George Chetcuti’s Blog

Last Updated on 29 July 2014, Total: 527 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
20 Monitoring 19 May 2014
161 News 24 July 2014
93 Products 29 July 2014
34 Security 25 July 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Microsoft Security Compliance Manager 2.5

    Microsoft Security Compliance Manager (SCM) is a free tool that enables you to quickly configure and manage your computers, traditional datacenter, and private cloud using Group Policy and Microsoft System Center Configuration Manager. SCM 2 includes sample policies and DCM configuration packs that are tested and fully supported, all set baselines are based on Microsoft Security Guide recommendations and industry... Read More

  2. Oracle releases patch for vulnerabilities in Java 7

    Oracle has issued an out-of-cycle patch for vulnerabilities in Java 7 that have been widely exploited to spread malware. This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A and Vulnerability Note VU#636312) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications... Read More

  3. An overview of security articles in EU legislation

    A whitepaper published by the European network and Information Security Agency (ENISA) gives an overview of the legal aspects of cyber security in the European Union (EU). Although, the majority of data breaches do normally make it to the press but there are many breaches which remain either undetected or not reported. EU considers effective legislation is key here and... Read More

  4. Free SDL Threat Modeling Tool

    Threat modeling can help organizations minimize the potential cost and need to rework code while in development or in post-production support. To help make threat modeling a little easier, Microsoft offers a free SDL Threat Modeling Tool that enables non-security subject matter experts to create and analyze threat models by communicating about the security design of their systems, analyzing those... Read More

  5. MS Script Explorer for Windows PowerShell RC

    Microsoft Script Explorer for Windows PowerShell (Release Candidate) helps scripters find Windows PowerShell scripts, snippets, modules, and how-to guidance in online repositories such as the TechNet Script Center Repository, PoshCode, local or network file systems and Bing Search Repository. Read more and download the setup file from here - http://www.microsoft.com/en-us/download/details.aspx?id=29101... Read More

  6. Amazon’s AWS re:Invent event

    Attend Amazon's AWS re: Invent this November, the No.1 event for the AWS Cloud community. It is the event of the cloud computing developers, hottest start-ups, and visionary technology leaders. The event includes topics that will make you a Cloud expert in: monitoring cloud resources, optimizing performance, managing security, and cutting costs. Plus you can meet with Amazon's AWS engineers... Read More

  7. Drive-by download attacks - a favorite tactic used by many attackers

    According to Microsoft's Tim Rains, drive-by download attacks continue to be a favorite tactic used by many attackers attempting to compromise large numbers of systems around the world. In his MS Security blog, Tim discusses drive-by download attacks and the need to keep all software up-to-date in an effort to mitigate this type of attack. He refers to information from... Read More

  8. Amazon has fixed a problem that helped hackers gain control over Honan's online accounts

    Following the devastating cyber-attack on Mat Honan's digital life, Amazon changes its policy and fixes the security hole by no longer allowing people to call Amazon and change account settings like credit cards and e-mail addresses. Previously, Amazon's phone policy essentially allowed hackers to use social engineering tricks on support representatives to learn sensitive information about targets like Honan. Read... Read More

  9. Sharing Responsibilities in Cloud Environments

    Cloud Computing elements such as, guest operating systems, physical platforms and others are easily associated with one party (provider or customer) being responsible for both management and security but what about responsibilities when elements overlap boundaries between the provider and the customer? Cloud Computing has brought about new challenges and most importantly, a distributed control environment. Although, some argue that... Read More

  10. Microsoft Visual Studio 2012 virtual launch event

    Microsoft will be launching its Visual Studio 2012 this September at a virtual event – exactly on September 12, 2012 at 9:30 am PDT. Learn about the new features and experience how it integrates best practices that accelerate development and deployment. The keynote speakers of the virtual launch event are S. Somasegar and Jason Zander - Corporate VPs, and Brian... Read More

Featured Links