George Chetcuti’s Blog

Last Updated on 24 April 2015, Total: 645 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
160 General
40 Implementation
24 Monitoring
226 News
95 Products
69 Security
5 Troubleshooting
16 Virtualization
  1. URL Abuse online testing tool

    The service is an online web service where any user can submit a link. You will need javascript enabled to access the page and the content is delivered when available via AJAX... Read More

  2. Interoute Virtual Data Centre expands its on-demand security services

    Interoute becomes Check Point’s first Partner platform to deliver its market-leading virtual security gateways in the cloud... Read More

  3. Tracking the FREAK Attack

    Make sure you have the most recent version of your browser installed, and check for updates frequently. Updates that fix the FREAK attack should be available for all major browsers soon... Read More

  4. March Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  5. ITC Secure Networking launch NetSure360° Orama

    New Mobile App Set to Become the CIO’s Best Friend... Read More

  6. Monitor Your DNS for Hijacking

    Dnstest is a free tool that helps you monitor your DNS for Hijacking... Read More

  7. The KEMP Free LoadMaster

    Free LoadMaster is a new free product from KEMP Technologies... Read More

  8. Health Information at Serious Risk of Abuse

    Timothy Libert, a doctoral student at the University of Pennsylvania, demonstrates that data on online health information seeking is being collected by entities not subject to regulation oversight... Read More

  9. Gemalto presents the findings of its investigations

    Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA)... Read More

  10. Netwrix Freeware Helps to Prevent Inside Job

    Netwrix strengthens security and eliminates privilege abuse with reporting on who has access to what... Read More

Featured Links