Compelling, Funny, Fascinating
Yes. Though the technical details can be a bit overwhelming sometimes, he always ties in why it's pertinent to know them.
As a banker we are forced to become familiar with various social engineering techniques because of people like Kevin Mitnick. It was amazing to hear how these tactics have worked, and reminded me to keep on my toes a bit.
Ray Porter - his inflections and reading are spot on. He makes it seem as though this is his memoir. He's been good in others and so-so in some but this was perfect material for him. Enjoyable listen. Parts of this could have been insanely boring but the authors and narrator did a good job conveying the technical details with out putting you to sleep.
Not really a book but as others have noted, this is the geek version of Catch Me If You Can.
The author (Mitnick) is arrogant, yes. That's his personality and what enabled him to pull off most of what he did so there's no way to take that out of the book. And a bit whiny. But looking past that, it's quite fascinating what he was able to talk people into and what info he could talk them out of.
Yes, very interesting story of telephone and computer hacking. Enough technical details to keep it interesting without overload. Plenty of his personal life and problems.
On the human side, it is the story of smart but spoiled immature kid who becomes a spoiled immature adult.
This was the best book that I heard in 2013. It had the excitement of any thriller and it was the story of a real person told by the one who lived it. The Narrator Ray porter did an excelent job of brining it to life. I felt like I was there with him on the run as he tried to out think all the agents that came after him.
The book was painfully unabridged! Every number, letter, acronym, and phone number were included. It got pretty tedious!
I would. It was still interesting to learn about social engineering.
Yes, but the way the narrator drew out the profanity was tiresome and off putting.
Possibly. Someone narcissistic should play Kevin. Narcissistic and fat, anyway.
Have not read but could't imagine it being much different
The honest and open frankness of the author
One of the easiest of the US presenters I have listened to as a listener from outside the US (Australia)
As a non hacker I just found it of great general interest but with an inherent message that computer security is very suspect.
Amazing story - well told and well read! You don't have to agree to or like it, but the adventure is sure as hell fun!
Well written, well read, entertaining, not too technical, not too long. Author pulls few punches with those who deserve it, being hit. I have never before been remotely interested in the hacker culture, but this was totally engrossing.
Honestly, I didn't even know who Kevin Micklick was.
Lots of adventure here.
exciting unbelievable insane
One man who was able to stay ahead of the entire FBI
When Kevin goes on the run
How he was able to stay one step ahead of everyone.
The bad: Mitnick's ego and lingering resentments sometimes get in the way and the story also gets dry and repetitive at points.
The good: Mitnick's story is legendary, and while I get the feeling he isn't always 100% honest, this is probably the closest we'll ever get to the true story without embellishments and ridiculous rumors. As Mitnick points out several times in his own story, his escapades are remarkable enough without the crazy rumors that grew around his legend over the years.
As a hacker and penetration tester myself, it is refreshing to read a story where second or third-hand accounts of hacking don't result in eye-rolling ridiculousness during the technical parts. I had known bits and pieces of Mitnick's story, but it was interesting to find out that most of his greatest successes were due, at least in part, to his natural skill as a social engineer. The result is a book that is not only entertaining and historic, but highly instructional also. As he states, the approaches he uses to get access to systems works nearly as well today as it did in the day of his exploits.