Last Updated on 5 May 2016, Total: 769 Blog Posts
With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.
| 9 | Command-line |
| 168 | General |
| 46 | Implementation |
| 27 | Monitoring |
| 299 | News |
| 99 | Products |
| 99 | Security |
| 5 | Troubleshooting |
| 16 | Virtualization |
The cyber terrorists Izz ad-Din al-Qassam plan to attack U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks, as part of their second phase of Ababil operation as they explain it on pastebin: 'Now, we acclaim that the second phase of the Ababil operation is in ahead and from this week according to the announced... Read More
Scientists are a step closer to developing a weapon that could change modern warfare with its potential to target cyber terrorists and disable enemy nuclear facilities by blowing up their computer systems. Read more here - http://news.sky.com/story/1019596/cyber-warfare-missile-can-cripple-computers... Read More
Imperva, a leader in data security solutions is offering an amazing cloud-based solution that helps organizations mitigate Distributed Denial of Service (DDoS) attacks. Imperva can guarantee protection against DDoS attacks that are capable of consuming up to 4Gbps of bandwidth (burstable) even though most attacks are in the range of 10Mbps to 200Mbps. The cloud service can scale automatically to... Read More
VideoLAN developer Ludovic Fauvet turned a recent DDoS attack on VideoLAN's server into a Logstalgia video that shows an amazing, one-sided fight between thousands of requests, with the web server desperately trying to keep them all at bay... Read More
Poorly configured DNS servers are being exploited in denial of service attacks against third-parties. Don't let your organization assets participate in such attacks! The REN-ISAC wants to raise awareness and drive change concerning common network and domain name system (DNS) configurations that fall short of accepted best practice. The REN-ISAC mission is to aid and promote cyber security operational protection... Read More