Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
Have you ever received an e-mail from someone, or maybe from an automated agent or mail administrator of a site informing you that you had sent them an infected message? Theres a good chance you didnt actually send the infected message. Gateway anti-virus software often has the capability, when it detects an infected message coming […]
There are a couple of conflicting truisms of computing: Always apply the latest updates and security fixes; and if it aint broke, dont fix it. The difference is clear when you consider the overhaul of your operating system that will come with Windows 2000 Service Pack 4.Of course, we all have to take some risks […]
Cast a slightly more skeptical eye this weekend at the Web, as an underground group has scheduled a volume Web site defacement contestfor Sunday, July 6. You hear about this sort of attack every now and then, when juveniles put obscene phrases on a company site for political purposes or simple chest-beating. The opening page […]
Lets say youre a really small operation. Youve got one server and you want to connect it the Internet. Obviously youre going to need a firewall. Do you need a whole separate system for it? While many people will say that you should pull out an old 486 box and run IPTables for Linux on […]
Many years ago in the course of testing antivirus software for PC Magazine, one of the vendors I spoke to said that their long-term radar indicated that conventional antivirus pattern scanning techniques were headed for a technological wall. The number of viruses that the product searched for was projected to grow by a third in […]
If you ever read security vulnerabilities you eventually run into a notation looking like “CVE-2002-0947.” This is a standard naming convention for vulnerabilities called Common Vulnerabilities and Exposures (CVE). CVE is administered by a company called Mitre, a non-profit company that operates governmental research facilities and other such cool things. In addition to hosting the […]
Microsoft may have a bad reputation in some circles, but theyre George Washington compared with the average mass-spammer. So filing suit in the United States and United Kingdom against 15 major spammers solves two problems. Its hard not to feel good about this action, although Im sure some will find ways to construct criticism of […]
Somethings not quite as it seems with Microsofts acquisition last week of the intellectual property of GeCAD Software, a Romanian antivirus supplier. In one sense, the reasons are obvious: As the press release announcing the purchase makes clear, Microsoft is on a mission, pursuant to the Trusted Computing initiative, to provide a more secure computing […]
It all began in late 2001 with a plan from Microsoft and a few other companies to limit details of vulnerabilities, especially with respect to exploit information. Normal people, as opposed to those in the security business, are usually appalled to hear that many researchers include details of how to exploit new vulnerabilities, including handy […]
Discuss this column in our forum. Bit-heads such as myself tend to get hung up around the cool techie aspects of security, like data encryption and authentication systems. But many of the most important information theft attacks are based, at least in part, on the breakdown of the more human elements of security. Could I […]