George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Cyber Terrorists plan new DDoS attacks!

    The cyber terrorists Izz ad-Din al-Qassam plan to attack U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks, as part of their second phase of Ababil operation as they explain it on pastebin: 'Now, we acclaim that the second phase of the Ababil operation is in ahead and from this week according to the announced... Read More

  2. Cyber Underground Economy – from Russia with love

    A Trend Micro Research Paper by Max Goncharov revisits the Russian cybercriminal underground market and reveals new information when compared to a 2012 report titled ‘Russian Underground 101’... Read More

  3. Cyber Warfare - electronic pulse cannon

    Scientists are a step closer to developing a weapon that could change modern warfare with its potential to target cyber terrorists and disable enemy nuclear facilities by blowing up their computer systems. Read more here - http://news.sky.com/story/1019596/cyber-warfare-missile-can-cripple-computers... Read More

  4. Cyber attacks test the limits of existing law

    Ten Rules for Cyber Security by Eneken Tikk outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security... Read More

  5. D-Link issues firmware updates to fix security vulnerability

    Do not leave the Remote Management feature enabled if not in use since this will allow malicious users to use this exploit from the internet... Read More

  6. DDoS Protection as a Service

    Imperva, a leader in data security solutions is offering an amazing cloud-based solution that helps organizations mitigate Distributed Denial of Service (DDoS) attacks. Imperva can guarantee protection against DDoS attacks that are capable of consuming up to 4Gbps of bandwidth (burstable) even though most attacks are in the range of 10Mbps to 200Mbps. The cloud service can scale automatically to... Read More

  7. DDoS attack visualization

    VideoLAN developer Ludovic Fauvet turned a recent DDoS attack on VideoLAN's server into a Logstalgia video that shows an amazing, one-sided fight between thousands of requests, with the web server desperately trying to keep them all at bay... Read More

  8. DH2i DxEnterprise, Container Management Software, Achieves Microsoft Platform Ready Validation

    Demonstrates DxEnterprise Container Management Software Compatibility Across Windows Server and SQL Server Platforms... Read More

  9. DH2i Unveils New Sandbox Lab for the Rapid Proof of Concept (POC) Testing of Container Management Software for Microsoft Windows Applications

    New POC Lab Demonstrates How Enterprises Can Go from Standalone to High Availability (HA) Failover Clusters in Just a Few Minutes... Read More

  10. DNS configuration best practice

    Poorly configured DNS servers are being exploited in denial of service attacks against third-parties. Don't let your organization assets participate in such attacks! The REN-ISAC wants to raise awareness and drive change concerning common network and domain name system (DNS) configurations that fall short of accepted best practice. The REN-ISAC mission is to aid and promote cyber security operational protection... Read More

Featured Links