Imet Kevin Mitnick for the first time in , during the filming of a Discovery absorb the incredible, almost unbelievable tale of Kevin Mitnick’s life and exploits . Steve Jobs by Walter Isaacson Hackers by Steven Levy The Cuckoo’s Egg by Clifford Stoll Ghost in the Wires by Kevin D. Mitnick iWoz by Steve Wozniak. The world’s most famous hacker discusses his new book, his exploits, his imprisonment and his success. Meet the Ghost in the Wires, Kevin.
|Published (Last):||14 September 2008|
|PDF File Size:||17.27 Mb|
|ePub File Size:||14.19 Mb|
|Price:||Free* [*Free Regsitration Required]|
If you have a thing for old phones and you want to know more about how you could have hacked them back in the eighties, this book is for you! Jan 12, Claire rated it did not like it. In short, a good read. The dangers of For most people, computers are magic.
If I can recommend it to anyone, I’d recommend it to people who are interested in a non-fiction example of the “unreliable narrator”. At times, the book is a page-turner as we see inside Mitnick’s world of how his life of hacking consumed him at times, while at fhost he tried to walk away and not hack any more.
He talks at the end on how he’s brought in to speak on how to make organizations safer but he makes no reference to jn recommendations.
More specifically, most of his hacking was phone “phreaking,” where he cons the phone company into giving him free long distance in various ways. As for the book itself, the introduction of a bit of healthy paranoia in a digestible and sometimes entertaining form is what its undoubtedly good for.
Ghost in the Wires: The Kevin Mitnick Interview
Mitnick keeps the structure of the book strictly chronological, with just enough foreshadowing to whet our appetites in anticipation of future events. This biography was lava-hot recommended by the one of the co-founders of our tech company when a portion of us me included rebelled against introduction of policies. He uses his abilities not only to hide from his pursuers, but to spy on them to see how close they are getting.
At long last, we could finally see inside the world Mitnick hinted at in that interview and in his previous two books. The guy that wrote it is a computer hacker and a sophisticated one.
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
I find it interesting that Mr. This form of theft, as well as repeated breaking and entering, both electronically and physically, seems to be viewed as no problem.
Sure, he described the. You may unsubscribe from these newsletters at any time. Kevin Mitnick was the first famous hacker that I remember.
The story behind the FBI was interesting, as they struggled to keep up with this new white collar crime they knew nothing about. He certainly didn’t fit into the Ectomorphic Cerebrotonic somatotype that I expected.
What do you hope to accomplish with it? Gohst April 24, Back when he was active he would have been considered more of a Phone Phreak im he does cover a bit or a Cracker. In one scene Mitnick is severely critical of prosecutors who use “dirty tactics” to put him behind bars, but then he continues to use his own dirty tactics while behind those bars.
Online with Kevin Mitnick: No, he’s just a curious guy who hacks for the thrill of it, and really, what’s so bad about that? Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, Kevin Mitnick, the world’s most famous former computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time “most wanted” criminal of cyberspace, on the run from the bewildered Feds.
It’s strip malls, Kinko’s and Sizzler rather than Corsica and Durban. Then he’d keep calling different people and trick them into giving passwords. He obtains access to the IRS and DMV records, which later becomes ghst as he creates false identities and goes on the run. So -2 stars for being an autobiography of someone I’m saddened to know exists. Some parts made me support Kevin and other times I didn’t and at other times I felt frustrated with him and thinking he making a big mistake while reading this book.
Littman, Jonathan June Twenty years for each call! Hackers stole names, addresses, and dates of birth of North Korean defectors. At times, Mitnick is a bit short-sighted in things and that comes across. Maybe he chooses to call himself a Hacker because he’s trying to appeal i a wider audience that wouldn’t know the difference. He now runs the security firm Mitnick Security Consulting, LLC which helps test companies’ security strengths, weaknesses, and potential loopholes.
I believe that the lack of these qualities renders him incapable of writing a book this interesting, so the book’s success is due to Simon.
Mitnick had this whole ingenious system for tricking people, oh sorry ‘socially engineering’. The time, energy, and money he cost hundreds –thousands? Archived from the original on December 22, Kevin Mitnick takes readers on both an emotional and logical journey, taking us through his experiences in Prison to being able to hack a new identity mitnicj on the run from the FBI in the early 90s.
Kevin Mitnick – Wikipedia
He had many tricks. Hacker named to Homeland Security Advisory Council. It’s a brisk read, and you won’t put it down. Even before he becomes a fugitive, there is a sense of danger always around the corner.