Beaches Be Trippin\': Five Texas Coast Spots Worth the Drive

Beaches Be Trippin': Five Texas Coast Spots Worth the Drive

Arts & Culture: Let’s face it, most of us Lone Stars view the Texas coast as a poor man’s Waikiki. Hell, maybe just a poor man’s Panama Beach — only to be used... By Callie Enlow 7/10/2013
Chris Pérez, Selena’s Husband, Faces His Past and Looks Forward, Musically

Chris Pérez, Selena’s Husband, Faces His Past and Looks Forward, Musically

Music: Chris Pérez never saw it coming. “All I ever wanted to do was play guitar,” he told the Current. “I never thought I’d be the subject of an interview... By Enrique Lopetegui 8/28/2013
Best Happy Hour

Best Happy Hour

Best of SA 2013: 4/24/2013
Chris Perez, husband of slain Tejana icon Selena, tells of romance, suffering

Chris Perez, husband of slain Tejana icon Selena, tells of romance, suffering

Arts & Culture: In one of the final chapters of his book To Selena, With Love (out March 6), Selena's widower Chris Perez mentions that Abraham Quintanilla, his former father-in-law, once... By Enrique Lopetegui 3/7/2012
5 Awesome Ways to Survive on Ramen

5 Awesome Ways to Survive on Ramen

College Guide 2013: Nearly every college student has lived off of ramen noodles at one point or another. What a lot of them didn’t know was that the classic just-add-water... By Mary Caithn Scott 8/20/2013

Search hundreds of restaurants in our database.

Search hundreds of clubs in our database.

Follow us on Instagram @sacurrent

Print Email



The $600,000 Joyride: Local hacker and former LulzSec member on why he went to prison

Photo: Courtesy photos, License: N/A

Courtesy photos

Rivera and teacher Beatrice Villarreal in a photo from Rivera’s Somerset High yearbook

Photo: , License: N/A

Rivera’s first-place UIL awards in programming competitions

“Our school basically had two sides to it: the hardcore athletic and the academics. For such a small school, it was really broken down. So the academic guys who competed in academic contests were right up there with the athletes,” Rivera reports. “There was never any of that old, generic athletes-and-jocks-pick-on-the-geeks thing.”

Even so, Rivera wishes he were better at something else. He sort of fell into computers and before he knew it, that’s who he was.

“Personally I dislike the fact that I’m good with computers. It might sound weird, but I wish I was better at something else. But computers was what stuck,” he says.

Takes One to Know One

As Rivera learned more about computers, he became more interested in network security. He came across a book at Borders called Elite Hackers Handbook, a joke book with advice on how to pick your handle and other comical bits. It listed a website on the back, and through talking to people on that site—mostly programmers—he found his way to another site where he met Kyle Browning.

Browning runs a site called which makes a game of breaking into competing teams’ systems. It’s a great way to learn the ins and outs of network security in a safe, legal manner. It’s especially appropriate for computer nerds who gain much of their knowledge not by studying, but by doing.

“The company I currently work for, we consider every one of ourselves to be, you know, hackers. We just figure it out and work through the problem. To me personally that’s what that term has always meant,” says Browning from San Francisco, where he works for a company called Work Habit.

“It’s coming down a little bit, but [‘hacker’] still has that malicious connotation to it, which is a shame.”

As corporate computer networks proliferated in the ’80s and ’90s, efforts to protect them became increasingly important. That’s when the idea of white hats and black hats evolved. The white hats represent, as you might imagine, security professionals who design systems. The black hats are those who would break in.

The saying Rivera always heard as he was being introduced to this world was that every white hat started out as a black hat. And it’s true. Companies like Microsoft and Facebook have hired people who report vulnerabilities created by poorly written code or mis-managed or -aligned systems. Some companies have bounty programs which will pay anyone who reports a weakness. The idea is that it takes a thief to truly understand a thief.

“The best security people understand attacks, understand intrusions, and the best way to understand something is to practice it,” says Veracode CTO Chris Wysopal, a security expert who was a member of the hacker “think tank” the L0pht in the ’90s. “Modern security started in the mid-to-late ’90s around this notion.... The majority are sort of self-taught, outside-of-the-mainstream people and to some degree that’s a big advantage because you’re thinking differently about the systems than the people that built them.”

Recently in News
We welcome user discussion on our site, under the following guidelines:

To comment you must first create a profile and sign-in with a verified DISQUS account or social network ID. Sign up here.

Comments in violation of the rules will be denied, and repeat violators will be banned. Please help police the community by flagging offensive comments for our moderators to review. By posting a comment, you agree to our full terms and conditions. Click here to read terms and conditions.
comments powered by Disqus