George Chetcuti’s Blog

Last Updated on 25 Nov. 2014, Total: 576 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
50 Security 25 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Consumers will do anything for Free Wi-Fi

    In a Europol-supported investigation, researchers found consumers recklessly exposing their personal details via public wi-fi and carelessly agreeing to outlandish terms and conditions... Read More

  2. October Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  3. Citrix Acquires Virtual

    According to Citrix advances in App Development and Test Virtualization increase Security, Scalability, Testability and Manageability of Mobile Apps... Read More

  4. Firebrand names latest winner of Free Training for Life

    Firebrand Training is delighted to announce the second winner of the Free Training for Life (FTFL) competition. A prize estimated to be worth over £1 million*... Read More

  5. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  6. Latest release of Whonix

    Whonix Anonymous Operating System Version 9 Released - Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation... Read More

  7. What is PoS malware?

    PoS terminals are among the most vulnerable spots in retailers’ infrastructure for a number of technical reasons... Read More

  8. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  9. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  10. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

Featured Links