Kevin Mitnick

Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
books books-and-reading case criminal dealing higher information priorities time
At the time the books were released, I was in custody, so I had higher priorities - dealing with my criminal case - than dealing with litigation. There's a lot of information out there that is inaccurate.
bin exactly knew people portrayed side time
For a long time, I was portrayed as the Osama bin Laden of the Internet, and I really wanted to be able to tell my side of the story. I wanted to be able to explain exactly what I did and what I didn't do to people who thought they knew me.
given time vulnerable
Anything out there is vulnerable to attack given enough time and resources.
stuff time updated
I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities.
believe damage-control enough-time
I believe in having each device secured and monitoring each device, rather than just monitoring holistically on the network, and then responding in short enough time for damage control.
access code secret source
Getting access to source code . . . was kind of like the secret ingredient. I wanted to know what the secret was.
allowed computers connect connecting net networks personal prevent programs sites
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
act blank government hacks interested patriot proved spy subtle terrorists total wants
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyone's communications.
controls either exploiting
Hacking is exploiting security controls either in a technical, physical or a human-based element.
finding learning love solving technology
I love solving puzzles, I love finding my way around obstacles, and I love learning new things about technology.
assume companies critical people proactive
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
american-celebrity apparently appeal case code guy laptop major source witness worked
I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later.
art credit legitimate living performance run
Being on the run wasn't fun, but it was something I had to do. I was actually working in legitimate jobs. I wasn't living on people's credit cards. I was living like a character out of a movie. It was performance art.
firm
Once when I was a fugitive, I was working for a law firm in Denver.