George Chetcuti’s Blog

Last Updated on 22 April 2014, Total: 482 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
149 General 17 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
22 Security 21 April 2014
5 Troubleshooting 2 May 2012
15 Virtualization 22 April 2014
  1. The Betrayal of Wikileaks

    Hacktivists group Anonymous state that they cannot support anymore what Wikileaks has become. Read some tweets exchange between Anonymous and Wikileaks here - https://twitter.com/wikileaks/status/256208465511452672 Read Anonymous Press Release here - http://www.anonpaste.me/anonpaste/index.php?f12864c4aaa27e05#b85melA+HwnJhvVZbw93iqqnrdHJLNEJURQgWJSkAhk=... Read More

  2. Top-secret base revealed on Apple Maps

    'A top-secret base in Taiwan, revealed on Apple Maps. The Navy SEALs' rehearsal site for the Osama bin Laden raid, found on Bing. Once again, commercial satellites have snapped images of things that governments would rather hide from public view. And once again, those governments are finding that there's not much they can do once this sensitive imagery ends up... Read More

  3. Creating an Office 365 Hybrid Deployment without a Lab Server

    Extract taken from September's MSExchange.org newsletter authored by Henrik Walther, MCM: Exchange Okay so there's quite a few of you that would like to test a migration from an on-premise Exchange environment to Office 365 in order to get some hands on experience prior to doing this as an administrator within your enterprise organization or maybe as a partner consultant... Read More

  4. Can we trust the Chinese with our critical data infrastructure?

    The Chinese world leader in fourth generation communication networks, known as 4G, sets its eye on the U.S market. This latest technology is used for high volumes of phone calls, data, and high definition video. Its innovative low cost systems have already captured markets in Africa, Latin America and Europe. Many U.S. congressional leaders and others see this move as... Read More

  5. Set the desired level of IOPS with Amazon RDS

    Amazon's Cloud computing now includes new high performance provisioned IOPS storage for its Relational Database Service. Now, you can provision new RDS database instances with 1,000 to 10,000 IOPS, and with 100GB to 1 TB of storage for MySQL and Oracle databases. If you are using SQL Server, the maximum IOPS you can provision is 7,000 IOPS. The creation of... Read More

  6. The European Cloud Computing Strategy

    The European Commission aims at enabling and facilitating faster adoption of cloud computing throughout all sectors of the economy in order to boost the productivity, growth and jobs in Europe. The strategy includes three key actions which are Standards & Certification, Contract terms & Conditions, and European Cloud Partnership Read more here - http://ec.europa.eu/information_society/activities/cloudcomputing/cloud_strategy/index_en.htm... Read More

  7. There is Too Much Cooling in Data Centers

    According to an assistant professor of computer science at the University of Toronto Scarborough, server environments can easily operate at warmer temperatures thus saving costs on air conditioning without endangering the health and performance of the hardware. Read more here – http://www.tomsitpro.com/articles/datacente-cooling-science_research-UTSC,1-549.html... Read More

  8. A live MSExchange.org Webinar sponsored by KEMP Technologies

    Is your organization's network service up-to-date with the latest configuration best practices for High Availability and Load Balancing? Now is the time make sure, before you have an outage. Learn the latest from a Microsoft Exchange MVP who will help you identify where your High Availability network stands today and avoid future outages. Join J. Peter Bruzzese, Microsoft Certified Trainer... Read More

  9. Dell SecureWorks discovers another APT

    Security experts at Dell SecureWorks has been on the go discovering number of APTs (Advanced Persistent Threats) threatening various sectors such as, energy and military. This is the second cyber espionage activity that Dell's CTU (Counter Threat Unit) has discovered this year. Dell's experts have found that Mirage (latest APT) has C&C (command & control) servers IP addresses originating from... Read More

  10. HTTPS sessions can be hijacked!

    Security researchers discovered that even HTTPS encryption that is used for secure connections throughout the Internet can allow attackers to hijack web browser sessions that support SPDY or TLS compression. SPDY is an open networking protocol used by Google and Twitter. This security weakness can be exploited when web sessions are protected by SSL or TLS and are using one... Read More

Featured Links