Zitat des Tages über Hacker / Hackers:
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy.
Well, take the evolution of the Electronic Frontier Foundation. It began as hackers' rights. Then it became general civil liberties of everybody - government stay away.
Hackers often describe what they do as playfully creative problem solving.
I'm a hacker, but I'm the good kind of hackers. And I've never been a criminal.
The workstation-class machines built by Sun and others opened up new worlds for hackers.
I talked to the general counsel of the DNC, and he assures me that every step along the way, when we were notified of these issues, that we changed systems, changed procedures, but these hackers are so sophisticated that they changed procedures.
For countries such as Kenya to emerge as economic powerhouses, they need better infrastructure: roads, ports, smart grids and power plants. Infrastructure is expensive, and takes a long time to build. In the meantime, hackers are building 'grassroots infrastructure,' using the mobile-phone system to build solutions that are ready for market.
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
Too many public and private entities simply don't take advantage of tools already at their disposal to protect themselves from hackers. No amount of information sharing will help solve that problem.
My parents had a software company making children's software for the Apple II+, Commodore 64 and Acorn computers. They hired these teenagers to program the software, and these guys were true hackers, trying to get more colors and sound and animation out of those computers.
I met a lot of hackers, and some of them were very arrogant. They thought I was stupid because I couldn't follow what they were talking about. But then I met this great guy whom companies hire to find their security holes, and he was very good about explaining so I could understand.
I am well aware of the facts presented by numerous security experts on the many ways in which the United States' digital networks have come under siege by cybercriminals and under daily assault by hackers in league with various foreign governments.
Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon.
It is not just software glitches and corrupted memory cards that should be on the minds of election officials. Hackers pose another very real problem whereby an election could be tilted towards a favored candidate.
Very smart people are often tricked by hackers, by phishing. I don't exclude myself from that. It's about being smarter than a hacker. Not about being smart.
Berkeley hackers liked to see themselves as rebels against soulless corporate empires.
What fashion has started from hackers? They have bad posture, and they don't go out. I wish I had a hacker boyfriend - they stay at home up in the bedroom.
Everything about Mark Zuckerberg is pure hacker. Hackers don't take realities of the world for granted; they seek to break and rebuild what they don't like. They seek to outsmart the world.
I seem to be getting a lot of things pushed my way that are strong women. It's like people see Hackers and they send me offers to play tough women with guns, the kind who wear no bra and a little tank top. I'd like to play strong women who are also very feminine.
Simple genome engineering of bacteria and yeast is just the beginning of the rise of the true biohackers. This is a community of several thousand people, with skill sets ranging from self-taught software hackers to biology postdocs who are impatient with the structure of traditional institutional lab work.
Should we fear hackers? Intention is at the heart of this discussion.
Younger hackers are hard to classify. They're probably just as diverse as the old hackers are. We're all over the map.
In the aftermath of the oh-so-predictable crash, the Bitcoin fanatics have begun marshaling out excuse after excuse for why this non-investment investment lost so much of its value so fast. One was that hackers attacked some of the exchanges for Bitcoins and crippled it. Really? A hacker can wreck an entire market?
Growth hackers are typically computer engineers that build great marketing ideas into the product during the development process.
The openness on which Apple had built its original empire had been completely reversed - but the spirit was still there among users. Hackers vied to 'jailbreak' the iPhone, running new apps on it despite Apple's desire to keep it closed.
Growth hackers don't tolerate waste.
I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security.
For the first time, individual hackers could afford to have home machines comparable in power and storage capacity to the minicomputers of ten years earlier - Unix engines capable of supporting a full development environment and talking to the Internet.
Hackers are seen as shadowy figures with superhuman powers that threaten civilization.
The big exchanges that hold customer deposits are a big target for hackers, and unfortunately, most bitcoin exchanges store user funds.
U.S. computer networks and databases are under daily cyber attack by nation states, international crime organizations, subnational groups, and individual hackers.
As economic life relies more and more on the Internet, the potential for small bands of hackers to launch devastating attacks on the world economy is growing.
If I compared myself to my kids, they know everything, and they're like small little hackers. I feel also that my identity can be stolen; I'm very paranoid about it compared to other people in the younger generation.
An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists.
Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.
If Wikileaks didn't resolve that question for folks - at the end of the day, there are no secrets. We're living in a glass neighborhood, in a fishbowl, and technology, white hat hackers, the folks that are doing the right thing with hacking.