Authors: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

If I needed to know about a security exploit, I preferred to get the information by accessing the companies' security teams' files, rather than poring over lines of code to find it on my own. It's just more efficient.

Kevin Mitnick