Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

Small Appliances Need To Get Bigger

I like perimeter security. It just makes sense to have your best defenses at a point where they can have a whack at everything going in or out of the network. Obviously any large business knows this, but small businesses, which are manically cost-sensitive, often get by with no such barrier, or a false one […]

First 64-Bit Malware for Windows Appears

Symantec Security Response has revealed that it has analyzed the first 64-bit Windows attack code. The attack is a proof of concept with no payload. Named W64.Rugrat.3344 by Symantec, its very old-fashioned in technique. When executed it infects all 64-bit executable files, excluding .DLL files, in the directory from which it was executed, and all […]

Take the Offensive in Slow Times for Worms

I was trolling the antivirus sites recently looking for a hot threat and was overcome by the dominance of old, endemic ones that have dropped to “low” status. Sasser aside, its been a while since there was a worm threat out there worth worrying about—and far longer since we had a mail worm that made […]

Why Was Intel a No-Show on No Execute?

A big part of the brain surgery Microsoft is performing on Windows XP Service Pack 2 is support for new “NX” features in x86 processors. These features allow software (the Windows OS in this case) to mark certain areas of program memory as non-executable. Since a large number of remote attacks—Blaster and Sasser, for example—rely […]

SPF Group, Microsoft Work to Converge Anti-Spam Efforts

The author of the Sender Policy Framework (SPF) specification has announced a proposal to converge the specification with aspects of Microsoft Corp.s Caller-ID spec. Microsoft is expected to follow up with its own announcement soon. SPF and Caller-ID are two of the more prominent efforts to introduce authentication to the SMTP protocol, filling in holes […]

Symantec Buys Brightmail, and the Pieces Fit Perfectly

You couldnt call Symantecs purchase of Brightmail a big surprise. The two companies are corporate cousins. Theyre so related they must go to each others houses for Thanksgiving. Brightmail Inc.s president and CEO, Enrique Salem, is a former head of the security business unit at Symantec Corp. A bio on Brad Kingsbury, vice president of […]

Anti-virus—The Old-Fashioned Way Is Still Best

Many people have told me that the conventional approach to anti-virus protection is a hoax, or at least suboptimal. The answer, obvious to some people, is that protection should be generic to attack techniques, not specific to particular attacks. Its a great dream to have, and theres little arguing against it. We all know that […]

DoS Vulnerability Threatens Wireless Networks

AusCERT, Australias national computer emergency response team, released an advisory Thursday identifying a vulnerability in the 802.11 wireless specification that could open wireless networks to denial-of-service attacks. The advisory targets a new cause for concern among wireless network administrators. Until now, concerns about Wi-Fi security have focused on weak encryption and lack of authentication in […]

Do Pirates Deserve a Windows Update?

Microsofts policy for the upcoming Service Pack 2 for Windows XP with respect to pirated copies of the operating system stirred a minor controversy in the media recently. A report elsewhere had claimed that Microsoft would be allowing even users of pirated copies to install the update. A tad incredulous, we called to check and […]

Multiple Vulnerabilities Found in Symantec Client Products

Symantec has acknowledged several serious bugs in several of its client security products in both corporate and consumer editions. The problems, reported to Symantec Corp. by eEye Digital Security, involve several functions of the products but one specific file, SYMDNS.SYS. Symantec has provided a brief description, stating that fixes for all of the problems are […]