Kevin Mitnick
![Kevin Mitnick](/assets/img/authors/kevin-mitnick.jpg)
Kevin Mitnick
Kevin David Mitnickis an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes...
NationalityAmerican
ProfessionBusinessman
Date of Birth6 August 1963
CountryUnited States of America
Kevin Mitnick quotes about
stuff time updated
I keep my stuff updated all the time. Being in the security industry, I keep up to date with securities.
charged involves multiple
I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case.
exploiting explore hacking network systems telephone type
Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.
copied
I was an accomplished computer trespasser. I don't consider myself a thief. I copied without permission.
access account address companies computer contain devices dollars link measures millions money none operate people protected secure systems wasted weakest
Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.
acceptable mitigate remove
You can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk.
access code computer exploring hacking involved obtaining operating source systems within
My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
alarm average checks download needs program recommend running system zone
For the average home-user, anti-virus software is a must. A personal firewall such as Zone Alarm and running a program like HFNetcheck, which is a free download for personal users. It checks your system to see if anything needs to be patched. I'd also recommend a program such as SpyCop to periodically check for any spyware on your system.
five fugitive future return spending
I'm not a fugitive anymore. Never will be in the future. After spending five years in jail, you learn your lesson. I never want to return there.
worm
Back up everything! You are not invulnerable. Catastrophic data loss can happen to you - one worm or Trojan is all it takes.
anyone causing damage damaged hacker malicious productive ways
I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.
account claiming remove rep somebody sort yahoo
I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it?
access attempt call calling changing class favorite fellow gaining home input message pay pranks received switch telephone telling
One of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak. When he'd attempt to make a call from home, he'd get a message telling him to deposit a dime, because the telephone company switch received input that indicated he was calling from a pay phone.
bad everyday guy information item obtaining people piece protected seems starts
Penetrating a company's security often starts with the bad guy obtaining some piece of information that seems so innocent, so everyday and unimportant, that most people in the organization don't see any reason why the item should be protected and restricted.