George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Drive-by download attacks - a favorite tactic used by many attackers

    According to Microsoft's Tim Rains, drive-by download attacks continue to be a favorite tactic used by many attackers attempting to compromise large numbers of systems around the world. In his MS Security blog, Tim discusses drive-by download attacks and the need to keep all software up-to-date in an effort to mitigate this type of attack. He refers to information from... Read More

  2. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

  3. EU lacks the tech workforce

    Half of Europe's workforce is too tech-challenged to fill all the extra ICT jobs that will be knocking around in the next few years, according to the European Commission (EC). The EC's Digital Agenda crew released its scoreboard of how well the continent is doing. The overall aim of the EC Digital Agenda is to deliver sustainable economic and social... Read More

  4. Earn Amazon’s technical or business accreditation

    The cloud Computing giant Amazon, has introduced new training, accreditation and competencies for its members... Read More

  5. Email authentication latest threats

    Authentication solves several specific issues related to email, but other problems are completely out of scope. Attackers know this, and have designed some of their attacks accordingly. Perversely, they are actually using authentication to improve the quality of their campaigns... Read More

  6. Email should receive the same privacy protection as paper letters

    Microsoft Chief Privacy Officer says, ‘Your email belongs to you, not us’... Read More

  7. Emailing Google+ connections new option

    Following last week Google’s announcement of changes in Gmail, lifehacker.com has published a post on how to disable Gmail's new feature that let Google+ users email you... Read More

  8. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

  9. Encryption improvements for Microsoft Azure guest OS

    The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data... Read More

  10. End of Life for SurfControl Web Filter

    December 31, 2013, is the last day that SurfControl Web Filter will be supported, updated, or maintained... Read More

Featured Links