#anything #attempted #break #classified #complete

Once when I was a fugitive, I was working for a law firm in Denver.


Kevin Mitnick


#firm #fugitive #i #law #law firm

Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.


Kevin Mitnick


#attachment #click #computer #convince #deception

Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.


Kevin Mitnick


#benefits #comply #deception #engineering #get






back to top