Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

Reforming the DisGrace Period

ICANN GNSO has been studying the problem of Domain Tasting for months now in their usual thorough manner. I wrote about the study several months ago and said I expected no prompt action. They have gotten to the point of issuing an initial report. This report discusses the input received by the GNSO during the […]

NetSol Abuses the Process in Order to Save It

As we reported earlier, Network Solutions has taken the extraordinary step of registering domains as you search for them. The company acknowledged what is obvious to anyone testing the process and states that it is doing it in order to protect users from abuse by third parties. Network Solutions has responded to criticism with some […]

Phishing at the Top Level

The use of domain names in most phishing is relatively crude, You see a lot of names like www.somefreewebsite.com/~ingrid/www.bankofamerica.com/…. There’s no SSL, and the tricky part of the domain name is off to the right. A user would really have to ignore the domain name and focus on the body of the page, which is […]

More Bad Drivers on the Information Superhighway

Its as true of any operating system as it is of Windows, but Windows gets a harder time for it: Bad device drivers make for a bad computing experience. Device drivers are effectively system software. Very often its hard to tell the difference between a device driver problem and a Windows bug, and this is […]

Instability and Modern Anti-Virus Software

I can remember back when anti-virus companies used to test their updates before they sent them out to customers. But then again, I can remember the Johnson administration (Lyndon, not Andrew), so I’m relatively (ahem!) experienced. Anyway, times have changed. The anti-virus business has moved to the Netscape business model of shipping products and letting […]

Your Spammer May Be a Victim, Too

Security vendors like to report spam numbers, including the overall percentage of e-mail that is spam. The consensus on this number is north of 90 percent now. You’ll see some lower numbers, including about 60 percent from Symantec, but that number discounts certain classes of spam. Essentially, the percentage of e-mail that is spam is […]

DNSSEC Is Dead, Stick a Fork in It

The DNS is fragile they say. Not only is it another one of those old Internet protocols that was never designed to handle either the load or the level of attack to which it is subjected today, but the sheer number of DNS servers out there is immense, and many are misconfigured. Imagine then trying […]

How Not to Engender Confidence in Your Customers

I can imagine, back in 2000, a company taking offense at a vulnerability report and having a bad attitude about it. Back then you could forgive people for thinking that exposing such problems will make things worse. Things are different now. There’s only one way to approach such things these days: embrace the idea that […]

Your PC Is Vulnerable Without Browser Protection

Look back at the security news three or four years ago and you’ll see a “worm of the week” phenomenon in action. Malware was spread, and botnets created, through e-mail messages. These e-mail messages had attachments and social engineering that attempted to trick the user into running the attachment. This approach is now comparatively rare, […]

Browser Insecurity Wars Still Rage

I can sympathize with Microsoft’s Jeff Jones. We both like to throw gasoline on a fire now and then. It’s fun to see the flames that ensue. The flames last week came from Mozilla, responding to Jones’ Browser Vulnerability Analysis report. Jones, a “Security Guy” at Microsoft, has made a hobby of monitoring and reporting […]