Occupation: Consultant Birth: August 6, 1963
My primary goal of hacking was the intellectual curiosity, the seduction of adventure..
Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest ….
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government system….
Back in my day, I would probe by hand. Now you can get commercial software that does the job for you..
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if….
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrat….
When I was in prison, a Colombian drug lord, offered me $5 million in cash to manipulate a computer system so that he would be released. I turned him….
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon..
Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people tha….
I get hired to hack into computers now and sometimes it's actually easier than it was years ago..
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and educa….
Steve Wozniak and Steve Jobs founded Apple Inc, which set the computing world on its ear with the Macintosh in 1984..
Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I di….
It was used for decades to describe talented computer enthusiasts, people whose skill at using computers to solve technical problems and puzzles was ….
For the average home-user, anti-virus software is a must..
But a lot of businesses out there don't see the return on investment, they look at it as a liability, and until they can understand that proactive se….
Oracle, for example, has even hired people to dumpster dive for information about its competitor, Microsoft. It's not even illegal, because trash isn….
New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is ….
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network..
I was pretty much the government's poster boy for what I had done..
As a young boy, I was taught in high school that hacking was cool..