Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
act blank government hacks interested patriot proved spy subtle terrorists total wants
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.
becoming feared government kid notorious perform tricks
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
government hire programmer programs secure simply surely systems terrorists
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
agencies attacked government large nine
Nine out of every 10 large corporations and government agencies have been attacked by computer intruders.
boys government done
I was pretty much the government's poster boy for what I had done.
government hacking action
My actions constituted pure hacking that resulted in relatively trivial expenses for the companies involved, despite the government's false claims.
government way break
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems.
successful government touching
I obtained confidential information in the same way government employees did, and I did it all without even touching a computer. ... I was so successful with this line of attack that I rarely had to go towards a technical attack.
books books-and-reading case criminal dealing higher information priorities time
At the time the books were released, I was in custody, so I had higher priorities - dealing with my criminal case - than dealing with litigation. There's a lot of information out there that is inaccurate.
access code secret source
Getting access to source code . . . was kind of like the secret ingredient. I wanted to know what the secret was.
allowed computers connect connecting net networks personal prevent programs sites
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
controls either exploiting
Hacking is exploiting security controls either in a technical, physical or a human-based element.
finding learning love solving technology
I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology.
assume companies critical people proactive
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.