George Chetcuti’s Blog

Last Updated on 15 April 2014, Total: 479 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
148 General 3 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
21 Security 15 April 2014
5 Troubleshooting 2 May 2012
14 Virtualization 6 March 2014
  1. New Payments Module in Zoho Creator

    Last month Zoho Corp. has released a Payment Module for its online Creator platform. Zoho Creator is an intuitive and feature-rich online platform that allows non-programmers to build custom database applications. Customers can build online applications based on business rules within minutes. With the Payments Module users can now build a wide range of online order forms and accept payments... Read More

  2. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  3. No botnet required for low-tech theft

    Pay attention where you leave your security blueprints as these may end up stolen at some train station! Actually, this has happened to a French defence contractor who was carrying blueprints of a drone aircraft being developed jointly by France and United Kingdom. No informatics strategies or high-tech tools were used in this incident! Read the full story here -... Read More

  4. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

  5. October Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  6. Office 356 Beta Program

    There are two business options in the beta program for Microsoft's Office 365 – the Small Business and the Enterprise. The Small Business is designed for up to 25 employees with monthly subscriptions when the final release is launched. It has the essential email, calendar and website services. It is considered as a business solution that needs no dedicated IT... Read More

  7. Office 365 Multi-Factor Authentication

    Multi-factor authentication increases the security of user logins for cloud services above and beyond just a password... Read More

  8. Office Compatibility Pack

    The so many happy users of Microsoft Office XP, 2003 and older versions are unable to work with documents, workbooks and presentations created by the newer versions of Word, Excel and PowerPoint in their native format. More and more users are going for the latest versions of Microsoft Office and Microsoft's revenue statistics confirm this as Office is the most... Read More

  9. Office Mobile 2010 for Windows Mobile

    The Office Mobile application suite includes Microsoft Office Word Mobile, Excel Mobile, and Microsoft Office PowerPoint® Mobile for Windows Mobile 6.5 powered devices, helping users manage and review documents. Microsoft Office Mobile includes support for rich reviewing and minor editing capabilities as well as support for rights-managed documents. Download the files appropriate for you from here - http://www.microsoft.com/en-us/download/details.aspx?id=29981... Read More

  10. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

Featured Links