Quotations

Famous Quotations

Sometimes it is difficult to be motivated and inspired to write a review, a persuasive formless essay, an article of reflexive investigation, etc. Plus, it can be difficult to find the right words that will better describe your ideas. DedicatedWriters.com is your top destination, since it provides students with an updated database of more than 150.000 quotations and proverbs of famous inventors, sportsmen, philosophers, artists, celebrities, businessmen, and the authors who certainly enriched and strengthen the world. This is perfect to become inspired and write book reports, essays, movie reviews, research papers, etc.

Try out our free search option and stay tuned.

Browse Authors

(Click a letter to view the authors)
A B C D E F G H I J
K
L M N O P Q R S T U V W X Y Z

Ken Dunham Quotes

«In August, 2004, we predicted we'd see exponential growth, and that's exactly what we saw.»
Author: Ken Dunham
«If someone starts capitalizing on the crossover worm, and we start to see increased activity, then we can talk about a global threat. It's a little premature at this time.»
Author: Ken Dunham
«This is a social engineering worm written in Russian. It is interesting when you look at it. This is a Java-based type of threat and it has been proven to be successful. We need to look at this and see what is going to be the threat down the road.»
Author: Ken Dunham
«They're bloodsucking mosquitoes. You just can't get them all.»
Author: Ken Dunham
«This is not something I would expect to yield very high profits for criminals as compared to other types of financial fraud and extortion that might take place. Many people have backups of their files, and now the code has been cracked.»
Author: Ken Dunham
«The number one thing the majority of the malicious code we're seeing now does is disable or delete anti-virus and other security software. In a lot of cases, once the user clicks on that attachment, it's already too late.»
Author: Ken Dunham
«This is one of those big, under-the-radar threats that we've been concerned about. There has been a trend away from big-bang attacks to very targeted and sophisticated attacks that take place right under your nose. This is one of them.»
Author: Ken Dunham
«It actually appears to be a pretty good design.»
Author: Ken Dunham
«It's such a small population. Other assets are available to attack.»
Author: Ken Dunham
«There's no such thing as [malicious] software melting hard drives.»
Author: Ken Dunham

Pages: « Previous 1 2 3