I think some of the most interesting stuff was seeing how the Dark Web works and seeing how easy it is for hackers to break into your computer or your bank account or your private information.
A lot of hackers set up scam sites. They can impersonate a site like PayPal, for instance.
In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that.
A critical factor in its success was that the X developers were willing to give the sources away for free in accordance with the hacker ethic, and able to distribute them over the Internet.
Being able to break security doesn't make you a hacker anymore than being able to hotwire cars makes you an automotive engineer.
Our civilization is facing a radical, imminent mass change. The alternative to the hierarchical power structure is based on mutual aid and group consensus. As hackers we can learn these systems, manipulate these systems, and shut down these systems if we need to.
If you give a hacker a new toy, the first thing he'll do is take it apart to figure out how it works.
I characterize myself as a retired hacker. I'm applying what I know to improve security at companies.
It's much easier to become a hacker now. It was a private community before and you had to find your way in, like tumbling down a rabbit hole. Today, there are all-in-one desktops fully equipped with tools pre-built into the operating system, all related to hacking. They are all very powerful tools and free to download.
A smartphone links patients' bodies and doctors' computers, which in turn are connected to the Internet, which in turn is connected to any smartphone anywhere. The new devices could put the management of an individual's internal organs in the hands of every hacker, online scammer, and digital vandal on Earth.
When Paul [Greengrass] was writing, he'd send me story ideas that he had. He was particularly interested in social movements and revolutions that had been happening all over the world, and how computers and the internet had helped those movements. He encouraged me to read a book about Anonymous, the hacker group called "white hat" hackers, meaning they're driven by ideology and social disruption as opposed to just greed.
Everything about Mark Zuckerberg is pure hacker. Hackers don't take realities of the world for granted; they seek to break and rebuild what they don't like. They seek to outsmart the world.
In early 1993, a hostile observer might have had grounds for thinking that the Unix story was almost played out, and with it the fortunes of the hacker tribe.
The beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1.
It is not just software glitches and corrupted memory cards that should be on the minds of election officials. Hackers pose another very real problem whereby an election could be tilted towards a favored candidate.
No matter what calamities befall him in everyday life, the true hacker still needs the pressure and inconvenience of four hours of trudging in wind or rain or sleet or sun (or all of them at once), hacking at a white pellet that seems to have a mind of its own and a lousy sense of direction.
I've got six months to sort out the hackers, get the Japanese knotweed under control and find an acceptable form of narcissus.
I'm a hacker!" Cadel protested. "I don't poison people! I don't blow them up!
Lisp was far more powerful and flexible than any other language of its day; in fact, it is still a better design than most languages of today, twenty-five years later. Lisp freed ITS's hackers to think in unusual and creative ways. It was a major factor in their successes, and remains one of hackerdom's favorite languages.
Wicked Tribe, Rooling Tribe! is the mejor hacker tribe. Too small, too fast, too scientific!
My background, I really am a computer hacker. I've studied computer science, I work in computer security. I'm not an actively a hacker, I'm an executive but I understand the mindset of changing a system to get the outcome that you want. It turns out to make the coffee, the problem is actually how the beans get turn into green coffee. That's where most of the problems happen.
The Chinese had accused the Tibetans of being terrorists, which is weird. A Tibetan terrorist is like an Amish hacker. It just doesn't fit.
Celebrities, make it harder for hackers to get nude pics of you from your computer by not putting nude pics of yourself on the computer.
The conspiracy behind the Anthropogenic Global Warming myth (aka AGW; aka ManBearPig) has been suddenly, brutally and quite deliciously exposed after a hacker broke into the computers at the University of East Anglia's Climate Research Unit (aka Hadley CRU) and released 61 megabytes of confidential files onto the internet. (Hat tip: Watts Up With That)
We want Facebook to be one of the best places people can go to learn how to build stuff. If you want to build a company, nothing better than jumping in and trying to build one. But Facebook is also great for entrepreneurs/hackers. If people want to come for a few years and move on and build something great, that's something we're proud of.
Follow AzQuotes on Facebook, Twitter and Google+. Every day we present the best quotes! Improve yourself, find your inspiration, share with friends
or simply: