Quotesia
Home
Authors
Popular authors
Dale Carnegie
Dr. Seuss
Pope Paul VI
William Christopher Handy
Guillaume Apollinaire
Sophocles
All authors
Today's birthdays
1927 - Robert Orben
1963 - Jason Newsted
1951 - Kenny Dalglish
1951 - Chris Rea
1988 - Josh Bowman
1948 - James Ellroy
Today's birthdays
Popular professions
Businesswoman
Activist
Architect
Philosopher
Athlete
Clergyman
All professions
Authors by letter
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All authors
Topics
Top Quotes
Quotesia
Quote Topics
Hacking Quotes
Hacking Quotes
There are a thousand hacking at the branches of evil to one who is striking at the root.
Henry David Thoreau
Evil
Striking
Thousand
Hacking
Branches
Root
Who
When solving problems, dig at the roots instead of just hacking at the leaves.
Anthony J. D'Angelo
Problems
Dig
Solving
Hacking
Instead
Leaves
Just
Roots
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
Kevin Mitnick
Hacker
Before
Hacking
Main
Never
Still
Get
Did
Authorization
Any
Difference
Gain
Then
Paid
Compared
Now
Monetary
Received
Everybody has a hacking capability. And probably every intelligence service is hacking in the territory of other countries. But who exactly does what? That would be a very sensitive piece of information. But it's very difficult to communicate about it. Because nobody wants to admit the scope of what they're doing.
Henry Kissinger
Service
Intelligence
Communicate
Difficult
Every
Other
Other Countries
Everybody
Would
Would-Be
Exactly
Admit
About
Hacking
Nobody
Countries
Piece
Because
Territory
Does
Doing
Scope
Very
Wants
Information
Sensitive
Capability
Who
We live in a world where all wars will begin as cyber wars... It's the combination of hacking and massive, well-coordinated disinformation campaigns.
Jared Cohen
World
Will
Live
Hacking
Combination
Massive
Campaigns
Begin
Where
Disinformation
Cyber
Wars
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
Kevin Mitnick
Knowledge
Business
Big
Before
Profit
Systems
About
Thrill
Pursuit
Hackers
Hacking
Big Business
Intellectual
Intellectual Curiosity
Curiosity
Breaking
Now
It's kind of interesting, because hacking is a skill that could be used for criminal purposes or legitimate purposes, and so even though in the past I was hacking for the curiosity, and the thrill, to get a bite of the forbidden fruit of knowledge, I'm now working in the security field as a public speaker.
Kevin Mitnick
Knowledge
Fruit
Past
Field
Criminal
Bite
Though
Kind
Security
Thrill
Purposes
Could
Hacking
Forbidden
Because
Curiosity
Get
Legitimate
In The Past
Interesting
Public
Skill
Working
Speaker
Used
Even
Now
Problem-solving, inventing, hacking and coding is more of an adrenaline rush of endorphins rather than a feeling.
Walter O'Brien
Feeling
Rush
Rather
Inventing
More
Adrenaline
Hacking
Than
Problem-Solving
Coding
It is a fairly open secret that almost all systems can be hacked, somehow. It is a less spoken of secret that such hacking has actually gone quite mainstream.
Dan Kaminsky
Gone
Secret
Systems
Somehow
Hacked
Hacking
Open
Almost
Mainstream
Almost All
Spoken
Fairly
Quite
Less
Actually
What we've seen over the last decade is we've seen a departure from the traditional work of the National Security Agency. They've become sort of the national hacking agency, the national surveillance agency. And they've lost sight of the fact that everything they do is supposed to make us more secure as a nation and a society.
Edward Snowden
Work
Seen
Become
Nation
National
Lost
Society
Everything
Sight
Secure
Security
More
Fact
Hacking
Over
Supposed
Make
Sort
Traditional
Surveillance
Decade
National Security
Departure
Agency
Us
Last
Last Decade
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
Kevin Mitnick
Writing
Challenge
Addicted
Viruses
Seduction
More
Stealing
Computer
Hacking
Adventure
Causing
Intellectual
Curiosity
Damage
It's actually a smarter crime because imagine if you rob a bank, or you're dealing drugs. If you get caught you're going to spend a lot of time in custody. But with hacking, it's much easier to commit the crime and the risk of punishment is slim to none.
Kevin Mitnick
Time
You
Custody
Crime
Spend
Easier
Slim
Punishment
Risk
Hacking
Smarter
Rob
Because
None
Dealing
Caught
Lot
Get
Commit
Going
Bank
Much
Actually
Imagine
The Internet is a worldwide platform for sharing information. It is a community of common interests. No country is immune to such global challenges as cybercrime, hacking, and invasion of privacy.
