- Warren Buffet
- Abraham Lincoln
- Charlie Chaplin
- Mary Anne Radmacher
- Alice Walker
- Albert Einstein
- Steve Martin
- Mark Twain
- Michel Montaigne
- Voltaire
Find one of the best and famous quote catagorized into topics like inspirational, motivations, deep, thoughtful, art, success, passion, frindship, life, love and many more.
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
Kevin Mitnick
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management.
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
Hacking is exploiting security controls either in a technical, physical or a human-based element.
Should we fear hackers? Intention is at the heart of this discussion.
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
I saw myself as an electronic joy rider.
I wasn't a hacker for the money, and it wasn't to cause damage.
As a young boy, I was taught in high school that hacking was cool.
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
The hacker mindset doesn't actually see what happens on the other side, to the victim.
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.
My primary goal of hacking was the intellectual curiosity, the seduction of adventure.
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
To some people I'll always be the bad guy.
At the end of the day, my goal was to be the best hacker.