George Chetcuti’s Blog

Last Updated on 21 March 2015, Total: 631 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
159 General 21 March 2015
40 Implementation 4 Dec. 2014
24 Monitoring 4 March 2015
216 News 13 March 2015
94 Products 28 Aug. 2014
67 Security 18 March 2015
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  2. 1,100 trillion calculations per second supercomputer

    Gaea, Mother Earth supercomputer is being upgraded to a 1,100 trillion calculations per second beast. The climate research supercomputer at Oak Ridge National Laboratory simulates complex climate conditions and performs intensive research. Gaea is a high-performance supercomputer which produces massive heat however, the technology behind its cooling mechanism compensates well for this. Read more - http://www.knoxnews.com/news/2011/dec/29/huge-mother-earth-research-computer-loaded-with/... Read More

  3. 1.32 million Facebook user accounts exposed

    A Facebook flaw has made some 1.32 million user accounts accessible without using a password. A message posted to a hacker news website published a list of links that gives access to user accounts while bypassing password protections! Read more here - http://www.bbc.co.uk/news/technology-20180229... Read More

  4. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  5. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  6. 10 tips for cyber security

    The UK Federation for Small Businesses (FSB) published a report about cyber security best practices focusing on small and micro businesses... Read More

  7. 16 million mobile devices are estimated to be infected by malware

    The “Motive Security Labs H2 2014 Malware Report” examines general trends and statistics for malware infections in devices connected through mobile and fixed networks... Read More

  8. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  9. 2015 State of IT Changes Survey

    How often do you make changes to critical IT systems? Do you have all your changes documented? Share your thought in annual Netwrix State of IT Changes Survey... Read More

  10. 5nine Cloud Monitor for Hyper-V v2.0 – now with Network Security Monitoring

    5nine Software, the only vendor delivering agentless/host-based management and security for Windows Server and Hyper-V has released 5nine Cloud Monitor for Hyper-V v2.0 – now with Network Security Monitoring... Read More

Featured Links