Quotesia
Home
Authors
Popular authors
Charles Kettering
Edward Young
James Joyce
Oscar Wilde
Joseph Roux
Blaise Pascal
All authors
Today's birthdays
1876 - Wilson Mizner
1925 - Malcolm X
1881 - Mustafa Kemal Ataturk
1931 - David Wilkerson
1941 - Nora Ephron
1991 - Danielle Macdonald
Today's birthdays
Popular professions
Artist
Inventor
Architect
President
Psychologist
Cartoonist
All professions
Authors by letter
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All authors
Topics
Top Quotes
Quotesia
Quote Topics
Hacker Quotes
Hacker Quotes
Very smart people are often tricked by hackers, by phishing. I don't exclude myself from that. It's about being smarter than a hacker. Not about being smart.
Harper Reed
Myself
People
Smart
Hacker
Tricked
About
Hackers
Exclude
Smart People
Smarter
Very
Than
Often
Being
Being Smart
At the end of the day, my goal was to be the best hacker.
Kevin Mitnick
Best
Day
End Of The Day
Hacker
Goal
End
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
Kevin Mitnick
Hacker
Before
Hacking
Main
Never
Still
Get
Did
Authorization
Any
Difference
Gain
Then
Paid
Compared
Now
Monetary
Received
If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works.
Jamie Zawinski
You
Hacker
First
Out
Give
Take
He
New
Toy
First Thing
How
The First Thing
Apart
Figure
Works
Thing
Social engineering has become about 75% of an average hacker's toolkit, and for the most successful hackers, it reaches 90% or more.
John McAfee
Hacker
Become
Engineering
About
More
Hackers
Most
Social
Average
Social Engineering
Successful
I'm a bit of a hacker fanatic and know a fair bit about that industry and cyber crime and cyber warfare.
Seth Gordon
Crime
Hacker
Bit
About
Fair
Know
Industry
Fanatic
Warfare
Cyber
The hacker community may be small, but it possesses the skills that are driving the global economies of the future.
Heather Brooke
Future
Hacker
Community
Possesses
Small
Driving
Economies
Global
May
Skills
Software Engineering might be science; but that's not what I do. I'm a hacker, not an engineer.
Jamie Zawinski
Science
Engineer
Hacker
Engineering
Software
Might
A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data.
John McAfee
Hacker
Engineering
Else
Someone
Data
High-Tech
Combination
Access
Gain
Social
Social Engineering
Who
Uses
The rudest possible gift is a gift card. It means you think the person is stupid and has no interests. The only good gift card is Bitcoin. You practically have to be a hacker to know about it.
John Waters
Good
You
Bitcoin
Gift
Hacker
Stupid
Think
Possible
About
Only
Know
Practically
Person
Interests
Means
Card
I wasn't a hacker for the money, and it wasn't to cause damage.
Kevin Mitnick
Money
Cause
Hacker
Damage
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
Kevin Mitnick
Key
Hacker
Engineering
Something
Network
Access
Person
Influencing
Information
Gain
Social
Social Engineering
Your
I would love to be in an action movie. I've always wanted to play the hacker guy - like, the Jewy hacker guy who just gets yelled at.
Ad-Rock
Love
Hacker
Action
Would
Guy
Like
Always
Yelled
Gets
Just
Movie
Wanted
Who
Action Movie
Play
I'm a little bit wary of people. It freaked me out when a fan connected with me on social media, then had plastic surgery to look like me, dyed his hair the same colour, and got a pug dog like mine. He was also a hacker, so I had to change all my passwords.
Belinda Carlisle
Me
Change
People
Dog
Social Media
Hacker
Hair
Mine
Bit
Out
Freaked
Colour
Had
He
Like
Look
Also
Got
Surgery
His
Same
Dyed
Fan
Little
Social
Little Bit
Then
Connected
Plastic
Wary
Plastic Surgery
Media
Scaremongering is an age-old political ritual. There are public officials who have benefited by playing up the 'hacker threat' so that they can win approval by cracking down on it.
Charles Platt
Win
Political
Hacker
Down
Approval
Threat
Ritual
Up
Cracking
Officials
Public
Age-Old
Public Officials
Who
Playing
I'm not an economist; I'm a hacker who has spent his career exploring and repairing large networks.
Dan Kaminsky
Hacker
Spent
Networks
Economist
Repairing
His
Exploring
Who
Large
Career
In early 1993, a hostile observer might have had grounds for thinking that the Unix story was almost played out, and with it the fortunes of the hacker tribe.
Eric S. Raymond
Hacker
Thinking
Tribe
Out
Had
Hostile
Observer
Almost
Story
Might
Fortunes
Grounds
Played
Early
UNIX
It was on a bulletin board that I first learned about hacker culture, the 'Let's just break through this wall and see what's on the other side' mentality.
Harper Reed
Culture
Hacker
First
Other
Side
See
About
Mentality
Through
Learned
Wall
Just
Break
Board
When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person's computer, that the hacker gains access to.
John McAfee
Sometimes
Value
Hacker
Single
Corporate
Data
Computer
Access
Person
Any
Depends
Which
Gains
Server
A hacker doesn't deliberately destroy data or profit from his activities.
Kevin Mitnick
Hacker
Profit
Destroy
Data
Deliberately
His
Activities
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
Kevin Mitnick
Hacker
Think
President
Emails
Threatening
Network
Johnny
Networks
Parking
Parking Lot
Wireless
Vulnerabilities
Limited
Antenna
Lot
Office
Send
Deploying
Then
Creating
Explosion
Companies
Using
I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.
Kevin Mitnick
Government
World
Hacker
Corporations
Kid
Tricks
Feared
Magic
Perform
Most
Becoming
Being
Loved
Notorious
Who
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
Kevin Mitnick
Myself
Hacker
Characterize
Security
Retired
Know
Improve
Companies
Applying
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
Kevin Mitnick
You
People
Management
Problem
Somebody
Hacker
Control
Else
Complete
Everywhere
Compromises
Could
Computer
Open
Soon
Major
Major Problem
Document
Another
Office
Site
Same
Send
Sites
Use
Your
Trap
File
Multiple
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
Kevin Mitnick
Myself
Me
Hacker
Ways
Plight
More
Never
Support
Name
Doing
Causing
Malicious
Condone
Intentionally
Anyone
Anything
Productive
Help
Damage
Damaged
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
Kevin Mitnick
Better
Hacker
Become
Took
Analyze
Locate
Systems
Security
Could
Hacked
Hacking
Had
True
Towards
Bugs
Becoming
Source
Lot
If I Could
Companies
Code
Copies
Load more quotes
No more hacker quotes
Haven't find the right quote? Try another of these similiar topics.
Carry
Among