George Chetcuti’s Blog

Last Updated on 25 Nov. 2014, Total: 576 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
50 Security 25 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  2. UPnP Forum Invites Organizations to use UPnP+ Certification

    UPnP+ is an evolution of previous UPnP capabilities and provides an improved experience for the consumer and creates new values and opportunities for manufacturers leveraging existing UPnP protocols to take them into the Cloud and bridge IoT... Read More

  3. 5nine Software announces new funding

    5nine Software Announces New Investment Round led by Insight Venture Partners and the founders of Veeam Software... Read More

  4. Unitrends Unveils Boomerang, A Way to Move VMs between VMware and AWS

    New virtual appliance enables businesses of all sizes to cloudburst, protect and migrate virtual machines... Read More

  5. Fix for a 19 year old bug

    The IBM X-Force Research team has identified a significant data manipulation vulnerability that affects every version of Microsoft Windows from Windows 95 onward... Read More

  6. What does a mobile devices manufacturer know about its customers?

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence... Read More

  7. Open and Free Internet – net neutrality

    No blocking, no throttling, no paid prioritization, more transparency. The Internet is perhaps the most open network in history, and we have to keep it that way... Read More

  8. Netwrix Helps MSP’s Strengthen Security and Streamline Compliance for the Entire IT Infrastructure

    Netwrix Announces New MSP Partner Program Enabling Managed Service Provider Customers with Advanced Change and Configuration Auditing Solutions... Read More

  9. Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1... Read More

  10. How Secure is TextSecure?

    Security researchers from the German Gortz Institute for IT Security (Ruhr University Bochum) present the first complete description of TEXTSECURE’s complex cryptographic protocol and a thorough security analysis of TEXTSECURE... Read More

Featured Links