Top 118 Hackers Quotes & Sayings - Page 2

Explore popular Hackers quotes.
Last updated on April 14, 2025.
The openness on which Apple had built its original empire had been completely reversed - but the spirit was still there among users. Hackers vied to 'jailbreak' the iPhone, running new apps on it despite Apple's desire to keep it closed.
I think we need to get to the bottom of it. And I think there should be an investigation [of hackers attacks] because in order to defend ourselves against other adversarial countries, we have to protect our information.
What we're going to get as this next generation grows up is more hacking skills and this is spreading geographically also - Africa is about to come on the scene, South and Central America are going to be major sources of hackers. These people have got to be engaged with.
When Paul [Greengrass] was writing, he'd send me story ideas that he had. He was particularly interested in social movements and revolutions that had been happening all over the world, and how computers and the internet had helped those movements. He encouraged me to read a book about Anonymous, the hacker group called "white hat" hackers, meaning they're driven by ideology and social disruption as opposed to just greed.
Since Hillary Clinton won the popular vote, why are they complaining about the Russians hacking the election? I mean, Hillary wins the popular vote, what more can a hacker do than get you the majority of the popular vote? But yet they're running around complaining about the hackers and they're blaming the Russians for stealing the election.
It's no surprise that hackers working for North Korea, Iran's mullahs, Vladimir V. Putin in Russia, and the People's Liberation Army of China have all learned that the great advantage of cyberweapons is that they are the opposite of a nuke: hard to detect, easy to deny, and increasingly finely targeted.
When Clinton traveled to Russia, known for its hackers and cyber warfare against the United States and other democracies, she didn't bother to tap into the government-protected email system provided by the State Department. Instead, she continued to communicate through her personal, home-brewed and unsecured server.
Where there's a will, there's a way. Hackers tend to find a way. Code is also expanding. More lines of code means more probability that there is an exploit that can be [used].
The criminal justice system - although this applies less to the U.S., where rehabilitation is not seen as a valuable contribution to criminal justice - in Europe where rehab is supposed to be integral, we have no way of rehabilitating skilled hackers. On the contrary what we do is we demonize them and continue to do so after they come out of jail because we restrict their access to computers by law. Crazy world, crazy people.
In the epic war over Silicon Valley's intellectual property, Bill Gates was on the side of licensing copyright and robust protections for intellectual property. He wasn't on the side of the hackers, and he didn't want information to be free.
If Wikileaks didn't resolve that question for folks - at the end of the day, there are no secrets. We're living in a glass neighborhood, in a fishbowl, and technology, white hat hackers, the folks that are doing the right thing with hacking.
From the Latin word "imponere", base of the obsolete English "impone" and translated as "impress" in modern English, Nordic hackers have coined the terms "imponator" (a device that does nothing but impress bystanders, referred to as the "imponator effect") and "imponade" (that "goo" that fills you as you get impressed with something - from "marmelade", often referred as "full of imponade", always ironic).
Celebrities, make it harder for hackers to get nude pics of you from your computer by not putting nude pics of yourself on the computer. — © Ricky Gervais
Celebrities, make it harder for hackers to get nude pics of you from your computer by not putting nude pics of yourself on the computer.
I think it's a little premature to talk about response until we know exactly what happened, but we should know what happened. And we should know how to defend [against hackers attacks] ourselves without question.
I think some of the most interesting stuff was seeing how the Dark Web works and seeing how easy it is for hackers to break into your computer or your bank account or your private information.
We fear hackers lifting our digital wallet, a public accounting of our private lives, and we wonder if the shoes that follow us around the Internet will someday, with the click of a distant mouse, look like the jackboots of old.
A hacker is someone who enjoys playful cleverness—not necessarily with computers. The programmers in the old MIT free software community of the 60s and 70s referred to themselves as hackers. Around 1980, journalists who discovered the hacker community mistakenly took the term to mean “security breaker.”
It is not just software glitches and corrupted memory cards that should be on the minds of election officials. Hackers pose another very real problem whereby an election could be tilted towards a favored candidate.
