George Chetcuti’s Blog

Last Updated on 28 Jan. 2015, Total: 603 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
156 General 13 Jan. 2015
40 Implementation 4 Dec. 2014
23 Monitoring 16 Oct. 2014
198 News 28 Jan. 2015
94 Products 28 Aug. 2014
61 Security 22 Jan. 2015
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Security Predictions 2015: New Challenges and Risk Mitigation Drive Changes to IT Security

    Netwrix shares top security trends that will drive information technology in 2015... Read More

  2. What is DNS Hijacking?

    InfoSec Institute security researcher Ali Qamar describes DNS parameters that you can set in order to prevent DNS Hijacking... Read More

  3. December Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  4. Google introduces ‘No CAPTCHA reCAPTCHA’

    reCAPTCHA is a free service to protect your website from spam and abuse... Read More

  5. Intel acquires digital identity manager PasswordBox

    Acquisition Adds Convenient and Secure Digital Identity Solutions for Consumers to Intel Portfolio... Read More

  6. Four Lessons Retailers Should Have Learned from the Target Security Breach

    Netwrix recommends best practices for retailers to maintain security during holiday shopping season... Read More

  7. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  8. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  9. UPnP Forum Invites Organizations to use UPnP+ Certification

    UPnP+ is an evolution of previous UPnP capabilities and provides an improved experience for the consumer and creates new values and opportunities for manufacturers leveraging existing UPnP protocols to take them into the Cloud and bridge IoT... Read More

  10. 5nine Software announces new funding

    5nine Software Announces New Investment Round led by Insight Venture Partners and the founders of Veeam Software... Read More

Featured Links