George Chetcuti’s Blog

Last Updated on 17 April 2014, Total: 480 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
149 General 17 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
21 Security 15 April 2014
5 Troubleshooting 2 May 2012
14 Virtualization 6 March 2014
  1. Microsoft’s first ever $100,000 bounty

    Congratulations to James Forshaw for coming up with a new exploitation technique to get Microsoft’s first ever $100,000 bounty... Read More

  2. Migrating Printers in Windows Server 2008

    Moving services from server to another is an extensive job, especially if a resource has a long list of items to move such as, a long list of printers. With Virtualization migrating resources has been simplified in a way, however, some specific tasks remain the same. That is, they don't benefit from available tools at the virtualization layer. When performing... Read More

  3. Military bots to assist Police during the World Cup in Brazil

    PackBot robot system, designed by iRobot was the first remote controlled robot to enter the Fukushima nuclear facility after the East Japan Earthquake and tsunami in March 2011... Read More

  4. Mining for New C&C Domains

    Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates... Read More

  5. Mitt Romney's private Hotmail account hacked!

    Authorities are investigating whether Mitt Romney's private email account was hacked, his presidential campaign stated. It was reported that an unnamed hacker had broken into the Republican private Hotmail account by guessing the answer to a security question about Mr. Romney's favorite pet. Read the full story here - http://www.telegraph.co.uk/news/worldnews/us-election/9312904/Mitt-Romneys-private-email-account-hacked.html... Read More

  6. Mobile DDoS may be coming - Just not now

    Mobile DDoS is possible but not feasible at the moment!... Read More

  7. Mobile phone money transfer app

    A "revolutionary" app enabling people to send and receive money just by using mobile phone numbers is to be made available to consumers across the UK. The Barclays Pingit allows users to send and receive cash to anyone with a UK current account and mobile phone number, without having to share bank details. Read more - http://www.telegraph.co.uk/finance/personalfinance/consumertips/banking/9085826/Barclays-launches-mobile-phone-money-transfer-app.html... Read More

  8. Mobile-connected devices will exceed the world’s population…

    In 2012 there will be more mobile devices than people, according to Cisco. Cisco's Global Mobile Traffic Forecast report shows that there will be more than 10 billion mobile-connected devices by the end of 2012 which would exceed the world's population estimated to reach 7.3 billion at that time! Two-thirds of the world's mobile data traffic will be video while,... Read More

  9. Modular security for scaling network performance and extending to the cloud

    HP Enterprise Security webinar on January 17th - 9AM PT... Read More

  10. Monitoring tools for Large-Scale Networks

    A suite of open source tools for monitoring large-scale networks using flow data... Read More

Featured Links