George Chetcuti’s Blog

Last Updated on 25 Nov. 2014, Total: 576 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
50 Security 25 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. 10 tips for cyber security

    The UK Federation for Small Businesses (FSB) published a report about cyber security best practices focusing on small and micro businesses... Read More

  2. Call for papers about Botnets

    Botconf’13 – Call for papers... Read More

  3. Is your ICS well protected?

    The oil-and-gas sector is one of the most heavily targeted industries for cyber-attacks... Read More

  4. Skype is reading everything you write

    According to the German security firm Heise Security, Microsoft monitors users’ instant messages and SMSs on Skype... Read More

  5. Microsoft Security Updates for May 2013

    May’s Patch Tuesday from Microsoft contain two critical security updates linked to vulnerabilities in Internet Explorer... Read More

  6. ITIL framework online resource

    The service desk is a single point of contact (SPOC) for end users who need assistance/help... Read More

  7. The world’s largest library

    ‘The Internet has often been called the world’s largest library with all the books on the floor’... Read More

  8. SSID Sniffer tool

    A tool called iSniff GPS is able to capture packets broadcasted by iPhones, iPads and other mobile devices as they connect to Wi-Fi networks and then queries the retrieved network names on wigle.net to determine possible locations... Read More

  9. DNS configuration best practice

    Poorly configured DNS servers are being exploited in denial of service attacks against third-parties. Don't let your organization assets participate in such attacks! The REN-ISAC wants to raise awareness and drive change concerning common network and domain name system (DNS) configurations that fall short of accepted best practice. The REN-ISAC mission is to aid and promote cyber security operational protection... Read More

  10. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

Featured Links