George Chetcuti’s Blog

Last Updated on 22 April 2014, Total: 482 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
149 General 17 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
22 Security 21 April 2014
5 Troubleshooting 2 May 2012
15 Virtualization 22 April 2014
  1. Office Mobile 2010 for Windows Mobile

    The Office Mobile application suite includes Microsoft Office Word Mobile, Excel Mobile, and Microsoft Office PowerPoint® Mobile for Windows Mobile 6.5 powered devices, helping users manage and review documents. Microsoft Office Mobile includes support for rich reviewing and minor editing capabilities as well as support for rights-managed documents. Download the files appropriate for you from here - http://www.microsoft.com/en-us/download/details.aspx?id=29981... Read More

  2. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  3. Open-source network scanner

    ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet... Read More

  4. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  5. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  6. Oracle releases patch for vulnerabilities in Java 7

    Oracle has issued an out-of-cycle patch for vulnerabilities in Java 7 that have been widely exploited to spread malware. This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A and Vulnerability Note VU#636312) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications... Read More

  7. Outage Analyzer

    Track Web Service Outages in Real Time... Read More

  8. Outages by various cloud providers have been more common than security breaches

    Although, we continuously talk about security or the lack of it, the main threat to Cloud computing are power outages according to a Gartner analyst! Outages by various cloud providers have been more common than security breaches, Gartner says, but few businesses are prepared for them. Companies can suffer data losses during power outages which as we have seen in... Read More

  9. PCI Publishes PCI DSS and PA-DSS Version 3.0

    On November 07, 2013 the PCI Security Standards Council (PCI SSC), an open, global forum for the development of payment card security standards, published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS)... Read More

  10. PassiveDNS Tool

    PassiveDNS sniffs traffic from an interface or reads a pcap-file and outputs the DNS-server answers to a log file... Read More

Featured Links