Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

Can You Trust TRUSTe?

TRUSTe is a nonprofit organization set up to help Internet users determine who is worthy of their trust, in commerce or other areas on the Web. The company sells a number of seals that you might see when interacting with Web sites. These seals are meant to show that the site adheres to TRUSTe’s standards […]

The Massive Messaging Machine

I used to cover the CPU business, writing analysis of industry developments. Since the early ’90s, when most of the major RISC architectures began to gel, the main creative task of processor designers has been to inject more parallelization into design. First there was superscalar execution, in which multiple execution units allow more than one […]

The Secret China-U.S. Hacking War

Is the United States under attack again? Recent reports have the U.S. military not quite blaming the Chinese military for a long string of cyber-attacks against U.S. military computers. It sure sounds like they believe it, but they’re not quite saying it. Also left unsaid is how much actual damage and compromise has happened already. […]

Electronic Data as Legal Evidence

Business decisions are already dominated by legal considerations in many fields. This will come as no surprise to you, I’m sure, but things are getting worse, especially for corporate IT. Big legal changes have been happening over the last few years with respect to the use of digital evidence in legal proceedings. Digital evidence is […]

Firewire The Skeleton Keyhole into Your System

Physical security attacks are all the rage these days. Two attacks have been described recently that purport to break the physical security of systems with what was thought to be state of the art protection. The first one, from a couple weeks ago, involves attacking notebook computers in “sleep” mode. Modern operating system such as […]

The Anti-Phishing Consumer Protection Act of 2008

Back when the CAN-SPAM act was passed, there were those who complained about various provisions in it. There have been prosecutions under it, but for the most part it’s been a great legal irrelevancy. This sort of situation is the best we can hope for from Senate bill 2661, “The Anti-Phishing Consumer Protection Act of […]

A Racket’s Brewing in the Code Signing Cert Business

EV-SSL certificates have been available for about a year. The absolute numbers of them are low, but the growth rate looks good on a line graph and it’s not like everyone is supposed to have them. They’re a good thing I think, although they’re less about combating phishing than inspiring confidence in genuine sites. VeriSign […]

Pakistan Drops the BGP Bomb

A recent Newsweek cover story called Pakistan “the most dangerous country in the world.” The writers don’t even know the half of it. A few days ago, YouTube’s service was interrupted for a couple of hours over a political issue in Pakistan. Someone in the government was offended by a video on YouTube. They issued […]

Five-Year Security Review

Where does all the time go? It’s been five years since I began writing these columns. I thought it would be interesting to look back and see how much things have really changed. In my inaugural column, I stated my philosophy that it stunk that people had to waste time and money on computer security, […]

Dare to Trust OpenID

If you run a Web site-let’s say a storefront-that manages user information, you need to authenticate your users. It’s dangerous business, but you have to do it and you have to do it well. Screwing up could ruin your reputation. And yet you’re also part of a big problem for users: the proliferation of IDs. […]