Michael Horowitz

Michael Horowitz wrote his first computer program in 1973 and has been a computer nerd ever since. He spent 20 years working in an IBM mainframe environment as both an application developer and a DB2 DBA. He then spent a few years working in the Research and Development group of a large Wall Street firm. He has also done technical writing and teaching. He is an independent consultant who has long been focused on Defensive Computing. His personal site is michaelhorowitz.com. This is a weblog of Michael Horowitz. The opinions expressed here are those of Michael Horowitz and may not represent those of Computerworld.

Patching Windows XP against WannaCry ransomware

Patching Windows XP against WannaCry ransomware

Microsoft issued a bug fix yesterday for Windows XP to patch the SMB flaw used by the current WannaCry ransomware. This is a walk-through of installing the patch.

Third party antivirus programs interfere with Windows Defender critical patch

Third party antivirus programs interfere with Windows Defender critical patch

To install the latest Windows Defender update, I had to fight it out with Avast antivirus. It took a few rounds, but in the end, I won.

7 mistakes Google made updating my Google Wifi router

7 mistakes Google made updating my Google Wifi router

Google Wifi mesh routers may be great on speed and range, but the automated software update process leaves something to be desired.

Asus router warnings on privacy and security

Before buying an Asus router, it would be wise to read Daniel Aleksandersen's review of the stock Asus firmware, especially the privacy issues regarding the included Trend Micro software.

Bookmarking some IP addresses now provides easy DNS debugging later

Bookmarking some IP addresses now provides easy DNS debugging later

DNS is a world-wide system that translates the name of computers on the Internet into their underlying IP address. A problem with DNS can make an otherwise functional Internet connection appear to be broken. It's easy to test an...

How seven mesh routers deal with Wi-Fi Protected Setup (WPS)

How seven mesh routers deal with Wi-Fi Protected Setup (WPS)

Wi-Fi protected setups are a security nightmare in routers. Here are seven new mesh router systems (Eero, Google Wifi, Netgear Orbi, Linksys Velop, Plume, Luma, Ubiquiti AmpliFi) and how they support WPS.

An introduction to six types of VPN software

Anyone interested in a VPN to protect their privacy from their Internet Service Provider needs to be aware of the six types of available VPN software.

How to test your home network for a Telnet vulnerability

How to test your home network for a Telnet vulnerability

Is anything on your network vulnerable to PDoS from Brickerbot?

VPNs on a Chromebook: a scorecard of VPN providers

VPNs on a Chromebook: a scorecard of VPN providers

Interested in using a VPN on a Chromebook? Here is a scorecard of VPN providers that do and do not support Chrome OS.

Triple your privacy with a Chromebook and two VPNs

Triple your privacy with a Chromebook and two VPNs

In response to privacy invasions by internet service providers, a Chromebook and two VPNs should offer great security, privacy and anonymity.

Ubiquiti called out for security flaw

SEC Consult reported a flaw four months ago. Still no fix.

Defensive Computing for email attachments

Defensive Computing for email attachments

Email attachments are the modern Trojan Horse and need to be treated as such.

Computers in the news -- how much can we trust what we read?

Computers in the news -- how much can we trust what we read?

A big part of Defensive Computing is knowing who to trust. Oftentimes, when reporting on technical computer issues, the media does not deserve that trust.

A hard learned lesson in VPNs and secure websites

A hard learned lesson in VPNs and secure websites

My personal information was potentially exposed while using a credit card online. A secondary website, invoked to provide extra identity validation, was triggered by using a VPN. Unlike the primary payment processor, this secondary...

Defensive Computing and the Academy Awards

Sunday nights screw-up naming the Best Picture at the Oscars offers a lesson in defensive thinking, if not exactly in Defensive Computing.

How to immediately update Flash in Chrome

Chrome can take a while to update its embedded copy of the Adobe Flash Player. On days like today, when Adobe released a new copy of Flash, this can leave you vulnerable. A simple procedure forces the update.

President Bannon Chrome Extension is a security problem, not a joke

President Bannon Chrome Extension is a security problem, not a joke

Pretending that Steve Bannon is really the President was funny when Saturday Night Live did it on their opening bit. Then today, Business Insider wrote about a Google Chrome extension that replaces every mention of "Trump" with "Steve...

Spyware on a Chromebook

Two more cases of Chrome extensions that have way too much latitude.

The Netgear router flaw post mortem -- plenty of blame to go around

In the recent Netgear router flaw, its easy to blame Netgear for ignoring the initial report of the vulnerability. They have since admitted that it fell through the cracks. But there appears to be plenty of blame to go around.

Updates and more on the Netgear router vulnerability

On December 9, 2016 we first learned of a command injection vulnerability in some Netgear routers. In the worst case, simply viewing a malicious web page could result in your router being hacked. What follows is a recap and expansion...

Load More