Larry Seltzer

About

Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

Are We Ready for the Windows Server Worm?

When the great Windows worms of the early part of this decade hit, they cut a huge swath through the Windows world. Slammer, probably the most fascinating of them, did so within minutes of its release. Blaster may have been the most damaging. And all of them were patched some time before attacks were launched, […]

Google Can’t Search Its Own Documents

Companies will pull the most outrageous crap imaginable when responding to legal requests. It may be hard to prove they lied, but they will obstruct. Consider Google in a recent case. The case was a suit between Sprint Nextel and some of its affiliates over the Sprint-Clearwire WiMax venture. Google was one of the investors […]

Whitelisting Getting Ready for the Big Leagues

I’ve been bombarded with pitches and inquiries about whitelisting ever since I discussed the issue with Microsoft’s Mark Russinovich. Russinovich, you will remember, thinks that current approaches to security are unsustainable and that the way out, the paradigm shift that takes the advantage back to IT from malicious actors, is whitelisting. I was sympathetic, but […]

What Makes a Critical Vulnerability Critical?

Today’s Patch Tuesday bulletins announced 11 vulnerabilities: four critical, six important, and one moderate. What do these terms mean? You see severity ratings most of the time you see a vulnerability disclosure, but there are no hard standards for severity ratings. In fact some vendors-most infamously Apple-don’t provide any severity ratings for their vulnerabilities. Not […]

The Risks In Wildcard Certificates

The imperative to use SSL, for web authentication and encryption or VPNs, is reasonably universal. Competition has driven prices of certificates down over the years to the point where you can get conventional SSL certificates from reputable vendors for well under $100 per year. Another product gaining popularity due to competition is the wildcard certificate. […]

Challenging the Immutable Laws Of Security

One of the great, classic articles of computer security comes from Microsoft in an era when security was not their strong suit. The article “10 Immutable Laws of Security” by Scott Culp relates rules which ring as true today as they did in 2000 when the article was written-or do they? Now Jesper M. Johansson, […]

Passports: Another Bad Use of Self-Signed Certificates

I’m surprised it took this long: Hackers have released the specs and tools to clone and modify the RFID chips in U.S. passports. Two years ago when the plan to issue them was first widely discussed, I asked what purpose they served and pointed out obvious problems with them. As far as I can tell, […]

Enterprise Security and the Importance of Data Protection

With the regulatory compliance imperative beating down on companies everywhere, I get a lot of pitches for products with the broad goal of protecting data from unauthorized access. There are many different approaches to this in the industry, and some of them are harder to implement than others. My impression, and there’s some common sense […]

Comcast’s Net-Neutral Future

It has been weeks since Comcast announced that it would be moving its “capacity management” from a protocol-oriented scheme to one based on aggregate use of bandwidth. The protocol/application approach was found by the FCC to violate rules of network neutrality. Comcast is appealing the ruling just to protect their rights and I think they […]

Mark Russinovich on the Future of Security

Windows IT people everywhere owe thanks to Dr. Mark Russinovich, now a technical fellow at Microsoft and his less-famous partner Bryce Cogswell. Russinovich is famous both as an author, making the technical details of Windows accessible to the rest of us who dare to think we are technical, and as a programmer, writing utilities that […]