In the aftermath of the oh-so-predictable crash, the Bitcoin fanatics have begun marshaling out excuse after excuse for why this non-investment investment lost so much of its value so fast. One was that hackers attacked some of the exchanges for Bitcoins and crippled it. Really? A hacker can wreck an entire market?
You have a very large population of hackers in Eastern Europe in general and Russia especially. A lot of them consider themselves patriotic individuals and will take broad direction from government policies.
I am well aware of the facts presented by numerous security experts on the many ways in which the United States' digital networks have come under siege by cybercriminals and under daily assault by hackers in league with various foreign governments.
The big exchanges that hold customer deposits are a big target for hackers, and unfortunately, most bitcoin exchanges store user funds.
"Story-tellers" should listen seriously to design and architecture without getting all literary and imperial about that. Hackers are arrogant geek romantics. They lack the attentive spirit of inquiry.
Incredibly, hackers were able to obtain at least 20 million identities of people who under FBI background and were under FBI background investigations.
What we're looking at is a future where cars will be comfortable and safe and offer the luxuries of both home and office. That means lots of sensors and software, as well as the critical safety systems to protect the car's information from hackers.
The hackers don't want to destroy the network. They want to keep it running, so they can keep making money from it.
I have a G4 at home. Theyre great machines for individual users, and I even know a few core Linux hackers who are having a lot of fun with them. But if you want to move the needle on the non-Microsoft desktop, youve got to look elsewhere.
For countries such as Kenya to emerge as economic powerhouses, they need better infrastructure: roads, ports, smart grids and power plants. Infrastructure is expensive, and takes a long time to build. In the meantime, hackers are building 'grassroots infrastructure,' using the mobile-phone system to build solutions that are ready for market.
I met a lot of hackers, and some of them were very arrogant. They thought I was stupid because I couldn't follow what they were talking about. But then I met this great guy whom companies hire to find their security holes, and he was very good about explaining so I could understand.
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
There are proxies, proxy servers on the internet, and this is very typical for hackers to use. They create what are called proxy chains where they gain access to a number of different systems around the world, sometimes by hacking these, and they use them as sort of relay boxes.
This will include the various methods of internal monitoring, attack and penetration, investigation of suspected hackers or rogue employees - and you have plenty of rogue employees - and identity protection for government employees. The review team will also remain current on the constantly evolving new methods of attack and will attempt to anticipate them and develop defenses as often as possible before breaches occur.
If hackers, if anyone committing a criminal act, wants to reduce their risk, they obviously don't involve anybody else. The greater the circle of people that know what you're doing, the higher the risk.
Cory Doctorow is a fast and furious storyteller who gets all the details of alternate reality gaming right, while offering a startling, new vision of how these games might play out in the high-stakes context of a terrorist attack. Little Brother is a brilliant novel with a bold argument: hackers and gamers might just be our country's best hope for the future.
Humans make mistakes. Programmers are bound to make mistakes. Hackers, you can bet your life, are going to be there to exploit those mistakes. — © Michael Demon Calce
Humans make mistakes. Programmers are bound to make mistakes. Hackers, you can bet your life, are going to be there to exploit those mistakes.
Everything about Mark Zuckerberg is pure hacker. Hackers don't take realities of the world for granted; they seek to break and rebuild what they don't like. They seek to outsmart the world.
Lisp was far more powerful and flexible than any other language of its day; in fact, it is still a better design than most languages of today, twenty-five years later. Lisp freed ITS's hackers to think in unusual and creative ways. It was a major factor in their successes, and remains one of hackerdom's favorite languages.
I will say that one of the things that hackers, of all shapes and sizes, prize the most in this world is anonymity and stealth and deniability. And by indicting them publicly, among other things, we strip them of that.
The entire report [on Russians hackers attacks] is based on unnamed sources who are perhaps doing something they shouldn't be doing by speaking to reporters or someone talking out of line about something that is absolutely not true.
