Imet Kevin Mitnick for the first time in , during the filming of a Discovery Channel Kevin put me in touch with the agent who books his speeches. She. Kevin Mitnick was the most elusive computer break-in artist in history. I know that many people love Ghost in the Wires, but this book really bothers me. Jim Nitterauer reviews master social engineer Kevin Mitnick’s book, Ghost in the Wires: My Adventures as the World’s Most Wanted.
|Published (Last):||20 September 2006|
|PDF File Size:||2.60 Mb|
|ePub File Size:||16.49 Mb|
|Price:||Free* [*Free Regsitration Required]|
Kevin Mitnick – Wikipedia
His custom metal business cards also serve as lock picking kits. Amazon Music Stream millions of songs. Which is to say, they are technology sufficiently advanced to the point of mystification.
Mitnick’s ego and lingering resentments sometimes get in the way and the story also gets dry and repetitive at points. Fost, Dan May 4, The Art of Deception: SinceMitnick has been a paid security consultant, public speaker and author.
Simon, The Art Of Intrusion: Ghost in the Wires is that sweet spot of books about technology. It’s hard to read about computer crime and not come across Kevin Mitnick.
It would have made a great work of fiction, if only. Just a moment while we sign you in to your Goodreads account. The overreactions—not letting Mitnick have any access to a phone for national security reasons—are a sobering reminder of how easy it is to mislead people who are less informed.
Needless to say, he’s a bit of a computer geek. He is smart, but he is a con-man. In common with the people who wrote negative reviews, I too felt bad for his mother, grandmother, friends, him, and everyone he ever used for his criminal activities.
For him, hacking was more of a “Why did I climb aires mountain? As others have said, it very much reads like a suspense novel at times.
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
The Art of Intrusion: Mitnick calls an administrative office of a corporation, pret Ghost in the Wires: This biography was lava-hot recommended by the one of the co-founders of our tech company when a portion of us me included rebelled against introduction of policies.
I know wirew many people love Ghost in the Wires, but this book really bothers me. Mitnick keeps the structure of the book strictly chronological, with just enough foreshadowing to whet our appetites in anticipation of future events.
United States Department of Justice. This book follows Kevin from the time he was around 8, learning to pick locks. Los Angeles, CaliforniaU.
But that meant as a reader, we got to read the same thing over and over again, with a change to his social engineering calls and the phone numbers he now had access to.
Mitnick has embraced the new definition of Hacker. Finally, it was simply nice to hear Kevin’s voice. Maybe he chooses to call himself a Hacker because he’s trying to appeal to a wider audience wirew wouldn’t know the difference. Mitnick’s criminal activities, arrest, and trial, along with the associated journalism, were all controversial.
Yeah, to a phone phreaker, if I knew one. Does he stop hacking?
Book Review: Ghost in The Wires – Kevin Mitnick
gjost It was interesting how he hacked in to monitor the FBI guys that were monitoring him even subverting there phone systems to field calls coming from other FBI agents.
It’s a nice balance between personal, memoir style content and technical stories. Then he breaks down and Well, I try to think of myself as a smart guy.
He’s arguably the most famous, or at least the most notorious computer “hacker” of his time. Here’s another number, what about now?
Archived from the original on July 23, The subject matter was something I was looking forward to getting into, imagining a book of hacking adventure and in I got to read this book as part of a buddy oevin group where we pick different genres and types of books to get us out of our comfort zone.
Oct 16, Day rated it did not like it Shelves: When they did finally react, it was often to an extreme, which I think is evident in some of the treatment Mr.
I’d argue the story Mitnick has to tell is far more Hollywood ready than that one. He wants to crack the security of a particular ghos, so he “social engineers” his way into getting passcodes, source codes, etc. Mitnixk 22, Elena Johansen rated it did not like it Shelves: Since he had been doing wirds hacking thing for awhile and was very very successful at it he had gained a bit of a reputation.
He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies.
He explains how he acquires the ability to clone cell phone numbers, and how he uses space in dormant accounts on university and company servers to store source code he steals from companies like Sun, Novell, and Motorola.
The story begins with Kevin describing his propensity for being an early childhood escape artist. View all 4 comments.