Michael Horowitz

Michael Horowitz wrote his first computer program in 1973 and has been a computer nerd ever since. He spent 20 years working in an IBM mainframe environment as both an application developer and a DB2 DBA. He then spent a few years working in the Research and Development group of a large Wall Street firm. He has also done technical writing and teaching. He is an independent consultant who has long been focused on Defensive Computing. His personal site is michaelhorowitz.com. This is a weblog of Michael Horowitz. The opinions expressed here are those of Michael Horowitz and may not represent those of Computerworld.

Wi-Fi at DEF CON - dealing with the worlds most dangerous network

Wi-Fi can be done securely, even at a hacker conference like DEF CON. Just avoid open networks and Android.

Flash click-to-play on Chrome breaks Ticketmaster

Chrome users can not buy tickets at Ticketmaster if they did the Defensive Computing thing and configure Flash for click-to-play.

Stop the Flash madness - 5 bugs a week

Enough already with the Flash Player. It has generated five bugs a week so far in 2015. Removing it, is not only good Defensive Computing, it also helps everyone else.

A look at the security of Wi-Fi on a plane

On a recent plane trip, I looked into the architecture of the Wi-Fi networks onboard, and couldn't find any security.

Reviewing the Windows Scheduler with TaskSchedulerView from Nir Sofer

TaskSchedulerView, a new program from Nir Sofer, offers a great view into the Windows scheduler database. Take a peek under the hood, you never know what you'll find.

Windows 10 is for suckers

The press likes to focus on shiny new things and the shiny thing of the moment is Windows 10. It's free (if you already have Windows 7 or 8) and has a bunch of new features. Who could resist? Hopefully, you.

Linksys Smart Wi-Fi makes a stupid Guest network

A recent article pointed out that Linksys and Belkin routers are incapable of offering over-the-air encryption (WEP, WPA or WPA2) on their Guest wireless networks. On top of this, their Guest networks use a captive portal, which is...

The NetUSB router flaw Part 2 - Detection and Mitigation

Without a comprehensive list of routers vulnerable to the NetUSB flaw, the burden falls on us to test our routers. This requires scanning for port 20005 on the LAN side, for sure, and possibly the WAN side too. Here I describe...

What most people don't know about the NetUSB router flaw - Part 1

What most people don't know about the NetUSB router flaw - Part 1

The recent NetUSB flaw in routers was written up by almost every tech news organization, yet, much of the story was untold and some of what was written was flat out wrong. Here, and in my next blog, I hope to correct the record,...

Some perspective on Flash Player bugs

Adobe's Flash Player has had 143 bug fixes in the last year. After 18 years of development, no software should be this flawed. Here are four Defensive Computing approaches to being as safe as possible when running Flash.

Insecure routers hacked yet again

Insecure routers hacked yet again

A new report from Incapsula describes thousands of hacked routers being used in DDoS attacks. The routers could not have been more vulnerable: they were enabled for remote administration with default passwords. The focus of the report...

Load More