I'm a really good hacker, but I'm not a sensible person.

At the end of the day, my goal was to be the best hacker.

I wasn't a hacker for the money, and it wasn't to cause damage.

I look like a geeky hacker, but I don't know anything about computers.

A hacker doesn't deliberately destroy data or profit from his activities.

I'm a hacker, but I'm the good kind of hackers. And I've never been a criminal.

I've got to be careful what I say but Glenn Mulcaire was a blagger and a phone hacker.

The hacker mindset doesn't actually see what happens on the other side, to the victim.

It's not enough to have a hacker culture anymore. You have to have a design culture, too.

Software Engineering might be science; but that's not what I do. I'm a hacker, not an engineer.

Do you think the Chinese think twice about hiring a hacker with a mohawk or a tattooed face? No.

I'm not an economist; I'm a hacker who has spent his career exploring and repairing large networks.

I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.

If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works.

Leveraging community intelligence and making connections is a key component to being a growth hacker.

I'm a bit of a hacker fanatic and know a fair bit about that industry and cyber crime and cyber warfare.

I was interested in computer programming as a kid. In fact, during my college days, I used to be a hacker.

The hacker community may be small, but it possesses the skills that are driving the global economies of the future.

I was fascinated with the phone system and how it worked; I became a hacker to get better control over the phone company.

Most of my life's information is public. I got a text one day from a hacker who texted me all of my credit card information.

Dot Hacker, to me, sounds like a collection of all my tastes. I hear four people trying to fill up as much space as they can.

The beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1.

Social engineering has become about 75% of an average hacker's toolkit, and for the most successful hackers, it reaches 90% or more.

I would love to be in an action movie. I've always wanted to play the hacker guy - like, the Jewy hacker guy who just gets yelled at.

I think Linux is a great thing, in the big picture. It's a great hacker's tool, and it has a lot of potential to become something more.

A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data.

The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.

I went from being a kid who loved to perform magic tricks to becoming the world's most notorious hacker, feared by corporations and the government.

It was on a bulletin board that I first learned about hacker culture, the 'Let's just break through this wall and see what's on the other side' mentality.

What fashion has started from hackers? They have bad posture, and they don't go out. I wish I had a hacker boyfriend - they stay at home up in the bedroom.

Very smart people are often tricked by hackers, by phishing. I don't exclude myself from that. It's about being smarter than a hacker. Not about being smart.

In early 1993, a hostile observer might have had grounds for thinking that the Unix story was almost played out, and with it the fortunes of the hacker tribe.

When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person's computer, that the hacker gains access to.

Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms.

The guardians of your company's cyber security should be encouraged to network within the industry to swap information on the latest hacker tricks and most effective defenses.

People in tech love to see their work as embodying the 'hacker ethos': a desire to break systems down in order to change them. But this pride can often be conveyed rather clumsily.

Scaremongering is an age-old political ritual. There are public officials who have benefited by playing up the 'hacker threat' so that they can win approval by cracking down on it.

To see a hacker actually hacking is not the most interesting thing visually, and it's pretty boring as an actor: a hacker taps on her keyboard. There's really not much more than that.

A critical factor in its success was that the X developers were willing to give the sources away for free in accordance with the hacker ethic, and able to distribute them over the Internet.

Everything about Mark Zuckerberg is pure hacker. Hackers don't take realities of the world for granted; they seek to break and rebuild what they don't like. They seek to outsmart the world.

Bitcoin is here to stay. There would be a hacker uproar to anyone who attempted to take credit for the patent of cryptocurrency. And I wouldn't want to be on the receiving end of hacker fury.

The rudest possible gift is a gift card. It means you think the person is stupid and has no interests. The only good gift card is Bitcoin. You practically have to be a hacker to know about it.

Thanks to a hacker known as Guccifer who wormed into the computer of the 43rd president's sister, the world has learned that George W. Bush is an amateur - I would say serious amateur - painter.

I don't condone anyone causing damage in my name, or doing anything malicious in support of my plight. There are more productive ways to help me. As a hacker myself, I never intentionally damaged anything.

I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.

The core hacker premise that 'code wins arguments' is just another way of saying that anything is worth trying, regardless of whether it is a conservative or liberal idea, and that whatever works is worth keeping.

Whereas any political party, and nearly all voters, prize consistency as a sign of authentic, values-driven thinking, it is deeply alien to the hacker, who holds that changing your mind is simply intelligence in action.

News and images move so easily across borders that attitudes and aspirations are no longer especially national. Cyber-weapons, no longer the exclusive province of national governments, can originate in a hacker's garage.

If you're a juvenile delinquent today, you're a hacker. You live in your parent's house; they haven't seen you for two months. They put food outside your door, and you're shutting down a government of a foreign country from your computer.

I was a hacker of sorts. Not a mind 'reader,' exactly; more a mind 'radar,' in tune with the workings of the aether. I could sense the nuances of dreamscapes and rogue spirits. Things outside myself. Things the average voyant wouldn't feel.

Share This Page