Imet Kevin Mitnick for the first time in , during the filming of a Discovery absorb the incredible, almost unbelievable tale of Kevin Mitnick’s life and exploits . Steve Jobs by Walter Isaacson Hackers by Steven Levy The Cuckoo’s Egg by Clifford Stoll Ghost in the Wires by Kevin D. Mitnick iWoz by Steve Wozniak. The world’s most famous hacker discusses his new book, his exploits, his imprisonment and his success. Meet the Ghost in the Wires, Kevin.

Author: Kajikasa Kajile
Country: Timor Leste
Language: English (Spanish)
Genre: Marketing
Published (Last): 11 January 2006
Pages: 214
PDF File Size: 17.81 Mb
ePub File Size: 8.75 Mb
ISBN: 900-5-23172-271-5
Downloads: 18227
Price: Free* [*Free Regsitration Required]
Uploader: Dozil

I would probably recommend this book to every IT person I know at work, but I’m not sure about anyone else. Oct 15, Joe rated it did not like it Shelves: The cost must have been overwhelming. As Mitnick points out several times in his own story, his escapades are remarkable enough without the mittnick rumors that grew around his legend over the years. My Profile Log Out.

Ghost in the Wires: The Kevin Mitnick Interview

Mitnick receives from law enforcement. I don’t know about the others or the Lulz guys. This unbelievably wild and crazy book describing the “adventures of the world’s most wanted hacker” was captivating from start to finish.

They took it personally. What do you think of that? But, I rated this book highly, not because it’s all true, or becau This book gives a glimpse into the mind of a true obsessive.

I interviewed Kevin just a few days after his appearance on The Colbert Report and we had a good time trading hacking stories, discussing his new book and talking about security issues facing individuals and companies.

At times it even seems as if Kevin is dealing with an addiction, unable to stop his love for hacking, co Ghost In The Wires follow the adventures of Kevin Mitnick, a man who is considered to be one of the most famous computer criminals of all time. It’s rare and it’s what sets them apart from everyone else. About one year of that was in solitary confinement. It was never used in the case. He’s an addict through and through.

  F5D9230-4 MANUAL PDF

So -2 stars for being an autobiography of someone I’m saddened to know exists.

Kevin Mitnick

Hacker steals 10 years worth of data from San Diego school district Officials said the hacker made off with the personal information of overstudent and staff. For someone not interested in the technology aspect, I can see how this is true. His attitude drove me nuts, dude, you’re a hacker, you broke in and stole stuff. Besides that, it was also very interesting to read how he felt while beeing on the run, trying to be one step ahead of the FBI every time they got closer to him.

I find it interesting that Mr. Even before he becomes a fugitive, there is a sense of danger always around the corner.

Ghost in the Wires: The Kevin Mitnick Interview | ZDNet

But then he found out that there was no wirws amongst thieves, a thing he could have probably have learned at much smaller cost to himself if he had read some books.

What’s the most secure OS? All I did was break into Bank of America! In fact he doesn’t even bother to explain the difference.

Mitnick calls an administrative office of a corporation, pret Ghost in the Wires: It just doesn’t wash. The time, energy, and money he cost hundreds –thousands?

There’s even a chapter entitled “I’m a scapegoat”, which, if you can elicit any empathy for his victims, makes it all the more galling dires he categorically rejects that anyone could have been hurt by this con artist. Retrieved May 27, Kevin Mitnick is a fascinating person.


Kevin Mitnick – Wikipedia

I could probably go on, but I think my opinion of this book and its author are pretty clear. Jul 01, Lee rated it liked it. Wirss when he is suspicious of being compromised on the phone, he still keeps calling and talking “for hours” to the informant, and yet feels betrayed when they turn over what they have to the authorities.

The weakest link in our cybersecurity is not the technology. No, it was to educate people about the unfair treatment I was receiving: It was like him against the system, the man, the world How wildcard characters are explained twice in two disjoint chapters but in one between. The autobiography of Kevin Mitnick, the world’s most wanted hacker.

He just wanted to read the code and understand how it worked. Retrieved April 24, It also has a strong social message.

One time he ditches his elderly, senile grandma to run in fear and save his own ass. The controversy remains, however, and the Mitnick story is often cited today as an example of the influence that mainstream newspapers can have on law ,itnick personnel.

Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers.