Words matter. These are the best Hacker Quotes from famous people such as Kevin Mitnick, Eric S. Raymond, Glenn Kelman, Harper Reed, Robert Scoble, and they’re great for sharing with your friends.
It’s true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it’s limited to the office – then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president!
A critical factor in its success was that the X developers were willing to give the sources away for free in accordance with the hacker ethic, and able to distribute them over the Internet.
Whereas any political party, and nearly all voters, prize consistency as a sign of authentic, values-driven thinking, it is deeply alien to the hacker, who holds that changing your mind is simply intelligence in action.
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
Very smart people are often tricked by hackers, by phishing. I don’t exclude myself from that. It’s about being smarter than a hacker. Not about being smart.
A hacker doesn’t deliberately destroy data or profit from his activities.
It’s not enough to have a hacker culture anymore. You have to have a design culture, too.
I don’t condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
Do you think the Chinese think twice about hiring a hacker with a mohawk or a tattooed face? No.
When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person’s computer, that the hacker gains access to.
At the end of the day, my goal was to be the best hacker.
If you’re a juvenile delinquent today, you’re a hacker. You live in your parent’s house; they haven’t seen you for two months. They put food outside your door, and you’re shutting down a government of a foreign country from your computer.
I characterize myself as a retired hacker. I’m applying what I know to improve security at companies.
Bitcoin is here to stay. There would be a hacker uproar to anyone who attempted to take credit for the patent of cryptocurrency. And I wouldn’t want to be on the receiving end of hacker fury.
The hacker mindset doesn’t actually see what happens on the other side, to the victim.
In early 1993, a hostile observer might have had grounds for thinking that the Unix story was almost played out, and with it the fortunes of the hacker tribe.
I think Linux is a great thing, in the big picture. It’s a great hacker’s tool, and it has a lot of potential to become something more.
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
Software Engineering might be science; but that’s not what I do. I’m a hacker, not an engineer.
A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else’s data.
If you give a hacker a new toy, the first thing he’ll do is take it apart to figure out how it works.
It was on a bulletin board that I first learned about hacker culture, the ‘Let’s just break through this wall and see what’s on the other side’ mentality.
Before I was hired by Obama’s team as the CTO for his 2012 re-election campaign, I had certainly never been involved with anything of that nature before. Yet, I somehow knew I could do the job. I attribute that confidence to my experience as a hacker and the subsequent willingness to take risks.
Most of my life’s information is public. I got a text one day from a hacker who texted me all of my credit card information.
News and images move so easily across borders that attitudes and aspirations are no longer especially national. Cyber-weapons, no longer the exclusive province of national governments, can originate in a hacker’s garage.
When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.
In the aftermath of the oh-so-predictable crash, the Bitcoin fanatics have begun marshaling out excuse after excuse for why this non-investment investment lost so much of its value so fast. One was that hackers attacked some of the exchanges for Bitcoins and crippled it. Really? A hacker can wreck an entire market?
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
I’m a really good hacker, but I’m not a sensible person.