The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply wont suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully
Share this quote:
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
Share this quote:
As a young boy, I was taught in high school that hacking was cool.
Share this quote:
Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didnt have enough space on my 200 megabyte hard drive.
Share this quote:
I get hired to hack into computers now and sometimes its actually easier than it was years ago.
Share this quote:
I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator.
Share this quote:
Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
Share this quote:
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984.
Share this quote:
It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was - and is - respected and admired by others possessing similar technical skills.
Share this quote:
I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A.
Share this quote:
The first programming assignment I had in high school was to find the first 100 Fibonacci numbers. Instead, I thought it would be cooler to write a program to get the teachers password and all the other students passwords. And the teacher gave me an A and told the class how smart I was.
Share this quote:
At the end of the day, my goal was to be the best hacker.
Share this quote:
People are prone to taking mental shortcuts. They may know that they shouldnt give out certain information, but the fear of not being nice, the fear of appearing ignorant, the fear of a perceived authority figure - all these are triggers, which can be used by a social engineer to convince a person to override established security procedures.
Share this quote:
Should we fear hackers? Intention is at the heart of this discussion.
Share this quote:
I trust online banking. You know why? Because if somebody hacks into my account and defrauds my credit card company, or my online bank account, guess who takes the loss? The bank, not me.
Share this quote:
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
Share this quote:
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked.
Share this quote:
What I found personally to be true was that its easier to manipulate people rather than technology.
Share this quote:
I went from being a kid who loved to perform magic tricks to becoming the worlds most notorious hacker, feared by corporations and the government.
Share this quote:
The Patriot Act is ludicrous. Terrorists have proved that they are interested in total genocide, not subtle little hacks of the U.S. infrastructure, yet the government wants a blank search warrant to spy and snoop on everyones communications.
Share this quote: