Feel Quotes
Categories
Authors
Professions
Nationalities
About
Author Index:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Kevin Mitnick
American
August 6, 1963
Businessman
I have done a lot to rehabilitate my reputation.
Kevin Mitnick
Tags:
Lot
Done
Reputation
Some people think technology has the answers.
Kevin Mitnick
Tags:
Technology
People
Think
The Internet is like the phone. To be without it is ridiculous.
Kevin Mitnick
Tags:
Like
Without
Internet
Should we fear hackers? Intention is at the heart of this discussion.
Kevin Mitnick
Tags:
Fear
Should
Heart
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
Kevin Mitnick
Tags:
Like
Being
Kind
No company that I ever hacked into reported any damages, which they were required to do for significant losses.
Kevin Mitnick
Tags:
Which
Were
Any
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984.
Kevin Mitnick
Tags:
World
Which
Jobs
The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
Kevin Mitnick
Tags:
More
Than
Would
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
Kevin Mitnick
Tags:
Get
How
Over
I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology.
Kevin Mitnick
Tags:
Technology
Learning
About
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
Kevin Mitnick
Tags:
Government
Never
Way
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing.
Kevin Mitnick
Tags:
Because
Up
New
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
Kevin Mitnick
Tags:
Computers
You
Which
I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we've always found a hole.
Kevin Mitnick
Tags:
Get
Always
Our
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
Kevin Mitnick
Tags:
People
About
Most
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn't covered by data secrecy laws.
Kevin Mitnick
Tags:
People
About
Because
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess.
Kevin Mitnick
Tags:
You
People
Like
I use Spam Arrest because of the amount of junk mail I get. Any legitimate person who wants to send me a message has to jump through hoops before they can be added to my opt-in list.
Kevin Mitnick
Tags:
Me
Who
Because
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
Kevin Mitnick
Tags:
Know
Our
Why
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks.
Kevin Mitnick
Tags:
You
Because
Your
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
Kevin Mitnick
Tags:
Think
Lot
Then
Protecting yourself is very challenging in the hostile environment of the Internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses and exploit them to gain access to your most sensitive secrets.
Kevin Mitnick
Tags:
Very
Your
Them
If you go to a coffee shop or at the airport, and you're using open wireless, I would use a VPN service that you could subscribe for 10 bucks a month. Everything is encrypted in an encryption tunnel, so a hacker cannot tamper with your connection.
Kevin Mitnick
Tags:
You
Your
Would
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.
Kevin Mitnick
Tags:
Like
More
Really
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
Kevin Mitnick
Tags:
Teacher
Me
Think
When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.
Kevin Mitnick
Tags:
Like
Know
Will
People are prone to taking mental shortcuts. They may know that they shouldn't give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures.
Kevin Mitnick
Tags:
Fear
People
Out
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
Kevin Mitnick
Tags:
You
People
Your