George Chetcuti’s Blog

Last Updated on 27 Feb. 2015, Total: 618 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
157 General 3 Feb. 2015
40 Implementation 4 Dec. 2014
23 Monitoring 16 Oct. 2014
210 News 27 Feb. 2015
94 Products 28 Aug. 2014
63 Security 12 Feb. 2015
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Security updates available for Adobe Flash Player

    Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux... Read More

  2. NCP engineering Enhances Windows 10 VPN Clients with Newly Added Security Features

    Version 10 of NCP's VPN Client Suites for Windows and Juniper Feature Optimized Configuration, Easier Software Distribution and Administrator Control... Read More

  3. Q&A with Unitrends CEO Kevin Weiss

    Kevin Weiss is Unitrends new president and chief executive officer (CEO). Weiss talks about his skills and his vision on how to turn Unitrends into a market leader for data protection solutions... Read More

  4. Google’s rendering-based indexing best practices

    Google’s Webmaster Guidelines update for optimal indexing in view of the recently announced change of rendering web pages more like a typical modern browser rather than as a text-only browser... Read More

  5. Unitrends Names Kevin Weiss President and CEO

    Experienced business executive to drive data protection leader’s explosive growth... Read More

  6. Microsoft senses an increasing trend of macro malware

    New threats emerging that include some form of social engineering to convince users to manually enable macros and allow potential malicious code to run... Read More

  7. Dell SecureWorks 2014 Report on Underground Hacker Markets

    The Underground Hacker Markets are booming with counterfeit documents, premiere credit cards, hacker tutorials and 100% satisfaction guarantees... Read More

  8. Email authentication latest threats

    Authentication solves several specific issues related to email, but other problems are completely out of scope. Attackers know this, and have designed some of their attacks accordingly. Perversely, they are actually using authentication to improve the quality of their campaigns... Read More

  9. Season’s Greetings

    In warm appreciation for your viewership during the past year, we extend our very best wishes for a happy holiday season... Read More

  10. January Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

Featured Links