George Chetcuti’s Blog

Last Updated on 1 Sept. 2014, Total: 540 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
169 News 1 Sept. 2014
94 Products 28 Aug. 2014
36 Security 29 Aug. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Malicious Word documents & Associated Phishing campaign

    In this two-part series three security researchers present an analysis of a particular attack that combines spearphishing and exploit attempt... Read More

  2. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

  3. Manage Hyper-V Like a Pro with NEW 5nine Manager v3.6

    5nine Software, the vendor-delivering management and agentless/host-based security products for Windows Server and Hyper-V, has released NEW 5nine Manager for Hyper-V v3.6... Read More

  4. Manage Hyper-V like a Pro with NEW 5nine Manager v3.7

    5nine Software, the vendor delivering management and agentless/host-based security products for Windows Server and Hyper-V, has released a new 5nine Manager for Hyper-V v3.7... Read More

  5. Manage better your virtualized environment

    How many sys admins on a routine basis check whether running VMs are struggling for resources, whether there are VMs that can use fewer resources, and what departments are using which resources... Read More

  6. Managing Distribution Groups in a Hybrid Deployment

    How to manage distribution groups using an Exchange Online user in a hybrid deployment... Read More

  7. Managing Windows Events

    The wealth of info stored in Windows event logs is astonishing. But most often we miss what we are looking for as the amount of information stored may be overwhelming at times. There are various third-party tools out there that manage and organize event logs in a useful manner; however, I would like to share with you some Event Forwarding... Read More

  8. Many wireless networks in London are still unsecure!

    On his well-equipped bike, James Lyne cycled for 91 miles across central London to discover how many wireless networks he could find with outdated weak encryption or no encryption at all! With help from a GPS, two dynamos, and a computer pimped up with solar panels, thousands of unsecured wireless networks were discovered! Read the full article here - http://www.cybercrimesunit.com/warbiking-in-london/... Read More

  9. March Newsletters Teaser

    Some discussion points from CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  10. May Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

Featured Links