
Top 33 Quotes About Computer Security
#1. People have to be free to investigate computer security. People have to be free to look for the vulnerabilities and create proof of concept code to show that they are true vulnerabilities in order for us to secure our systems.
Edward Snowden
#2. This will surprise some of your readers, but my primary interest is not with computer security. I am primarily interested in writing software that works as intended.
Wietse Venema
#3. Coming back to the topic of computer security, the TCP Wrapper is an example of such a safety net. I wrote it when my systems were under attack by someone who appeared to walk through walls.
Wietse Venema
#4. Security wins many battles but loses the security war. We are definitely going backwards in computer security.
Adi Shamir
#5. The fundamental driver in computer security, in all of the computer industry, is economics. That requires a lot of re-education for us security geeks.
Bruce Schneier
#6. People don't want to talk about death, just like they don't want to talk about computer security. Maybe I should have named my workstation Fear. People are so motivated by fear.
Dan Farmer
#7. It's very important to remember that it's your intellectual property; it's not your computer. And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days.
Stewart Baker
#8. China has secretly developed an army of 180,000 cyber spies and warriors, mounting an incredible ninety thousand computer attacks a year against the U.S. Defense Department networks alone. The totality of the thefts and their impact on American national security are breathtaking.
Marc Goodman
#9. Look at airport security now. What started out as definite racial profiling is now where the computer picks a name. That's why you get a seven-month-old getting a pat down. [Imitates a security officer.] "Check the diapers. They're full."
Robin Williams
#10. Because I don't believe that it's really desirable to have security on a computer, I shouldn't be willing to help uphold the security regime.
Richard Stallman
#11. Whatever is born is the work of God. So whatever is plastered on, is the devil's work ... How unworthy of the Christian name it is to wear a fictitious face - you on whom simplicity in every form is enjoined! You, to whom lying with the tongue is not lawful, are lying in appearance.
Tertullian
#12. A friend asked one of my daughters, "Do you like politics?" And my daughter said, "No, I don't. And the reason I don't like it is because there's too much fighting, too much yelling. It's so loud, I don't like it." You know, I turned to my friend and I said, "You know, she's really on to something."
John Kasich
#13. In the future, when Microsoft leaves a security-flaw in their code it won't mean that somebody hacks your computer. It will mean that somebody takes control of your servant robot and it stands in your bedroom doorway sharpening a knife and watching you sleep.
Daniel H. Wilson
#14. Robbing someone of their smile and putting it on your own face doesn't make you happy.
Tablo
#15. [On being asked how it felt to be the first female conductor of the Boston Symphony:] I've been a woman for a little more than fifty years, and I've gotten over my original astonishment.
Nadia Boulanger
#16. To have paranoia, it's nothing bad it's like your antivurs system on your computer, it makes as much secure as possible.
Deyth Banger
#17. I struggled to keep one foot in music and one in academia. I had worked on my Ph.D. for three years full time before I realized Bad Religion could be a legitimate career.
Greg Graffin
#18. To see and listen to the wicked is already the beginning of wickedness.
Confucius
#19. If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders.
Dan Farmer
#20. I want to inform them
that I am not silent
because I have nothing to say.
I am silent
because nobody is listening.
Kelsey Sutton
#21. Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.
Kevin Mitnick
#22. We live in a world where we're all on computers and tablets and phones, all the time, so something as odd as computer hacking or a virus is really scary because it gets to the heart of our security.
Denis O'Hare
#23. The most painful things and the most happy things in life usually come from love. As a result of love or the lack of it.
Katrina Kaif
#24. Anyone who uses Windows on their home computer is familiar with routine security updates, which Microsoft issues on the second Tuesday of each month. In the Tribe it has become known as "Patch Tuesday.
Mark Bowden
#25. My current computer, in addition to 'DOS,' has 'Windows,' which is another invention of Bill Gates, designed as a security measure to thwart those users who are somehow able to get past DOS.
Dave Barry
#26. Being able to break security doesn't make you a hacker anymore than being able to hotwire cars makes you an automotive engineer.
Eric S. Raymond
#27. If we are lucky, they were never retarded enough to create computer viruses and will have no such things as firewalls and security like we have. If they have never experienced a full blown computer failure we'll introduce them to the concept
Thomas Wilson
#28. If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked.
Richard A. Clarke
#29. As new generations [of computers] come out, usually there are increased complexity and features, [that lead to] increased security problems. Plus, other industries have shown that every new generation has its own set of security problems.
Avi Rubin
#30. It's proper Netiquette to view in-App webpages in a mobile browser for better security.
David Chiles
#31. (State Security may not have been full of computer geniuses, but still, I had to be careful).
Wael Ghonim
#32. It is not easy to tear any event out of the context of the universe in which it occurred without detaching from it some factor that influenced it.
Carroll Quigley
#33. My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.
Kevin Mitnick
Famous Authors
Popular Topics
Scroll to Top