George Chetcuti’s Blog

Last Updated on 19 Sept. 2014, Total: 549 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
173 News 12 Sept. 2014
94 Products 28 Aug. 2014
41 Security 19 Sept. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. 1,100 trillion calculations per second supercomputer

    Gaea, Mother Earth supercomputer is being upgraded to a 1,100 trillion calculations per second beast. The climate research supercomputer at Oak Ridge National Laboratory simulates complex climate conditions and performs intensive research. Gaea is a high-performance supercomputer which produces massive heat however, the technology behind its cooling mechanism compensates well for this. Read more - http://www.knoxnews.com/news/2011/dec/29/huge-mother-earth-research-computer-loaded-with/... Read More

  2. 1.32 million Facebook user accounts exposed

    A Facebook flaw has made some 1.32 million user accounts accessible without using a password. A message posted to a hacker news website published a list of links that gives access to user accounts while bypassing password protections! Read more here - http://www.bbc.co.uk/news/technology-20180229... Read More

  3. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  4. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  5. 10 tips for cyber security

    The UK Federation for Small Businesses (FSB) published a report about cyber security best practices focusing on small and micro businesses... Read More

  6. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  7. 5nine Cloud Monitor for Hyper-V v2.0 – now with Network Security Monitoring

    5nine Software, the only vendor delivering agentless/host-based management and security for Windows Server and Hyper-V has released 5nine Cloud Monitor for Hyper-V v2.0 – now with Network Security Monitoring... Read More

  8. 5nine Software Releases its Latest Version of Cloud Security for Microsoft’s Virtualization solutions

    5nine Software, the software solutions provider of agentless/host-based security and management products for Windows Server and Microsoft Hyper-V, has released a beta of its latest version for Cloud Security: 5nine Cloud Security for Hyper-V... Read More

  9. 5nine Software announces Agentless Security support for Windows Server 2012 R2

    Press Release Windows Server 2012 R2 Support... Read More

  10. 5nine Software announces complimentary 5nine Security for Microsoft Hyper-V with built-in Security and Compliance Scanner

    5nine Software, the vendor of management and agentless/host-based security and compliance products for Windows Server and Microsoft Hyper-V, has released a complimentary 5nine Security for Hyper-V with built-in 5nine Security and Compliance Scanner... Read More

Featured Links