Best 53 of Hackers quotes - MyQuotes
I think it's a little premature to talk about response until we know exactly what happened, but we should know what happened. And we should know how to defend [against hackers attacks] ourselves without question.
This is our world now The world of the electron and the switch, the beauty of the baud.
Most hackers graduate from Unix and Linux platforms. They know them intimately. They don't try to exploit them
In the hacking world, security is more of a response than a proactive measure. They wait for hackers to attack and then they patch, based on the attacks.
I'm a really good hacker, but I'm not a sensible person.
Wicked Tribe, Rooling Tribe! is the mejor hacker tribe. Too small, too fast, too scientific!
Computer hacking was like a chemical bond holding us all together.
The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers.
The hackers don't want to destroy the network. They want to keep it running, so they can keep making money from it.
I'm proud of it. Apart from marking the first occasion when I used my talent on behalf of other people without being asked and without caring whether I was rewarded--which was a major breakthrough in itself--the job was a pure masterpiece. Working on it, I realized in my guts how an artist or an author can get high on the creative act. The poker who wrote Precipice's original tapeworm was pretty good, but you could theoretically have killed it without shutting down the net--that is, at the cost of losing thirty or forty billion bits of data. Which I gather they were just about prepared to do when I showed up. But mine...Ho, no! That, I cross my heart, cannot be killed without DISMANTLING the net.
Will. I. Am
If you want to be a better web hacker, hang out with a painter.
Celebrities, make it harder for hackers to get nude pics of you from your computer by not putting nude pics of yourself on the computer.
What we're going to get as this next generation grows up is more hacking skills and this is spreading geographically also - Africa is about to come on the scene, South and Central America are going to be major sources of hackers. These people have got to be engaged with.
Eric S. Raymond
Berkeley hackers liked to see themselves as rebels against soulless corporate empires.
A lot of hackers set up scam sites. They can impersonate a site like PayPal, for instance.
I think Linux is a great thing, in the big picture. It's a great hacker's tool, and it has a lot of potential to become something more.
A hacker doesnt deliberately destroy data or profit from his activities.
It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.
Humans make mistakes. Programmers are bound to make mistakes. Hackers, you can bet your life, are going to be there to exploit those mistakes.
Artificial Intelligence trend is fuzzing up in Cybersecurity If weaponized for Cyber-attacks, it becomes as evil-infinity”.
It's less about technology for me, and more about religion. [on hacking]
The entire report [on Russians hackers attacks] is based on unnamed sources who are perhaps doing something they shouldn't be doing by speaking to reporters or someone talking out of line about something that is absolutely not true.
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
The Chinese had accused the Tibetans of being terrorists, which is weird. A Tibetan terrorist is like an Amish hacker. It just doesn't fit.
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
The hacker mindset doesn't actually see what happens on the other side, to the victim.
See, unlike most hackers, I get little joy out of figuring out how to install the latest toy.
I am not a wishing well with legs. (Paraphrasing Babylon 5's Londo Mollari, repeately, when asked to perform hacking functions for strangers.)
Marcha A. Fox
Dirck took a deep breath, refusing to believe what he'd seen as he exited to the core system, so rattled he almost logged out directly but caught himself just in time, instituting another surge of panic at what the consequences would have been.
As a matter of fact, yeah, they were foolproof. The problem is that you don't have to protect yourself against fools. You have to protect yourself against people like me.
We are now debating and talking about a story [Russian hacker attack] based on something that isn't true.
Should we fear hackers? Intention is at the heart of this discussion.
Dear 2600: I think my girlfriend has been cheating on me and I wanted to know if I could get her password to Hotmail and AOL. I am so desperate to find out. Any help would be appreciated. Thanks. And this is yet another popular category of letter we get. You say any help would be appreciated? Let’s find out if thats true. Do you think someone who is cheating on you might also be capable of having a mailbox you don’t know about? Do you think that even if you could get into the mailbox she uses that she would be discussing her deception there, especially if we live in a world where Hotmail and AOL passwords are so easily obtained? Finally, would you feel better if you invaded her privacy and found out that she was being totally honest with you? Whatever problems are going on in this relationship are not going to be solved with subterfuge. If you can’t communicate openly, there’s not much there to salvage.
I'm a bit of a hacker fanatic and know a fair bit about that industry and cyber crime and cyber warfare.
A vulnerability in an organization's IoT microcosm is a "taunt" to exploit by malicious hackers
We put up the very best cyber security - what I call infrastructure to stop them, but [hackers] constantly [didn't stop].
I'm a hacker!" Cadel protested. "I don't poison people! I don't blow them up!
Never still believe that your browser has the best security quality Even the earth’s best browser is lately affected with CVE 2019-5786
Certainly we're going to do whatever that loaded word retaliate is, we're going to do everything we can in order to prevent all of this stuff [Hackers attacks] from happening ever again.
I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
People are hard to be understand, full of lies, full of corupt, if you want a friendship with them is like to have a friendship with nothing. But nothing isn't a possibility of the ability, people you can go 40....50 years studying them and what you will find is that you are old and they are new and more and more stupid. I find somebody who can I trust, it's my computer who else??? It's too clever, I need to hang out with clever people not with idiots!
Be very careful. We suggest getting a book on HTML to avoid becoming a real legend in the hacker world. Putting up a web page before you know how to put up a web page is generally a very bad idea. The .gov sites are an exception.
Yeah, young coders abound, but mostly only string together preassembled digital beads, and even today's brightest young nerdlets aren't immune to eventual wrinkles. As for real experts, well, as the dawn of the computer age recedes, so too have the hairlines of your true computer wizards, the males I mean. We females never change, we are eternally young.
Back in my era, hacking was all about messing with other hackers. It was a hacker war.
The health sector continuously get’s pummeled by malicious actors and hackers because their cyber-kinetic security is being managed by “Participation Trophy” winning wimps!
You’re allowed to want different things in bed than you do in your normal everyday life.
In this business, I find more value in working with hackers who abstract new realities from cast aside code and concepts than academics who regurgitate other people’s work and try to pawn it off as their own.
Homo Sapiens are Exploitable. Large Corporations Base the Mass with Least Recognition. It does NOT have to be the Employee Himself that would Deteriorate the Corporations Intranet but Surely since his Least Recognized, He is Most Definitely Vulnerable, Its a Starting Point to Open a Door for a Lovely Challenging Maze filled with Seed of Corruption that in Stages the Artists Shall Paint their Mark.
Younger hackers are hard to classify. They're probably just as diverse as the old hackers are. We're all over the map.
Theology is an attempt to hack god's mind and look at the universe as he does; god's firewalls are so strong no attempt has ever been successful.