George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Enemies of the Internet!

    Who are the enemies of the Internet? Governments like China, Vietnam and Iran that hold the largest number of cyber-citizens or netizens in jail. The latest countries to join the annual list are Bahrain and Belarus – these governments restrict Internet access, filter content and imprison bloggers. On the other hand, governments that try to introduce mandatory web filtering mechanisms... Read More

  2. EnergyCore Architecture by Calxeda

    Calxeda Inc. has developed a super-efficient server that leverages the ultra-low power technology of the ARM processor architecture. Calxeda servers will consume a fraction of the power and space of today's servers. Calxeda aims to be the first company to take basic ARM technology and adapt it for the demands of the powerful computers that run in data centers and... Read More

  3. Enhanced Touchscreen Technology

    TapSense is a project that enhances touchscreen technology by allowing surfaces to identify the type of object being used for input. Researchers Chris Harrison, Julia Schwarz and Scott E. Hudson, at the Human-Computer Interaction Institute and Heinz College Center for the Future of Work, Carnegie Mellon University have found a means that can identify different parts of the anatomy of... Read More

  4. Enterprise Risk Management Simplified

    SimpleRisk is a free and open source web application, released under Mozilla Public License 2.0, and is extremely useful in performing risk management activities... Read More

  5. Eulogy for TMG – Monthly Newsletter

    This year we celebrated the 15th birthday of Microsoft's proxy/firewall solution that has gone through a couple of name changes to get where it is today. Sadly, on September 12, Microsoft announced that the company is discontinuing TMG, along with FPE, FPSP, FSOCS and TMG Web Protection Services… Microsoft will continue to support the products through 2015, with extended support... Read More

  6. Event Subscription delay

    Events are collected or sent (when subscription configuration is set to normal) every 15 minutes which is quite adequate for normal operations; however, there might be critical periods for some resources that we need to reduce this delay and get critical events faster. As already noted in Setting up an Event Collecting Computer, with the help of the wecutil command-line... Read More

  7. Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1... Read More

  8. Extend your AD to the Cloud

    Amazon AWS Directory Service allows you to connect to an existing on-premises directory... Read More

  9. Extraction of private encryption keys from GnuPG

    GnuPG in its current form is not safe for a multi-user system or for any system that may run untrusted code... Read More

  10. Fake Skype malware app on Android

    Days after Trend Micro, a global leader in antivirus solutions broke the news of a fake Skype malware app for Android devices, Microsoft acknowledges the existence of the malware and releases an alert notification on its Malware Protection Center website. It urges users of Android phones to install security software or download the latest updates for those who already have... Read More

Featured Links