George Chetcuti’s Blog

Last Updated on 4 March 2015, Total: 621 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
157 General 3 Feb. 2015
40 Implementation 4 Dec. 2014
24 Monitoring 4 March 2015
212 News 3 March 2015
94 Products 28 Aug. 2014
63 Security 12 Feb. 2015
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Is IE11 paving the way towards a more secure web browsing?

    IE11 makes 39% of Web sites more secure by discouraging the use of vulnerable RC4 based cipher suites and increases security on 16% of Web sites by negotiating TLS 1.2, the most secure version of TLS... Read More

  2. Is Windows Azure feasible?

    The answer to this question is not easy and I reckon that no one should try to answer it for you without having full knowhow and understanding of your present IT infrastructure! Your organization needs to research the Cloud Infrastructure and related costs and finally compare the results against the on-premise setup. The research should include hands-on experience and test... Read More

  3. Is your Helpdesk Solution Social Media Friendly?

    Organizations that provide online support services to their customers, and have so far relied on the traditional helpdesk systems need to go back to the drawing board and redesign their customer support process to include social media functionality. Customers spend long hours on social media and having the ability to interact with your support reps using twitter or Facebook will... Read More

  4. Is your ICS well protected?

    The oil-and-gas sector is one of the most heavily targeted industries for cyber-attacks... Read More

  5. It’s not just about cost savings!

    According to Business Insider, China offers more benefits than just cost-savings and that's why major manufacturers of electronics such as Apple, build devices there! • Most of the components of iPhones and iPads — the supply chain — are now manufactured in China! • China's factories are now far bigger and more nimble than those in the United States. They... Read More

  6. January Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  7. January Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  8. July Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com July monthly newsletters... Read More

  9. July Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  10. June Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

Featured Links