George Chetcuti’s Blog

Last Updated on 17 April 2015, Total: 641 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
160 General 13 April 2015
40 Implementation 4 Dec. 2014
24 Monitoring 4 March 2015
224 News 17 April 2015
94 Products 28 Aug. 2014
68 Security 1 April 2015
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Unitrends Unveils New Hardware, Cloud and Support Services

    New programs advance Unitrends’ unrivaled TCO with innovative services, flexible purchasing options, upgrades and dedicated support... Read More

  2. PayPal Persistent Mail Encoding Vulnerability

    The Vulnerability Laboratory Research Team discovered an input validation mail encoding vulnerability in the official PayPal Inc (Ebay) MainStreet finance service company website... Read More

  3. 5nine Software presents Hyper-V Security and Management products at the Microsoft Cloud OS Launch Event in Singapore

    5nine Software, the vendor of agentless/host-based security and management products for Windows Server and Hyper-V, will present its products at the Microsoft Cloud OS Launch Event in Singapore on October 17, 2013... Read More

  4. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

  5. Microsoft’s first ever $100,000 bounty

    Congratulations to James Forshaw for coming up with a new exploitation technique to get Microsoft’s first ever $100,000 bounty... Read More

  6. Can we learn from SCADA security incidents?

    Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software... Read More

  7. Unitrends Release 7.2 Packs Simply Scalable Enterprise Data Protection Into an Intuitive and Easy-to-Use Design

    Latest edition of next-generation software powers Unitrends’ Unified Data Protection offering... Read More

  8. Data Management Strategies for MS Exchange Webinar

    Join Michael Osterman of Osterman Research and Dominic Brown of HP Autonomy on October 8, 2013 at 2:00pm EDT / 11:00am PDT as they discuss information governance in an era of increasingly diverse data types. This Webinar will be recorded and the recording shared with all registrants... Read More

  9. Manage Hyper-V Like a Pro with NEW 5nine Manager v3.6

    5nine Software, the vendor-delivering management and agentless/host-based security products for Windows Server and Hyper-V, has released NEW 5nine Manager for Hyper-V v3.6... Read More

  10. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

Featured Links