George Chetcuti’s Blog

Last Updated on 21 Nov. 2014, Total: 575 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
49 Security 14 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Power Grids threatened by Cyber Attacks

    According to reports by McAfee, one in four of the world's power companies had suffered extortion from criminals who had gained access to their system's utilities. Two weeks ago a German power utility admits that it suffered a DDoS attack that blocked the company's Internet communications for several hours. This is the first confirmed Cyber-attack against a European grid operator... Read More

  2. Windows Live Mesh will be retired on February 13

    After February 13, users of Windows Live Mesh would not be able to perform remote desktop and peer-to-peer activities. "Mesh synced storage" or "SkyDrive synced storage," will no longer be available through Mesh or devices.live.com, but copies of files on the local computer will remain unaffected. Microsoft recommends users to save all their cloud-based files to their local computers. However,... Read More

  3. “Smart defense” approach

    Here are some rules of thumb for Strategic Cyber Warning that were extracted form a paper prepared by the Smarter Alliance Initiative which is a partnership between the Atlantic Council and IBM. The key points are: Strategic disruptive effects are incredibly difficult, far harder than are usually thought. No known attacks have been both widespread and persistent enough to have... Read More

  4. Cyber Terrorists plan new DDoS attacks!

    The cyber terrorists Izz ad-Din al-Qassam plan to attack U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks, as part of their second phase of Ababil operation as they explain it on pastebin: 'Now, we acclaim that the second phase of the Ababil operation is in ahead and from this week according to the announced... Read More

  5. Cyber Security in the UK!

    According to Nick Hopkinson, the former head of GCHG and CESG, UK is lagging behind the US, Germany and France in its ability to respond to cyber-attacks. This is due to a "lack of cohesion" between the various organizations set up to work towards the national cyber security strategy. But according to UK's Cabinet Office one year after the Strategy... Read More

  6. Latest TMG and UAG tech feeds

    Microsoft Forefront UAG - Configuring Forefront UAG as a DirectAccess Server (Part 2) In this article the author explains how to configure Forefront UAG as a DirectAccess Server. Comprehensive Overview of Web and Server Publishing Rules in TMG 2010 (Part 10) In this article we take a look at the details of the Server Publishing Rule we created and find... Read More

  7. Last chance to sign up to the Spear Phishing: The Cost of Damages and How to Create the ROI Case for Bolstering your Defenses webinar!

    Spear phishing has quickly evolved into one of the dangerous forms of spam. Phishing emails, designed to steal passwords, banking info, and other sensitive information, have become very common and very costly. Many IT and Security professionals know they need to bolster their defenses but are having trouble justifying new investments internally with a good ROI case. Join Michael Osterman... Read More

  8. Cyber Warfare - electronic pulse cannon

    Scientists are a step closer to developing a weapon that could change modern warfare with its potential to target cyber terrorists and disable enemy nuclear facilities by blowing up their computer systems. Read more here - http://news.sky.com/story/1019596/cyber-warfare-missile-can-cripple-computers... Read More

  9. Outages by various cloud providers have been more common than security breaches

    Although, we continuously talk about security or the lack of it, the main threat to Cloud computing are power outages according to a Gartner analyst! Outages by various cloud providers have been more common than security breaches, Gartner says, but few businesses are prepared for them. Companies can suffer data losses during power outages which as we have seen in... Read More

  10. Greenpeace's Guide to Greener Electronics

    This 18th edition of Greenpeace's Guide to Greener Electronics evaluates leading consumer electronics companies based on their commitment and progress in three environmental criteria: Energy and Climate, Greener Products, and Sustainable Operations. The Guide scores companies on overall policies and practices – not on specific products – to provide consumers with a snapshot of the sustainability of the biggest names... Read More

Featured Links