Beaches Be Trippin\': Five Texas Coast Spots Worth the Drive

Beaches Be Trippin': Five Texas Coast Spots Worth the Drive

Arts & Culture: Let’s face it, most of us Lone Stars view the Texas coast as a poor man’s Waikiki. Hell, maybe just a poor man’s Panama Beach — only to be used... By Callie Enlow 7/10/2013
What to Know Before You Go On A Cleanse

What to Know Before You Go On A Cleanse

Food & Drink: It’s been a year since I’ve taken up this gig of eating and drinking across San Antonio. Since then, no fewer than seven juice shops have opened in the area... By Jessica Elizarraras 8/20/2014
Brendan Gleeson Carries Pitch-black ‘Calvary,’ Weighed Down by the Rest

Brendan Gleeson Carries Pitch-black ‘Calvary,’ Weighed Down by the Rest

Screens: Father James (Brendan Gleeson) sits in a confessional, waiting. An unseen man enters the box and says, “The first time I tasted semen, I was seven... By David Riedel 8/20/2014
15 Types of Commonly Encountered College Students

15 Types of Commonly Encountered College Students

College Issue 2014: Usually a freshman, this student tries to absorb everything the teacher says and immediately after class rushes to... By Alex Deleon 8/18/2014
SA’s Gritty PuroSlam is Feared, Respected in National Slam Poetry Scene

SA’s Gritty PuroSlam is Feared, Respected in National Slam Poetry Scene

Arts & Culture: See, there is this place where people participate in a ritual derived from the verbal tradition of telling and retelling stories to a room of bodies... By Melanie Robinson 8/20/2014

Search hundreds of restaurants in our database.

Search hundreds of clubs in our database.

Follow us on Instagram @sacurrent

Print Email



The $600,000 Joyride: Local hacker and former LulzSec member on why he went to prison

Photo: Courtesy photos, License: N/A

Courtesy photos

Rivera and teacher Beatrice Villarreal in a photo from Rivera’s Somerset High yearbook

Photo: , License: N/A

Rivera’s first-place UIL awards in programming competitions

“Our school basically had two sides to it: the hardcore athletic and the academics. For such a small school, it was really broken down. So the academic guys who competed in academic contests were right up there with the athletes,” Rivera reports. “There was never any of that old, generic athletes-and-jocks-pick-on-the-geeks thing.”

Even so, Rivera wishes he were better at something else. He sort of fell into computers and before he knew it, that’s who he was.

“Personally I dislike the fact that I’m good with computers. It might sound weird, but I wish I was better at something else. But computers was what stuck,” he says.

Takes One to Know One

As Rivera learned more about computers, he became more interested in network security. He came across a book at Borders called Elite Hackers Handbook, a joke book with advice on how to pick your handle and other comical bits. It listed a website on the back, and through talking to people on that site—mostly programmers—he found his way to another site where he met Kyle Browning.

Browning runs a site called which makes a game of breaking into competing teams’ systems. It’s a great way to learn the ins and outs of network security in a safe, legal manner. It’s especially appropriate for computer nerds who gain much of their knowledge not by studying, but by doing.

“The company I currently work for, we consider every one of ourselves to be, you know, hackers. We just figure it out and work through the problem. To me personally that’s what that term has always meant,” says Browning from San Francisco, where he works for a company called Work Habit.

“It’s coming down a little bit, but [‘hacker’] still has that malicious connotation to it, which is a shame.”

As corporate computer networks proliferated in the ’80s and ’90s, efforts to protect them became increasingly important. That’s when the idea of white hats and black hats evolved. The white hats represent, as you might imagine, security professionals who design systems. The black hats are those who would break in.

The saying Rivera always heard as he was being introduced to this world was that every white hat started out as a black hat. And it’s true. Companies like Microsoft and Facebook have hired people who report vulnerabilities created by poorly written code or mis-managed or -aligned systems. Some companies have bounty programs which will pay anyone who reports a weakness. The idea is that it takes a thief to truly understand a thief.

“The best security people understand attacks, understand intrusions, and the best way to understand something is to practice it,” says Veracode CTO Chris Wysopal, a security expert who was a member of the hacker “think tank” the L0pht in the ’90s. “Modern security started in the mid-to-late ’90s around this notion.... The majority are sort of self-taught, outside-of-the-mainstream people and to some degree that’s a big advantage because you’re thinking differently about the systems than the people that built them.”

Recently in News
We welcome user discussion on our site, under the following guidelines:

To comment you must first create a profile and sign-in with a verified DISQUS account or social network ID. Sign up here.

Comments in violation of the rules will be denied, and repeat violators will be banned. Please help police the community by flagging offensive comments for our moderators to review. By posting a comment, you agree to our full terms and conditions. Click here to read terms and conditions.
comments powered by Disqus