Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

ICANN Sticks Up for Trademark Holders

Did you ever wonder what happens to those domains, like [BigCompanyname]sucks.com, that some guy registers to criticize BigCompany? Turns out theres a procedure for these things. Ive given ICANN (the Internet Corporation for Assigned Names and Numbers) a hard time in the past, but there are certainly positive aspects to its Uniform Domain-Name Dispute-Resolution Policy. […]

The State of New York vs. The Adware Mob

The main job of all state Attorneys General is to grandstand as part of a campaign for the Governorship, and Elliot Spitzer of New York is the king of this technique. There have been many cases where, IMHO, he has gone way overboard. But give credit where credit is due. Its about time someone with […]

That Phishy Smell Is Coming from Yahoo

Whos the phishiest hosting service on the Internet? According to Netcraft, an Internet security research and consulting firm, its Inktomi, part of Yahoo. That last link is a dynamic page, but Ive been following it a little while, and it hasnt changed much. Most of the other players are a United Nations subcommittee of countries […]

The Sad State of Spyware

Theres reason to be optimistic about many security problems, but others are less encouraging. One of the worst is the problem of spyware and adware, which, in the year since the FTC held a workshop on it, has metastasized badly. As detailed by spyware hunter Eric L. Howes, use of misleading and illegal techniques has […]

Worm Early Warning System Late to the Game

In some ways, network worms are the scariest of Internet attacks. The idea that your computer can be attacked while just sitting around minding its own business is rightly considered a greater threat than one that requires the user to perform some affirmative action. There have been a few major worm attacks over the last […]

New Firefox, Mozilla Versions Plug Critical Security Holes

The Mozilla Foundation has released new versions of the Firefox browser and Mozilla suite of programs to address several security vulnerabilities. As previously reported, the updates—Firefox 1.0.3 and Mozilla 1.7.7—patch a known JavaScript Engine flaw. The vulnerabilities addressed by the new versions include three critical bugs in Firefox, two of which are also present in […]

The Lame Blame of ActiveX

For the thousandth time I have just seen a mainstream media tech writer tell users that “ActiveX controls [are] the prime conduit hackers use to subvert computers” and that users can make their browsing safer by disabling ActiveX. Old myths die hard! Theres no doubt that Internet Explorer has more than its fair share of […]

Shutting Down the Highway to Internet Hell

Do you run a mail server on your home Internet account? If you do, its probably without your knowledge, such as in a mail worm or a zombie spambot. Few if any people running these programs intend to do so, and its time for ISPs to close the door through which they operate. I think […]

Tales of a Professional Social Engineer

Jim Stickley robs banks, government offices and other allegedly secure locations. And he does it the unorthodox way. Stickley doesnt go in like Edward G. Robinson with a Tommy gun. He gets you to like him and trust him and leave him alone while he steals your confidential information and other assets that you should […]

ICANN Digs into Panix.com Domain Theft—but Not Too Deep

In my continuing series on domain name theft I have observed the problem shift as the technology and standards have shifted. The problem used to be sloppy registrar practices. We still have that, although some registrars have gotten better. However, new domain name transfer rules issued by ICANN last year have greased the wheels for […]