Explore the wonderful quotes under this tag
Those North Korean hackers are at it again. Earlier today they leaked Santa's naughty list.
Sep 17, 2025
I haven't seen - I haven't heard the arguments that would make that case. And I haven't seen a proposal yet that satisfies the objections. The problem is, you create a key like this, and it can't - it's hard to say that it's going to be hidden. And then it becomes used both by our government in multiple cases, but also it could get out as far as hackers are concerned or other countries.
Being a journalist, Hacker had no particular talent for reporting facts.
Never send a boy to do a woman's job.
The beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1.
If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works.
Lots of Americans, they do think that yes, Russian hackers are everywhere. Russian hackers are in every fridge, Russian hackers are in every iron and so on and so forth. But this is not true. Those are fake news and this is slander.
Most hackers graduate from Unix and Linux platforms. They know them intimately. They don't try to exploit them
The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone - if a hacker or something images your phone - they can't read what's on the phone itself, they can't look at your pictures, they can't see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example.
I've never really been associated with the hackers very much. I am sympathetic to them. I understand how their mind works. It's like a child that is born and wants to explore every little - open up every little drawer there is and find out how the world works.
If you wanna know how not secure you are, just take a look around. Nothing's secure. Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security.
Should we fear hackers? Intention is at the heart of this discussion.
A smartphone links patients' bodies and doctors' computers, which in turn are connected to the Internet, which in turn is connected to any smartphone anywhere. The new devices could put the management of an individual's internal organs in the hands of every hacker, online scammer, and digital vandal on Earth.
I have a G4 at home. Theyre great machines for individual users, and I even know a few core Linux hackers who are having a lot of fun with them. But if you want to move the needle on the non-Microsoft desktop, youve got to look elsewhere.
It's much easier to become a hacker now. It was a private community before and you had to find your way in, like tumbling down a rabbit hole. Today, there are all-in-one desktops fully equipped with tools pre-built into the operating system, all related to hacking. They are all very powerful tools and free to download.
When an attacker fails with one person, they often go to another person. The key is to report the attack to other departments. Workers should know to act like they are going along with what the hacker wants and take copious notes so the company will know what the hacker is trying to find.
There are a lot of hackers today, you know, and they perform their work in such a filigreed and delicate manner and they can show their "tracks" anywhere and anytime. It may not even be a track; they can cover their activity so that it looks like hackers operating from other territories, from other countries. It is hard to check this activity, maybe not even possible. Anyway, we do not do that at the national level.
Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality.
We put up the very best cyber security - what I call infrastructure to stop them, but [hackers] constantly [didn't stop].
A critical factor in its success was that the X developers were willing to give the sources away for free in accordance with the hacker ethic, and able to distribute them over the Internet.
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
I'm a bit of a hacker fanatic and know a fair bit about that industry and cyber crime and cyber warfare.
Lisp was far more powerful and flexible than any other language of its day; in fact, it is still a better design than most languages of today, twenty-five years later. Lisp freed ITS's hackers to think in unusual and creative ways. It was a major factor in their successes, and remains one of hackerdom's favorite languages.
The criminal justice system - although this applies less to the U.S., where rehabilitation is not seen as a valuable contribution to criminal justice - in Europe where rehab is supposed to be integral, we have no way of rehabilitating skilled hackers. On the contrary what we do is we demonize them and continue to do so after they come out of jail because we restrict their access to computers by law. Crazy world, crazy people.
In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that.
Everyone wants to be called an outsider so I'm a proud insider. If I was young I'd be in my parents' house shutting down the government on my computer. The new delinquent is the hacker.
When you zap things with light to build quantum computers, you're hacking existing systems. You're hijacking the computation that's already happening in the universe, just like a hacker takes over someone else's computer.
Well, take the evolution of the Electronic Frontier Foundation. It began as hackers' rights. Then it became general civil liberties of everybody - government stay away.
While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm.
It is not just software glitches and corrupted memory cards that should be on the minds of election officials. Hackers pose another very real problem whereby an election could be tilted towards a favored candidate.
I love being a businessman much more than being a hacker.
Of all the things I've lost I miss my mind the most.
The Hacker Way is an approach to building that involves continuous improvement and iteration. Hackers believe that something can always be better, and that nothing is ever complete.
There are more hackers breeding every day, and more brilliant minds are turning into hackers. Security has advanced, but so have hackers.
The hackers who hacked into Sony have leaked the upcoming script for the new James Bond movie. Some of the executives said the news left them shaken but not stirred.
I'm a hacker!" Cadel protested. "I don't poison people! I don't blow them up!
I think Linux is a great thing, in the big picture. It's a great hacker's tool, and it has a lot of potential to become something more.
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
We want Facebook to be one of the best places people can go to learn how to build stuff. If you want to build a company, nothing better than jumping in and trying to build one. But Facebook is also great for entrepreneurs/hackers. If people want to come for a few years and move on and build something great, that's something we're proud of.
My background, I really am a computer hacker. I've studied computer science, I work in computer security. I'm not an actively a hacker, I'm an executive but I understand the mindset of changing a system to get the outcome that you want. It turns out to make the coffee, the problem is actually how the beans get turn into green coffee. That's where most of the problems happen.
Incredibly, hackers were able to obtain at least 20 million identities of people who under FBI background and were under FBI background investigations.
nd the reason is is if you put a backdoor in, hackers can presumably get a hold of that backdoor as well and break it open. So you make systems less secure for everyone if you do that.
We hackers are a playful bunch; we'll hack anything, including language, if it looks like fun (thus our tropism for puns). Deep down, we like confusing people who are stuffier and less mentally agile than we are, especially when they're bosses. There's a little bit of the mad scientist in all hackers, ready to discombobulate the world and flip authority the finger - especially if we can do it with snazzy special effects.
Andrew Hacker argues that algebra and trigonometry and calculus are subjects that almost nobody used after they graduate, and so why should we continue to compel students to try to pass them?
The conspiracy behind the Anthropogenic Global Warming myth (aka AGW; aka ManBearPig) has been suddenly, brutally and quite deliciously exposed after a hacker broke into the computers at the University of East Anglia's Climate Research Unit (aka Hadley CRU) and released 61 megabytes of confidential files onto the internet. (Hat tip: Watts Up With That)
The Hacker Ethic: Access to computers--and anything which might teach you something about the way the world works--should be unlimited and total. Always yield to the Hands-On Imperative! All information should be free. Mistrust authority--promote decentralization. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. You can create art and beauty on a computer. Computers can change your life for the better.
The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
I've got six months to sort out the hackers, get the Japanese knotweed under control and find an acceptable form of narcissus.
I would like to repeat: I know absolutely nothing about [hacker's attacks], and Russia has never done anything like this at the State level.