Explore the wonderful quotes under this tag
The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers.
Sep 12, 2025
We want to protect American interests. It's America first. I don't want the D.N.C. hacked. I don't want anybody hacked. But I don't know who did the hacking. That's my point.
This is our world now The world of the electron and the switch, the beauty of the baud.
Watching a documentary with people hacking their way through some polar wasteland is merely a visual. Actually trying to deal with cold that can literally kill you is quite a different thing.
We contacted the FBI months ago, when the DNC issue came about. They've reviewed all of our systems. We have hacking detection systems in place.
It's much easier to become a hacker now. It was a private community before and you had to find your way in, like tumbling down a rabbit hole. Today, there are all-in-one desktops fully equipped with tools pre-built into the operating system, all related to hacking. They are all very powerful tools and free to download.
Hillary Clinton has taught us really how vulnerable we are in cyber hacking.
I don't think I underestimated [Vladimir Putin], but I think that I underestimated the degree to which, in this new information age, it is possible for misinformation for cyber hacking and so forth to have an impact on our open societies, our open systems, to insinuate themselves into our democratic practices in ways that I think are accelerating.
[ Cyber hacking] that's probably the only thing that we've learned from Hillary Clinton.
I have this extraordinary curiosity about all subjects of the natural and human world and the interaction between the physical sciences and the social sciences.
I hope that this [hacking] does not continue to be viewed purely through a partisan lens.I think there are Republicans as well as Democrats who are concerned about this.
Premature optimization is the root of all evil in programming.
Premature optimization is the root of all evil.
I got so passionate about technology. Hacking to me was like a video game. It was about getting trophies. I just kept going on and on, despite all the trouble I was getting into, because I was hooked.
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.
As a young boy, I was taught in high school that hacking was cool.
We live in a world where we're all on computers and tablets and phones, all the time, so something as odd as computer hacking or a virus is really scary because it gets to the heart of our security.
When you zap things with light to build quantum computers, you're hacking existing systems. You're hijacking the computation that's already happening in the universe, just like a hacker takes over someone else's computer.
You always start with a fantasy. Part of the fantasy technique is to visualize something as perfect. Then with the experiments you work back from the fantasy to reality, hacking away at the components.
The Russians stole from the Democratic National Committee with hacking.
Mike Myatt’s ‘Hacking Leadership’ is a must read… Mike combines insightful yet practical commentary with in the trenches leadership experience few can match. I would highly recommend this text to anyone looking to become a better leader.
Grimly, she realized that clocks don't make a sound that even remotely resembles ticking, tocking. It was more the sound of a hammer, upside down, hacking methodically at the earth. It was the sound of a grave.
It is hard to write a simple definition of something as varied as hacking, but I think what these activities have in common is playfulness, cleverness, and exploration. Thus, hacking means exploring the limits of what is possible, in a spirit of playful cleverness. Activities that display playful cleverness have "hack value".
The Russians sought to interfere with the election process - that the cyber hacking that took place by the Russians was part of that campaign, and that they had a clear preference in terms of outcomes.
It's clear why hacking communities are [growing]. Because it's like, there's a lot more gold there. There's a lot more to steal than ever before.
Movies such as 'Citizen Kane' and 'The Front Page' portrayed an era when driven newspapermen would do anything to get a story. The U.K.'s rough-and-tumble Fleet Street remains something of a throwback to that era, as demonstrated by the recent phone-hacking scandal - which led to the demise of yet another century-old paper, the 'News of the World.'
The thing that has disturbed me most about the Russian hacking episode is - and the thing that surprised me most has not been the fact of Russian hacking. The cyber world is full of information gathering, you know, propaganda, et cetera. I have been concerned about the degree to which, in some circles, you've seen people suggest that Vladimir Putin has more credibility than the U.S. government. I think that's something new.
China is stealing our intellectual property, our patents, our designs, our technology, hacking into our computers, counterfeiting our goods.
Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.
Reports the CIA has concluded that Russian hacking of Democratic emails was aimed at helping Donald Trump defeat Hillary Clinton, a step beyond the intelligence community's earlier finding that Russia was simply trying to cast doubt on the integrity of our elections.
