Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

Microsoft Corrects: No XP SP2 for Pirated Copies

Despite reports indicating that Microsoft Corp. was planning to allow users with pirated copies of Windows XP to install Service Pack 2, the company has confirmed to eWEEK.com that this will not be the case. “Recent press reports indicating Windows XP Service Pack 2 will install on pirated or illegal copies of Windows XP are […]

Microsoft Issues Single New Security Alert for May

Microsofts security alerts for May were posted this afternoon. And the list was refreshingly short. The single new vulnerability revealed does allow for remote code execution by an attacker, but with many limitations on the attack, leading Microsoft to classify the problem as “important.” The problem is in the Windows Help and Support Center in […]

Was the Windows Source Leak a Bust?

Tuesday is Microsofts monthly patch day, and Im going to make a prediction: more of the same. Were going to see holes in Internet Explorer and Windows discovered by security research firms, who will get themselves quoted and otherwise mentioned all over the news because they discovered the problems and reported them to Microsoft. One […]

Could a Worm on Mac or Linux Ever Get Traction?

Will we ever see something like the Sasser worm for the Macintosh or Linux? Its an interesting question, and not just for academic reasons. Undoubtedly, many people who choose these platforms do so because they think it immunizes them from the sorts of attacks Windows users must deal with. This past week saw the announcement […]

SMTP Authentication Hits Standards Track

SMTP authentication is coming. But in what form? There is a broad consensus among experts that SMTP authentication, by which Internet mail servers will be able to confirm that messages sent to them come from the domains from which they purport to come, will help to fight spam. Nobody thinks its the cure for spam, […]

Sasser Worm Spreads Automatically Through Windows Hole

A new worm has been detected by the virus research community that spreads through the LSASS vulnerability in various versions of Windows. Researchers and security companies are alarmed and have assigned an elevated threat level to the worm—named Sasser.A—even though it has not yet spread far. Unlike the Gaobot variant found several days ago that […]

How Should Researchers Handle Exploit Code?

Nobody really knows where worm authors go shopping for exploits to develop, but its widely assumed that they are greatly assisted by exploit code released by legitimate researchers. Go look at most vulnerability reports, and youll see references to where exploit code may be obtained. Why would a “legitimate” researcher do such a thing? If […]

Microsoft Confirms Bug in SSL Patch

Microsoft Corp. has confirmed in a knowledge base article that its patch for a critical bug can cause some Windows 2000 systems to lock up and fail at boot time. The patch is for a particularly critical vulnerability of which experts have begun to see exploits in the last few days. The knowledge base article […]

Exploit Circulating for Windows LSASS Vulnerability

An exploit has begun circulating for another of the vulnerabilities in Windows revealed by Microsoft Corp. earlier this month. The vulnerability, a buffer overrun in the Local Security Authority Subsystem Service (LSASS), was patched as part of a large, cumulative update coded MS04-011. The exploit takes the form of a new variant of the Gaobot […]

How Long Is Too Long to Develop a Patch?

A disturbing pattern is emerging from the last couple of months worth of Microsoft security patches: Some of the critical vulnerabilities fixed had been reported to the company quite some time before, 200 days before the patch in one case. I spoke with Firas Raouf, chief operating officer of eEye Digital Security, a vulnerability management […]