George Chetcuti’s Blog

Last Updated on 16 Sept. 2014, Total: 548 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
173 News 12 Sept. 2014
94 Products 28 Aug. 2014
40 Security 16 Sept. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  2. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  3. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  4. MS Exchange CON 2014 Online Conference

    This online annual live conference is presented by MSExchange.org... Read More

  5. WordPress releases version 4.0 of its blogging platform

    Version 4.0 of WordPress, named “Benny” in honor of jazz clarinetist and bandleader Benny Goodman, is available for download or update in your WordPress dashboard... Read More

  6. Unitrends Introduces Free Backup Capacity and Storage Inventory Reporting Tools

    New tools enable systems admins to identify cost savings by calculating specific backup sizing requirements and eliminating extraneous storage... Read More

  7. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

  8. Panasonic launches new 5“ handheld tablets

    A powerful all-in-one device for mobile workers combining the best of handheld, smartphone and tablet devices... Read More

  9. UK Cyber Security Challenge

    Cyber Security contains a diverse collection of disciplines across a broad spectrum of skills... Read More

  10. September Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

Featured Links