Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
worm
Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes.
exploiting explore hacking network systems telephone type
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.
five fugitive future return spending
I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there.
alarm average checks download needs program recommend running system zone
For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system.
access code computer exploring hacking involved obtaining operating source systems within
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
acceptable mitigate remove
You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
copied
I was an accomplished computer trespasser. I don't consider myself a thief. I copied without permission.
access account address companies computer contain devices dollars link measures millions money none operate people protected secure systems wasted weakest
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.
american-celebrity proactive seen software stereotype
I can't really stereotype the whole industry, but they'll be proactive about anti-virus software because they've already seen the effects.
acceptable basically break computer intrigued judgment poor security socially solving
It's still basically just solving a puzzle, ... Years ago, with poor judgment, I was intrigued to break through security on computer systems. Now I do it with the client's permission, for socially acceptable reasons.
hard
It's going to be very, very hard for him,
definitely turned
The hacking trend has definitely turned criminal because of e-commerce.
entertainment fbi hacking huge longer mind occupy video
Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.
money
I wasn't a hacker for the money, and it wasn't to cause damage.