George Chetcuti’s Blog

Last Updated on 4 May 2015, Total: 648 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
160 General
40 Implementation
24 Monitoring
229 News
95 Products
69 Security
5 Troubleshooting
16 Virtualization
  1. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

  2. Microsoft’s first ever $100,000 bounty

    Congratulations to James Forshaw for coming up with a new exploitation technique to get Microsoft’s first ever $100,000 bounty... Read More

  3. Can we learn from SCADA security incidents?

    Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software... Read More

  4. Unitrends Release 7.2 Packs Simply Scalable Enterprise Data Protection Into an Intuitive and Easy-to-Use Design

    Latest edition of next-generation software powers Unitrends’ Unified Data Protection offering... Read More

  5. Data Management Strategies for MS Exchange Webinar

    Join Michael Osterman of Osterman Research and Dominic Brown of HP Autonomy on October 8, 2013 at 2:00pm EDT / 11:00am PDT as they discuss information governance in an era of increasingly diverse data types. This Webinar will be recorded and the recording shared with all registrants... Read More

  6. Manage Hyper-V Like a Pro with NEW 5nine Manager v3.6

    5nine Software, the vendor-delivering management and agentless/host-based security products for Windows Server and Hyper-V, has released NEW 5nine Manager for Hyper-V v3.6... Read More

  7. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  8. Routers default passwords online database

    RouterPasswords.com provides quick access for technicians to default passwords used on routers, default web logins, CCTV systems and other electronic devices... Read More

  9. API vulnerability in PayPal

    The Vulnerability Laboratory Research Team discovered a filter bypass & persistent web vulnerability in the official PayPal Inc Core Application API... Read More

  10. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

Featured Links