Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

A Progress Report on Windows ASN.1 Vulnerability

On February 10, Microsoft disclosed a dangerous vulnerability in all modern versions of Windows, along with a patch to fix it. Nine days may not seem like a long time, but every day that goes by without a real exploit is great news. /zimages/3/28571.gifClick here for Microsofts advisory and links to the patches) At the […]

Source Code Leak Offers Novel Security Test

A frequent pitch of the open-source movement—bordering on a cliche—is that closed-source companies, most famously Microsoft, are wrong in thinking that the unavailability of their source code will enhance the security of the product. The open-source advocates belittle this attitude as “security through obscurity,” and insist that the holes in the products will come out […]

Next-Generation Nachi Worm Offers Political Message

“May you live in interesting times” goes the old curse. Times are interesting indeed in the world of computer security, especially this week. Every day brings another major worm or attack, maybe two, and the outlook looks even worse. The last few days have shown remarkable fertility among computer worms, as new variants of MyDoom […]

National Cyber Alert System Stumbles on Warning

When your team fumbles the opening kickoff its tough to be psyched about the game. Thats what our security team—the new National Cyber Alert System—did last week. You may recall that, with MyDoom.A at its peak, the Department of Homeland Security announced a new security alert system. The system includes four security notification services, including […]

Should You Shut the Computer Down?

If youre the PC guy in the family or some other group, youve probably been asked this question: “At night should I turn my computer off?” Ever since normal people have had computers, this question has made the rounds with a variety of “expert” answers. The early versions presented a trade-off between power consumption and […]

Bug Endures in Microsofts IE Patch

A patch Microsoft Corp. released on Monday for a dangerous Internet Explorer vulnerability that lets attackers trick Internet users into visiting malicious sites doesnt completely fix the problem. The cumulative patch addresses, among other problems, a display bug likely to be used by phishing attacks. If the attacker uses a particular malformed URL syntax, only […]

MyDoom.B Is For Bust

The rapid spread of MyDoom.A was a pretty scary thing to witness. I knew that I had immediately recognized it as a worm when it showed up here, but still its scary when so many people out there get infected. Then MyDoom.B came out and I really got concerned, partly because of its evil practice […]

Waiting For MyDooms Sunday Punch

This Sunday, as American football fans await the Super Bowl broadcast, a slow-motion, digital wave will be building on the Internet, a result of the recent MyDoom worm attack. Following the worms dissection by security analysts, the world knows a distributed denial-of-service attack is coming, but theres little that can be done to stop it. […]

Microsoft to Change IE Behavior to Block Spoofing Attacks

Microsoft Corp. has announced in a support document that it will be releasing a software update to Internet Explorer and Windows Explorer to disable the use of certain syntax in HTTP URLs. The syntax, designed to allow a username and password to be passed to a password-protected page, has a history of abuse. The company […]

MyDooms Denial-of-Service Attack on SCO May Have Begun

According to monitoring systems run by Bath, England-based security consulting firm Netcraft, The SCO Groups Web site had been inaccessible since late Wednesday. SCO said on Tuesday that it had been hit with distributed denial-of-service attack and offered a reward for the arrest and conviction of the worms author. Netcrafts data showed several short-lived outages […]