Authors: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

My hacking involved pretty much exploring computer systems and obtaining access to the source code of telecommunication systems and computer operating systems, because my goal was to learn all I can about security vulnerabilities within these systems.

Kevin Mitnick