Michael Horowitz

Michael Horowitz wrote his first computer program in 1973 and has been a computer nerd ever since. He spent 20 years working in an IBM mainframe environment as both an application developer and a DB2 DBA. He then spent a few years working in the Research and Development group of a large Wall Street firm. He has also done technical writing and teaching. He is an independent consultant who has long been focused on Defensive Computing. His personal site is michaelhorowitz.com. This is a weblog of Michael Horowitz. The opinions expressed here are those of Michael Horowitz and may not represent those of Computerworld.

The D-Link DIR860L router -- how secure can it get?

How secure can your router get?

How secure can your router get?

No matter how much tweaking is done, a router can only be made as secure as the firmware (operating system) allows. Routers vary drastically in in their security features, yet the subject never comes up in reviews.

Controlling Chrome plugins: Lessons learned the hard way

Controlling Chrome plugins: Lessons learned the hard way

The inability to stop Flash from running by default on Chrome led to some lessons learned the hard way controlling both plugins and extensions with Google's browser.

Trusting Lenovo

Trusting Lenovo

A look at how Lenovo responded to the publicity surrounding their hidden tracking software on ThinkPad, ThinkCentre and ThinkStation PCs.

Lenovo collects usage data on ThinkPad, ThinkCentre and ThinkStation PCs

Lenovo seems to be testing the boundaries of trust.

Wi-Fi at DEF CON - dealing with the worlds most dangerous network

Wi-Fi can be done securely, even at a hacker conference like DEF CON. Just avoid open networks and Android.

Flash click-to-play on Chrome breaks Ticketmaster

Chrome users can not buy tickets at Ticketmaster if they did the Defensive Computing thing and configure Flash for click-to-play.

Stop the Flash madness - 5 bugs a week

Enough already with the Flash Player. It has generated five bugs a week so far in 2015. Removing it, is not only good Defensive Computing, it also helps everyone else.

A look at the security of Wi-Fi on a plane

On a recent plane trip, I looked into the architecture of the Wi-Fi networks onboard, and couldn't find any security.

Reviewing the Windows Scheduler with TaskSchedulerView from Nir Sofer

TaskSchedulerView, a new program from Nir Sofer, offers a great view into the Windows scheduler database. Take a peek under the hood, you never know what you'll find.

Windows 10 is for suckers

The press likes to focus on shiny new things and the shiny thing of the moment is Windows 10. It's free (if you already have Windows 7 or 8) and has a bunch of new features. Who could resist? Hopefully, you.

Linksys Smart Wi-Fi makes a stupid Guest network

A recent article pointed out that Linksys and Belkin routers are incapable of offering over-the-air encryption (WEP, WPA or WPA2) on their Guest wireless networks. On top of this, their Guest networks use a captive portal, which is...

Load More