George Chetcuti’s Blog

Last Updated on 23 Oct. 2014, Total: 563 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
38 Implementation 23 Oct. 2014
23 Monitoring 16 Oct. 2014
181 News 20 Oct. 2014
94 Products 28 Aug. 2014
45 Security 10 Oct. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Managing Windows Events

    The wealth of info stored in Windows event logs is astonishing. But most often we miss what we are looking for as the amount of information stored may be overwhelming at times. There are various third-party tools out there that manage and organize event logs in a useful manner; however, I would like to share with you some Event Forwarding... Read More

  2. Many wireless networks in London are still unsecure!

    On his well-equipped bike, James Lyne cycled for 91 miles across central London to discover how many wireless networks he could find with outdated weak encryption or no encryption at all! With help from a GPS, two dynamos, and a computer pimped up with solar panels, thousands of unsecured wireless networks were discovered! Read the full article here - http://www.cybercrimesunit.com/warbiking-in-london/... Read More

  3. March Newsletters Teaser

    Some discussion points from CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  4. May Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  5. May’s Newsletters Teaser

    Salient points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowsSecurity.com monthly newsletters... Read More

  6. Michael Jackson entire catalog…

    Michael Jackson's entire 50,000-track catalog which includes many songs that have never been released may have been compromised in last year's Sony hack! It is reported that hackers were able to download the entire catalog! In fact, Sony admits the breach and stated that all compromised servers have been patched. Sony purchased the catalog back in 2001 for $250 million!... Read More

  7. Microsoft Private Cloud Components

    Learn how to create a Private Cloud using System Center 2012 SP1 and Virtual Machine Manager with Janique Carbone at VirtualizationAdmin.com... Read More

  8. Microsoft SQL Server 2008 R2 Feature Pack

    Download MS SQL Server feature pack and benefit from a collection of additional components that add value to your SQL platform! You can get enhanced reporting capabilities, tools that integrate with Excel and SharePoint, and even policy based management that helps you follow SQL Server best practices. System requirements for these packages may vary according to the specific package, and... Read More

  9. Microsoft Safety Scanner Free Tool

    The Microsoft Safety Scanner is a free tool that can remove viruses, spyware, and other malicious software and runs with your existing antivirus software but it is not a replacement of an antivirus software program that provides ongoing protection. In fact, it expires after 10 days after being downloaded. Download the tool from here - http://blogs.msdn.com/b/robmar/archive/2011/04/14/download-microsoft-safety-scanner.aspx How to troubleshoot an... Read More

  10. Microsoft Security Compliance Manager 2.5

    Microsoft Security Compliance Manager (SCM) is a free tool that enables you to quickly configure and manage your computers, traditional datacenter, and private cloud using Group Policy and Microsoft System Center Configuration Manager. SCM 2 includes sample policies and DCM configuration packs that are tested and fully supported, all set baselines are based on Microsoft Security Guide recommendations and industry... Read More

Featured Links