George Chetcuti’s Blog

Last Updated on 26 May 2015, Total: 661 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
160 General
41 Implementation
24 Monitoring
238 News
95 Products
72 Security
5 Troubleshooting
16 Virtualization
  1. MSExchange.org Webinar: The Hidden Costs of Email Management

    Join J. Peter Bruzzese, Microsoft Certified Trainer and CIO and CoFounder of ClipTraining on Wednesday, March 27, 2013 for a live MSExchange.org webinar, sponsored by Kroll Ontrack. In this complimentary 45 minute Webinar, you will discover:... Read More

  2. Mac OS X & iOS Kernel Module vulnerabilities

    Vulnerability reported at WooYun.org claims that Apple’s operating system IOReportHub has kernel module unitialization vulnerabilities that cause kernel breakdown... Read More

  3. Mac OS X Security Configuration Guides

    The guides are designed to give instructions and recommendations for securing Mac OS X and for maintaining a secure computer... Read More

  4. Magento e-commerce web platform vulnerability

    Store owners and administrators of Magento are urged to take action immediately and apply the patch released to address these flaws... Read More

  5. Major Trends in Cloud Security

    Holger Schulze, Group Founder Information Security Community on LinkedIn presents the outcome of a comprehensive research that shows how your peers are approaching security in the era of cloud infrastructure and gain valuable benchmark data to gauge how your own organization stacks up... Read More

  6. Malicious Software Removal Tool

    Microsoft has released version 4.18 of its Malicious Software Removal Tool... Read More

  7. Malicious Word documents & Associated Phishing campaign

    In this two-part series three security researchers present an analysis of a particular attack that combines spearphishing and exploit attempt... Read More

  8. Malware Compromises 100,000+ WordPress Websites

    Researchers at Sucuri say that the SoakSoak Malware has impacted 100’s of thousands of WordPress specific websites... Read More

  9. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

  10. Manage Hyper-V Like a Pro with NEW 5nine Manager v3.6

    5nine Software, the vendor-delivering management and agentless/host-based security products for Windows Server and Hyper-V, has released NEW 5nine Manager for Hyper-V v3.6... Read More

Featured Links