George Chetcuti’s Blog

Last Updated on 19 Dec. 2014, Total: 589 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
154 General 27 Nov. 2014
40 Implementation 4 Dec. 2014
23 Monitoring 16 Oct. 2014
192 News 19 Dec. 2014
94 Products 28 Aug. 2014
56 Security 16 Dec. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Microsoft Security Updates for May 2013

    May’s Patch Tuesday from Microsoft contain two critical security updates linked to vulnerabilities in Internet Explorer... Read More

  2. ITIL framework online resource

    The service desk is a single point of contact (SPOC) for end users who need assistance/help... Read More

  3. The world’s largest library

    ‘The Internet has often been called the world’s largest library with all the books on the floor’... Read More

  4. SSID Sniffer tool

    A tool called iSniff GPS is able to capture packets broadcasted by iPhones, iPads and other mobile devices as they connect to Wi-Fi networks and then queries the retrieved network names on wigle.net to determine possible locations... Read More

  5. DNS configuration best practice

    Poorly configured DNS servers are being exploited in denial of service attacks against third-parties. Don't let your organization assets participate in such attacks! The REN-ISAC wants to raise awareness and drive change concerning common network and domain name system (DNS) configurations that fall short of accepted best practice. The REN-ISAC mission is to aid and promote cyber security operational protection... Read More

  6. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

  7. Check your DNS Servers configuration!

    More DNS administrators need to understand the security risks implications related to Open DNS Resolvers... Read More

  8. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

  9. DDoS attack visualization

    VideoLAN developer Ludovic Fauvet turned a recent DDoS attack on VideoLAN's server into a Logstalgia video that shows an amazing, one-sided fight between thousands of requests, with the web server desperately trying to keep them all at bay... Read More

  10. May’s Newsletters Teaser

    Salient points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowsSecurity.com monthly newsletters... Read More

Featured Links