-
It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills.
Kevin Mitnick
-
I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast.
Kevin Mitnick
-
For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me.
Kevin Mitnick
-
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
Kevin Mitnick
-
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
Kevin Mitnick
-
The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
Kevin Mitnick
-
I wasn't a hacker for the money, and it wasn't to cause damage.
Kevin Mitnick
-
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
Kevin Mitnick
-
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
Kevin Mitnick
-
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
Kevin Mitnick
-
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.
Kevin Mitnick
-
When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
Kevin Mitnick
-
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
Kevin Mitnick
-
Should we fear hackers? Intention is at the heart of this discussion.
Kevin Mitnick
-
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
Kevin Mitnick
-
When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no.
Kevin Mitnick
-
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
Kevin Mitnick
-
No company that I ever hacked into reported any damages, which they were required to do for significant losses. Sun didn't stop using Solaris and DEC didn't stop using VMS.
Kevin Mitnick
-
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
Kevin Mitnick
-
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
Kevin Mitnick
-
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
Kevin Mitnick
-
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
Kevin Mitnick
-
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime.
Kevin Mitnick
-
I was pretty much the government's poster boy for what I had done.
Kevin Mitnick
