George Chetcuti’s Blog

Last Updated on 15 April 2014, Total: 479 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
148 General 3 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
21 Security 15 April 2014
5 Troubleshooting 2 May 2012
14 Virtualization 6 March 2014
  1. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  2. IE 10 Group Policy template for mixed environments

    Administrative Template files are used to populate user interface settings in the Group Policy Object Editor... Read More

  3. Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know - Part 2

    Part 2 of blog post 'Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know'... Read More

  4. Check your DNS Servers configuration!

    More DNS administrators need to understand the security risks implications related to Open DNS Resolvers... Read More

  5. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

  6. Alert Logic key findings about the state of Cloud Security

    The cloud is not inherently less safe. Among the six security incident categories examined, Web application attack was the only threat category more prevalent in cloud hosting provider environments than in enterprise environments... Read More

  7. Cyber attacks test the limits of existing law

    Ten Rules for Cyber Security by Eneken Tikk outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security... Read More

  8. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  9. Earn Amazon’s technical or business accreditation

    The cloud Computing giant Amazon, has introduced new training, accreditation and competencies for its members... Read More

  10. CIA to build a "private cloud" using Amazon Web Services

    Although, the cloud computing giant Amazon is normally associated with public cloud provision, it does offer services related to private clouds such as, virtual private clouds and services that extend an organization’s on-premise private clouds... Read More

Featured Links