Too many public and private entities simply don't take advantage of tools already at their disposal to protect themselves from hackers. No amount of information sharing will help solve that problem.
My parents had a software company making children's software for the Apple II+, Commodore 64 and Acorn computers. They hired these teenagers to program the software, and these guys were true hackers, trying to get more colors and sound and animation out of those computers.
I talked to the general counsel of the DNC, and he assures me that every step along the way, when we were notified of these issues, that we changed systems, changed procedures, but these hackers are so sophisticated that they changed procedures.
I think the thing that our government lacks - just about more than anything else - is technological competence. We have some of the greatest white-hat hackers in the world here in the U.S., but the government seems to be technologically illiterate.
I haven't seen - I haven't heard the arguments that would make that case. And I haven't seen a proposal yet that satisfies the objections. The problem is, you create a key like this, and it can't - it's hard to say that it's going to be hidden. And then it becomes used both by our government in multiple cases, but also it could get out as far as hackers are concerned or other countries.
Very smart people are often tricked by hackers, by phishing. I don't exclude myself from that. It's about being smarter than a hacker. Not about being smart.
Service disruptions have to be avoided or at least resolved as quickly as possible. When the Internet goes down, consumers don't notice the difference between a technical malfunction, an act of sabotage by hackers or a military attack.
I've never really been associated with the hackers very much. I am sympathetic to them. I understand how their mind works. It's like a child that is born and wants to explore every little - open up every little drawer there is and find out how the world works.
The Hacker Ethic: Access to computers--and anything which might teach you something about the way the world works--should be unlimited and total. Always yield to the Hands-On Imperative! All information should be free. Mistrust authority--promote decentralization. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. You can create art and beauty on a computer. Computers can change your life for the better.
When hackers have access to powerful computers that use brute force hacking, they can crack almost any password; even one user with insecure access being successfully hacked can result in a major breach.
Simple genome engineering of bacteria and yeast is just the beginning of the rise of the true biohackers. This is a community of several thousand people, with skill sets ranging from self-taught software hackers to biology postdocs who are impatient with the structure of traditional institutional lab work.
We want Facebook to be one of the best places people can go to learn how to build stuff. If you want to build a company, nothing better than jumping in and trying to build one. But Facebook is also great for entrepreneurs/hackers. If people want to come for a few years and move on and build something great, that's something we're proud of.
Digital warfare, in the Clausewitz definition as 'the continuation of policy by other means,' reached Western public consciousness via my own country, Estonia, in 2007 when our governmental, banking, and news media servers were hit with 'distributed denial-of-service attacks,' which is when hackers overload servers until they shut down.
Our civilization is facing a radical, imminent mass change. The alternative to the hierarchical power structure is based on mutual aid and group consensus. As hackers we can learn these systems, manipulate these systems, and shut down these systems if we need to.
If I compared myself to my kids, they know everything, and they're like small little hackers. I feel also that my identity can be stolen; I'm very paranoid about it compared to other people in the younger generation.
I seem to be getting a lot of things pushed my way that are strong women. It's like people see Hackers and they send me offers to play tough women with guns, the kind who wear no bra and a little tank top. I'd like to play strong women who are also very feminine.
For the first time, individual hackers could afford to have home machines comparable in power and storage capacity to the minicomputers of ten years earlier - Unix engines capable of supporting a full development environment and talking to the Internet.
One of my favourite books about hackers is 'Masters of Deception' about this hacking group in the 1990s. Many of them didn't come from wealthy families. These are kids that are very intelligent; they just happen to be misdirected.
Russian hackers interfered in our elections, and we like penalized a few of them. Whatever they're doing underground, we don't know. No, this is going to be a big issue. And I have to say the Barack Obama - the Donald Trump position is, A, mystifying, but, B, doomed. He has a nice little Vladimir Putin romance going on right now. I think we're going to get out the hankies, because this is going to turn into an ugly relationship within a year or two.
This site uses cookies to ensure you get the best experience. More info...
Got it!