Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

Enough with the Browser Toolbars Already

Whenever I go to clean up a friend/relative’s computer that they complain is too slow there’s one thing I almost always find: Numerous browser toolbars, particularly in Internet Explorer. Not all browser toolbars are bad, but the bad ones do seem to get around. There is a long and disturbing history of malicious toolbars for […]

A Plan to Stop Fast Flux Networks Begins to Form

Even with all the mistakes that users make and all the effort put up by criminals, you might wonder how the networks of illicit software stay up. There are lots of people trying to take them down, and often they are capable people, often with authority. The answer is that botnets have defense mechanisms built […]

Both Sides on the Win7 UAC Problem

A controversy erupted last week with the revelation by a researcher that it is possible for a user-mode program in Windows 7 to disable User Access Control in the default configuration. My first reaction to this was that it was bad, but it’s a beta and it will be fixed. Now I’m getting the vibe […]

How Do They Make All That Malware?

I was talking to a head research guy at an anti-virus company recently, and he said that the big anti-virus firms are all getting about 50,000 new malware submissions every day. 50K! How do they, the malware authors, do it? And how is it that the AV companies actually get the malware? Welcome to the […]

Next Problem Up: Reverse User Name Hijackings

Have you ever signed up for an Internet service only to find that your desired user ID was already taken? Happens all the time. In the world of domain names we have the concept of reverse domain name hijacking, in which a company bullies a domain name registrant out of their domain without clear intellectual […]

Obama Team Finds Secure Networks Aren’t Fun

A Washington Post story this morning caught my attention: “Staff Finds White House in the Technological Dark Ages.” It’s not a good sign, but not for the reasons the story implies. Some, perhaps most of the article, details problems that probably happen in every White House transition. Suddenly there are large numbers of new employees […]

Whois Abuse Still Out of Control

[Editor’s note: On Jan. 26, ICANN and Enom finally followed through and resolved the issues described in this column. For details, see this entry in my blog Cheap Hack.] How would you react if you found out that someone was trying to impersonate you in order to defraud and the authorities ignored your complaints about […]

Weak Passwords Make for Weak Networks

It’s an old rule and a common-sense one: Passwords should not be simple, easy-to-guess words. It goes beyond the old TV trick of guessing the person’s birthday. “Dictionary attacks,” in which a list of hundreds or even more words are tested, are common. And yet people still get burned by having weak passwords. Two recent […]

Deceptive Ads on Yahoo Right Media

We’ve all seen ads on the Web that were designed to deceive us: The popup browser window that looks like an error message from Windows, or the box that looks like an e-mail program and says “You have 3 messages waiting.” To begin with, just in case you’re unclear on the matter, yes, these ads […]

Euro-Police Hacking Goes Out of Control

I usually find myself mostly on the side of the police in arguments with civil libertarians with respect to Internet monitoring of criminal activity. Opponents often go over the top, denying any legitimacy to police efforts. But now the European Union and the British Home Office are the ones losing all respect for the other […]