George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Data Backup Policies & Procedures

    There's more to Data Backups than a software solution! Although, some major solutions are so well designed that you can form procedures around them! However, Data Backup Policies and some specific procedures still need to be created for your environment and aligned with other processes. Then, you can use the backup solution according to the set policies and procedures. To... Read More

  2. Data Breaches in Europe

    Reported Breaches of Compromised Personal Records in Europe, 2005‐2014... Read More

  3. Data Collector Sets

    Most Systems Administrators have used Performance Monitor to view real-time performance data on Windows servers and identify bottlenecks. Some may have also recorded sessions and later analyzed log files for performance issues. In fact, this is what I will be talking about in the couple of posts to come, mainly about Data Collector Sets. Data Collector sets gather system information,... Read More

  4. Data Management Strategies for MS Exchange Webinar

    Join Michael Osterman of Osterman Research and Dominic Brown of HP Autonomy on October 8, 2013 at 2:00pm EDT / 11:00am PDT as they discuss information governance in an era of increasingly diverse data types. This Webinar will be recorded and the recording shared with all registrants... Read More

  5. December Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  6. December Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  7. December Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  8. Dell SecureWorks 2014 Report on Underground Hacker Markets

    The Underground Hacker Markets are booming with counterfeit documents, premiere credit cards, hacker tutorials and 100% satisfaction guarantees... Read More

  9. Dell SecureWorks discovers another APT

    Security experts at Dell SecureWorks has been on the go discovering number of APTs (Advanced Persistent Threats) threatening various sectors such as, energy and military. This is the second cyber espionage activity that Dell's CTU (Counter Threat Unit) has discovered this year. Dell's experts have found that Mirage (latest APT) has C&C (command & control) servers IP addresses originating from... Read More

  10. Dell creates security vulnerability unintentionally

    Dell ships laptops with rogue root CA, exactly like what happened with Lenovo and Superfish... Read More

Featured Links