A.J. McMahon

19%
Flag icon
We just kept hacking back in, night after night, despite their best efforts. In fact, because the staff and users of the system didn’t realize that we had their personal workstations under our control and could intercept their keystrokes, it was easy for us to immediately obtain their new log-in credentials every time they changed them.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Rate this book
Clear rating