George Chetcuti’s Blog

Last Updated on 17 April 2014, Total: 480 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
149 General 17 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
21 Security 15 April 2014
5 Troubleshooting 2 May 2012
14 Virtualization 6 March 2014
  1. 9th Network Security Event for Latin America and the Caribbean

    The "9th Network Security Event for Latin America and the Caribbean" will be held in Cancun, Mexico, within the framework of LACNIC's eighteenth annual meeting (LACNIC XXI)... Read More

  2. GetGo Download Manager buffer overflow vulnerability

    Julien Ahrens (aka MrTuxracer) publishes root-cause analysis of GetGo Download Manager http response header buffer overflow remote code execution... Read More

  3. Software architect accused of stealing Microsoft trade secrets

    Ex-Microsoft employee charged with passing blogger trade secrets... Read More

  4. Ukrainian Cyber Golden Eagle Hacktivists warns of more cyber attacks

    Cyber Berkut, Ukrainian’s Cyber Golden Eagle hacktivist group demands NATO officials to get away from Ukrainian land and warns NATO’s Colonel to change his computer password!... Read More

  5. What is Passive DNS?

    Passive DNS or Passive DNS replication is a technique invented by Florian Weimer in 2004 where inter-server DNS messages are captured by sensors and forwarded to a collection point for analysis... Read More

  6. Win Free Training For Life

    Firebrand offers free training for life... Read More

  7. Buffer overflow vulnerability in Wireshark

    Wesley Neelen from Hoffmann Investigations discovered an MPEG file parser buffer overflow in Wireshark... Read More

  8. Free tool that detects Netgear switches

    German IT security firm Curesec releases a set of tools that helps you catalog all Netgear switches on your internal infrastructure... Read More

  9. How do Credit cards data end up for sale on Internet forums?

    There are multiple ways to steal this information on-line, but Point of Sales are the most tempting target of Cybercriminals... Read More

  10. What will Platform-as-a-Service (PaaS) look like in 2014?

    In 2014 PaaS has reached a new level of maturity, in 2013 PaaS was adopted by many organizations... Read More

Featured Links