Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
became control fascinated hacker phone system
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
complete document everywhere hacker major multiple office open people send somebody soon trap
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
american-celebrity beating best case code enjoyed hacker security source
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
anyone causing damage damaged hacker malicious productive ways
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
becoming cyberspace exploiting hackers human nature next technical ways
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
antenna companies emails explosion hacker johnny limited networks parking send using wireless
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
data hackers profit
A hacker doesnt deliberately destroy data or profit from his activities.
hackers company retired
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
hacking hackers individual
The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers.
sides hackers mindset
The hacker mindset doesn't actually see what happens on the other side, to the victim.
heart hackers intention
Should we fear hackers? Intention is at the heart of this discussion.
books books-and-reading case criminal dealing higher information priorities time
At the time the books were released, I was in custody, so I had higher priorities - dealing with my criminal case - than dealing with litigation. There's a lot of information out there that is inaccurate.
access code secret source
Getting access to source code . . . was kind of like the secret ingredient. I wanted to know what the secret was.
allowed computers connect connecting net networks personal prevent programs sites
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.