Kevin Mitnick
Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
alarm average checks download needs program recommend running system zone
For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system.
allowed computers connect connecting net networks personal prevent programs sites
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
government hire programmer programs secure simply surely systems terrorists
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
assignment cooler gave high program school teacher
The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teacher's password and all the other students' passwords. And the teacher gave me an A and told the class how smart I was.
books books-and-reading case criminal dealing higher information priorities time
At the time the books were released, I was in custody, so I had higher priorities - dealing with my criminal case - than dealing with litigation. There's a lot of information out there that is inaccurate.
companies needed spend train walls
A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people.
businesses deployed detection devices happens products secure site smaller standard stronger system
What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited.
certain companies found kid phone quite throughout united
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
asks favor involving somebody verify
When somebody asks for a favor involving information, if you don't know him or can't verify his identity, just say no.
The Internet is like the phone. To be without it is ridiculous.
Not being allowed to use the Internet is kind of like not being allowed to use a telephone.
hacking hooked
I was hooked in before hacking was even illegal.
I was an accomplished computer trespasser. I don't consider myself a thief.
electronic james saw
I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast.