Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

Spreading the Secret Source Code Sauce

Microsoft has, for many years, licensed the source code for Windows to a variety of partners, large customers, educational institutions and others. But until now, the company would rather have incurred large fines, legal bills and distractions than make the code available to competitors. Microsoft execs must have thought that making the code available would […]

Microsoft Takes Another Anti-Rootkit Step

I remember sometime around 1996 or 1997 I was in a meeting with Bill Gates talking about the future of Windows. I dont recall the exact context, but he said that he thought eventually they would have to require device drivers to be digitally signed. They must take “eventually” seriously at Microsoft, even when the […]

The Moon and the Spam Filter

I have a degree in public policy. After I graduated, I preferred a programming job to grad school in my field, but I did take some political science lessons with me into my actual career. One of my favorite books from public policy was “The Moon and the Ghetto” by Richard R. Nelson. Basically, it […]

Some Rootkits Are Worse Than Others

When you first learn about rootkits its easy to see the sinister applications of them, and theyre pretty scary. A really well-written rootkit, if you can deliver it to the system, can be very difficult to detect while the software is running. Fortunately, the very best rootkits exist only in theory (Or do they? How […]

Wow, Microsoft Sure Patched That One Quickly!

This time two weeks ago, the security community was panicking over the potential damage caused by the WMF vulnerability. You can argue, as I did, that the mitigating factors were strong and it wasnt as serious an issue as some argued, but clearly the watershed event in getting past it was Microsofts prompt release of […]

Security Community in Dispute over Severity of WMF Flaw

Inspired somewhat by the Department of Homeland Security Threat Advisory Level (or was it the other way around?), Symantec maintains a global threat level called ThreatCon, defined as “a measurement of the global threat exposure, delivered as part of Symantec DeepSight Threat Management System.” On Tuesday, Symantec elevated ThreatCon to a level 3 (out of […]

How Serious Is the WMF Vulnerability?

Depending on where you look, most people are either running in circles hysterically or ho-humming the Windows WMF vulnerability. It does have some of the earmarks of a nasty situation. For one thing, if youre running Windows—any version—youre vulnerable. Even the 1990 version of Windows 3.0 is vulnerable! While you were out partying this weekend […]

Workaround, Protections Emerge for WMF Exploit

Anti-virus and intrusion protection firms are reacting quickly to a new zero-day exploit for Windows, and a workaround has been devised by an independent researcher. According to AV-Test, an anti-virus research firm, numerous anti-virus firms were detecting some of the four exploits for the vulnerability that they had at that point. AntiVir, Avast!, BitDefender, Ewido, […]

Anti-Virus Protection for WMF Flaw Still Inconsistent

Days after the revelation of a flaw in Windows handling of WMF graphics files, dozens of exploits are being spread from thousands of adware sites. But good protection is available. At the same time, further testing confirms that a workaround issued by third parties and endorsed by Microsoft Corp. is effective in most regards, and […]

Another WMF (Windows Major Foul-Up)

Microsoft really has improved the security of its code over the last few years. The fact that every now and then a bug like the new WMF bug still comes along just goes to show how careless the old code is. The problem with the WMF (Windows Metafile) file format turns out to be one […]