We couldn't build quantum computers unless the universe were quantum and computing. We can build such machines because the universe is storing and processing information in the quantum realm. When we build quantum computers, we're hijacking that underlying computation in order to make it do things we want: little and/or/not calculations. We're hacking into the universe.
The Democratic Party would like to see an open independent bipartisan investigation [about hacking].
American companies spend more than $200 billion each year hacking women's bodies into bits and pieces, urging comparisons between self and other, linking value to air-brushed ideals, and as the girls in my seventh-grade class graduated to high school and beyond, the imagery around us would only grow more specific, more pummeling, more insidious.
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
Listen up. Let me tell you something. A man ain’t a goddamn ax. Chopping, hacking, busting every goddamn minute of the day. Things get to him. Things he can’t chop down because they’re inside.
Elderly gentlemen, gentle in all respects, kind to animals, beloved by children, and fond of music, are found in lonely corners of the downs, hacking at sandpits or tussocks of grass, and muttering in a blind, ungovernable fury elaborate maledictions which could not be extracted from them by robbery or murder. Men who would face torture without a word become blasphemous at the short fourteenth. It is clear that the game of golf may well be included in that category of intolerable provocations which may legally excuse or mitigate behavior not otherwise excusable.
Sadly, as with so much about history's heroes, it's the spotting of potential fame that's the difficulty, whether it's publishing their poems, hanging their paintings, or buying their old underwear. Think of the great men whose lives passed in penury and hacking coughs due to public unawareness that their littlest possession would end up at Sothebys or the basement at Fort Knox.
The administration [of Barack Obama] is going to have to figure out, you know, a tough response on the basis of this [Russian] hacking.
Artemis felt like he was six again and caught hacking the school computers trying to make the test questions harder
I don’t think you’re supposed to be able to get at that information,” said Leslie. “Don’t look,” said Goldstein, peering over Charles’s shoulder. “We don’t know anything about illegal hacking.” He whistled cheerily.
I've been frankly very surprised at the intensity of our differences [with Russia]. I mean, between what appears to be hacking of our political system to the aggressive use of nukes on the borders, to these atrocities in Syria and their warnings. I've been very, very surprised at the intensity of all this.
With hacking getting more and more sophisticated, the hacking community has gone from the hobbyist in the basement to huge sophisticated companies that are essentially doing this, or groups of people or foreign agents inside and outside the United States.
[President Donald Trump ] trusts the CIA. This is about 17 or so unnamed agencies in an unnamed report that based the report on something that is totally false.The RNC was not hacked. And so the report is basically trying to make the case that the RNC was hacked, the DNC was hacked, and the only e-mails that came out were DNC e-mails, so therefore, this is the conclusive report that the Russians or whoever was doing the hacking wanted to unfairly change the election.
It's a cultural disability in America that we worship pleasure, leisure, and affluence. I think the church is doubly damned when they use Jesus as a vehicle for achieving all of that. Like, if you give a tithe, He'll make you rich. Why? Are you hacking Him off or something? If you give a tithe, you get rid of ten percent of the root of all evil. You should be giving ninety percent. Cause God can handle money better than we can.
I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses.
Cyber security will be an issue that I will be absolutely focused on as president. Because whether it's Russia, or China, Iran or North Korea more and more countries are using hacking to steal our information, to use it to their advantage. And we can't let that go on.
Death is hacking away at my address book and party lists.
It happened: the first 9/11, it happened on September 11, 1973, in Chile. We did it. Was that interfering or hacking a party? This record is all over the world, constantly overthrowing governments, invading, forcing people to follow what we call democracy, as in the cases I mentioned. As I say, if every charge is accurate, it's a joke, and I'm sure half the world is collapsing in laughter about this, because people outside the United States know it. You don't have to tell people in Chile about the first 9/11.
There are proxies, proxy servers on the internet, and this is very typical for hackers to use. They create what are called proxy chains where they gain access to a number of different systems around the world, sometimes by hacking these, and they use them as sort of relay boxes.
The Hacker Ethic: Access to computers--and anything which might teach you something about the way the world works--should be unlimited and total. Always yield to the Hands-On Imperative! All information should be free. Mistrust authority--promote decentralization. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. You can create art and beauty on a computer. Computers can change your life for the better.