George Chetcuti’s Blog

Last Updated on 22 May 2015, Total: 659 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
160 General
41 Implementation
24 Monitoring
237 News
95 Products
71 Security
5 Troubleshooting
16 Virtualization
  1. Convert VMware VMs to Hyper-V VMs with NEW Complimentary 5nine V2V Easy Converter v2.0

    5nine Software, the Windows Server/Hyper-V Management and agentless Security Software provider, has released a NEW, Free 5nine V2V Easy Converter v2.0 with Hyper-V Server 2012 R2 Support... Read More

  2. Unitrends Unveils New Hardware, Cloud and Support Services

    New programs advance Unitrends’ unrivaled TCO with innovative services, flexible purchasing options, upgrades and dedicated support... Read More

  3. PayPal Persistent Mail Encoding Vulnerability

    The Vulnerability Laboratory Research Team discovered an input validation mail encoding vulnerability in the official PayPal Inc (Ebay) MainStreet finance service company website... Read More

  4. 5nine Software presents Hyper-V Security and Management products at the Microsoft Cloud OS Launch Event in Singapore

    5nine Software, the vendor of agentless/host-based security and management products for Windows Server and Hyper-V, will present its products at the Microsoft Cloud OS Launch Event in Singapore on October 17, 2013... Read More

  5. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

  6. Microsoft’s first ever $100,000 bounty

    Congratulations to James Forshaw for coming up with a new exploitation technique to get Microsoft’s first ever $100,000 bounty... Read More

  7. Can we learn from SCADA security incidents?

    Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software... Read More

  8. Unitrends Release 7.2 Packs Simply Scalable Enterprise Data Protection Into an Intuitive and Easy-to-Use Design

    Latest edition of next-generation software powers Unitrends’ Unified Data Protection offering... Read More

  9. Data Management Strategies for MS Exchange Webinar

    Join Michael Osterman of Osterman Research and Dominic Brown of HP Autonomy on October 8, 2013 at 2:00pm EDT / 11:00am PDT as they discuss information governance in an era of increasingly diverse data types. This Webinar will be recorded and the recording shared with all registrants... Read More

  10. Manage Hyper-V Like a Pro with NEW 5nine Manager v3.6

    5nine Software, the vendor-delivering management and agentless/host-based security products for Windows Server and Hyper-V, has released NEW 5nine Manager for Hyper-V v3.6... Read More

Featured Links