Lu Wei
Privacy
Challenges
Internet
Country
Community
Worldwide
No Country
Immune
Invasion
Hacking
Sharing
Global
Common
Common Interests
Information
Interests
Platform
We need to do whatever we can to defend ourselves against hacking.
Soren Skou
Whatever
Ourselves
Hacking
Against
Defend
Need
A lot of hacking is playing with other people, you know, getting them to do strange things.
Steve Wozniak
You
Strange
People
Other
Hacking
Know
Lot
Getting
Them
Strange Things
Things
Playing
Most hacking incidents that you see are freelancers - maybe government sponsored, maybe not. They are out there trying to steal intellectual property, make some money. Or they might just be hackers who want to damage something for whatever reason. That's a fact of life that internet companies deal with all the time.
David Drummond
Life
Government
Time
You
Property
Money
Internet
Whatever
Just Be
Out
See
Some
Something
Steal
Fact
Hackers
Hacking
Sponsored
Most
Make
Deal
Intellectual
Intellectual Property
Trying
Maybe
Just
Want
Might
Reason
Who
Companies
Incidents
Damage
Google did a great job hacking the Web to create search - and then monetizing search with advertising. And Apple did a great job humanizing hardware and software so that formerly daunting computers and applications could become consumer-friendly devices - even a lifestyle brand.
Douglas Rushkoff
Great
Job
Google
Become
Software
Great Job
Web
Daunting
Could
Lifestyle
Hacking
Computers
Devices
Advertising
Brand
Did
Then
Create
Search
Even
Apple
Applications
Hardware
For years, China expected foreign companies not to publicly voice their complaints about hacking or intellectual-property violations in order to protect their broader interests in the country.
Evan Osnos
Country
Complaints
Broader
About
Voice
Hacking
Protect
Foreign
Years
Expected
Order
China
Interests
Companies
Publicly
Violations
If Wikileaks didn't resolve that question for folks - at the end of the day, there are no secrets. We're living in a glass neighborhood, in a fishbowl, and technology, white hat hackers, the folks that are doing the right thing with hacking.
Gavin Newsom
Day
Technology
Doing The Right Thing
End Of The Day
White
Living
Resolve
Wikileaks
Right Thing
Secrets
Neighborhood
Hat
Folks
Hackers
Hacking
Glass
Doing
Question
End
The Right Thing
Right
Thing
One of my favourite books about hackers is 'Masters of Deception' about this hacking group in the 1990s. Many of them didn't come from wealthy families. These are kids that are very intelligent; they just happen to be misdirected.
Harper Reed
Group
Books
Kids
Wealthy
Favourite
About
Misdirected
Hackers
Hacking
Come
Masters
Very
Intelligent
Families
Just
Deception
Happen
Them
Many
Air warfare is a shot through the brain, not a hacking to pieces of the enemy's body.
J. F. C. Fuller
Enemy
Air
Through
Hacking
Pieces
Brain
Warfare
Shot
Body
While the Census Bureau already has a legal obligation to keep people's information confidential, we all know that in an age of cyber attacks and computer hacking that ensuring people's privacy can be difficult.
Jeff Duncan
Privacy
Legal
Age
People
Obligation
Difficult
Ensuring
Attacks
Computer
Hacking
Know
Bureau
Confidential
Census
Information
While
Cyber
Keep
I started by hacking around the back yard in Richmond.
Jennifer Wyatt
Back
Hacking
Around
Yard
Richmond
Started
I was one of the first practitioners of social engineering as a hacking technique, and today it is my only tool of use, aside from a smartphone - in a purely white hat sort of way. But if you don't trust me, then ask any reasonably competent social engineer.
John McAfee
Today
Me
You
Trust
Engineer
First
White
Engineering
Tool
Way
Hat
Purely
Only
Hacking
Sort
Trust Me
Any
Social
Aside
Ask
Then
Social Engineering
Use
Reasonably
Technique
Competent
With brain hacking experiments, I've hacked into Morgan Freeman's brain. He was the most famous and the most nerve wracking because I got really awestruck when I met him, and the moment I was introduced to him, he challenged me there and then to hack his brain.
Keith Barry
Me
Met
Introduced
Nerve
Morgan
Hack
Hacked
Hacking
He
Freeman
Most
Him
Because
Got
His
Brain
Famous
Experiments
Then
Really
Moment
There And Then
Challenged
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.
Kevin Mitnick
You
Phone
Employees
Type
Telephone
Systems
Network
Hacking
Exploiting
Explore
Company
Load more quotes
No more hacking quotes
Haven't find the right quote? Try another of these similiar topics.
Ambition
Action
Always