George Chetcuti’s Blog

Last Updated on 27 Feb. 2015, Total: 618 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
157 General 3 Feb. 2015
40 Implementation 4 Dec. 2014
23 Monitoring 16 Oct. 2014
210 News 27 Feb. 2015
94 Products 28 Aug. 2014
63 Security 12 Feb. 2015
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Gemalto presents the findings of its investigations

    Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA)... Read More

  2. Netwrix Freeware Helps to Prevent Inside Job

    Netwrix strengthens security and eliminates privilege abuse with reporting on who has access to what... Read More

  3. Preventing High Cost Security Breaches

    Join Brien Posey, Microsoft MVP, tomorrow, February 25th, at 12N EST | 11am CST | 9am PST | 5pm GMT for a discussion of the increasing trend of data breaches and real-life lessons learned by organizations, including recent examples such as the Anthem breach... Read More

  4. HTTP/2 Approved

    IESG has formally approved the HTTP/2 and HPACK specifications... Read More

  5. ManageEngine Rolls Out Office 365 License Management and Reporting

    ADManager Plus supports bulk edits of Office 365 user licenses, CSV-based bulk reassignments of Office 365 licenses; Exchange Reporter Plus reports on Office 365 mailbox size and inactive Office 365 mailboxes... Read More

  6. Last Chance to Register for the MSExchange.org Webinar: Advanced Exchange Backup and Recovery Strategies

    Despite the rise of other communications channels like social media, email and the messaging system remain the heartbeat of almost every organization today... Read More

  7. 16 million mobile devices are estimated to be infected by malware

    The “Motive Security Labs H2 2014 Malware Report” examines general trends and statistics for malware infections in devices connected through mobile and fixed networks... Read More

  8. 2015 State of IT Changes Survey

    How often do you make changes to critical IT systems? Do you have all your changes documented? Share your thought in annual Netwrix State of IT Changes Survey... Read More

  9. CrowdStrike’s Global Threat Intelligence Report

    In 2014, it became abundantly clear that threat intelligence would provide the decisive advantage when protecting your network... Read More

  10. Netwrix Hits 128% Revenue Growth in 2014

    Milestones during the year included two product releases, major customer wins, and a focus on establishing new partnerships and alliances... Read More

Featured Links