Share this sentence
— Kevin Mitnick"The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully."
Discover more quotes
Previous Quote
All truth is given by revelation, either general or special, and it must be received by reason. Reason is the God-given means for discovering the truth that God discloses, whether in his world or his Word. While God wants to reach the heart with truth, he does not bypass the mind.
— Jonathan Edwards
Next Quote
I love England. In fact, they're getting to know me so well at Heathrow Immigration that this time I was able to completely bypass the six months rabies quarantine.
— Emo Philips
Loading recommended content...