Hacker Quotes
A critical factor in its success was that the X developers were willing to give the sources away for free in accordance with the hacker ethic, and able to distribute them over the Internet.
Eric S. Raymond
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
Kevin Mitnick
I've got to be careful what I say but Glenn Mulcaire was a blagger and a phone hacker.
Thomas Watson, Jr.
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
Kevin Mitnick
I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.
Kevin Mitnick
Software Engineering might be science; but that's not what I do. I'm a hacker, not an engineer.
Jamie Zawinski
The beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1.
Eric S. Raymond
If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works.
Jamie Zawinski
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
Kevin Mitnick
Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.
Kevin Mitnick
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
Kevin Mitnick
I think Linux is a great thing, in the big picture. It's a great hacker's tool, and it has a lot of potential to become something more.
Jamie Zawinski
The hacker mindset doesn't actually see what happens on the other side, to the victim.
Kevin Mitnick
When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.
Kevin Mitnick