George Chetcuti’s Blog

Last Updated on 22 April 2014, Total: 482 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
149 General 17 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
22 Security 21 April 2014
5 Troubleshooting 2 May 2012
15 Virtualization 22 April 2014
  1. Hardening Early Boot Components against Malware in Windows 8

    Windows 8, both client and server editions will provide additional security capabilities against malware. Specifically, Microsoft provides guidelines for anti-malware and other security solution developers to develop security solutions to protect early boot components from malware. For instance, the Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started... Read More

  2. Windows ADK for Windows 8 Release Preview

    Download Windows Assessment and Deployment Kit (ADK) for Windows 8 Release Preview, and start some hands-on training how to best deploy a future roll-out of Windows 8 to end users' workstations. The Windows Assessment and Deployment Kit is a collection of tools that you can use to customize, assess, and deploy Windows operating systems to new computers. Windows Deployment is... Read More

  3. A Turing Machine built using LEGO

    To show everyone how simple a computer actually is and to honor Alan Turing, Jeroen van den Bos and Davy Landman built a simple LEGO Turing Machine. Their goal was to make every operation as visible as possible while using just a single LEGO MINDSTORMS NXT set. Read more here - http://www.legoturingmachine.org/... Read More

  4. The First Trillion Objects stored in Amazon S3

    Late last week the number of objects stored in Amazon S3 reached one trillion (1,000,000,000,000 or 1012). That's 142 objects for every person on Planet Earth or 3.3 objects for every star in our Galaxy. If you could count one object per second it would take you 31,710 years to count them all. Read more here - http://aws.typepad.com/aws/2012/06/amazon-s3-the-first-trillion-objects.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+AmazonWebServicesBlog+%28Amazon+Web+Services+Blog%29... Read More

  5. EU lacks the tech workforce

    Half of Europe's workforce is too tech-challenged to fill all the extra ICT jobs that will be knocking around in the next few years, according to the European Commission (EC). The EC's Digital Agenda crew released its scoreboard of how well the continent is doing. The overall aim of the EC Digital Agenda is to deliver sustainable economic and social... Read More

  6. System Update Readiness Tool for Windows 7and Windows Server 2008 R2

    Check out this free tool provided by Microsoft which was released to fix an inconsistency in the Windows servicing store which may prevent the successful installation of future updates, service packs, and software. This tool checks your computer for such inconsistencies and tries to resolve issues if found. This tool is for Windows Vista, Windows Server 2008, Windows Server 2008... Read More

  7. Track Privileged Identities!

    If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More

  8. Security Professionals Nightmare

    Although, the virus Flame is no longer spreading and most of its command-and control servers discovered, it remains what security professionals have been terrified of - mimicking Microsoft's Windows update mechanism and spreading through it. Mikko Hypponen, chief research officer at F-Secure states that 'Having a Microsoft code signing certificate is the Holy Grail of malware writers. This has now... Read More

  9. Try Visual Studio 2012 RC

    Visual Studio 2012 Release Candidate (RC) supports the new Windows 8 and Azure platforms with new tools that make HTML 5 and CSS 3 development more productive and higher quality end results. The development tool includes Windows Azure project templates and a whole slew of features for Windows 8 Metro and desktop applications. Download the Visual Studio 2012 Release Candidate... Read More

  10. Disk Space Monitoring Tool

    How many times you get a support call that a resource is performing very low and after you perform your tests, you find out that this resource is out of disk space!!! As the saying goes, prevention is better than cure and automating a prevention mechanism can help you avoid such mishaps. For instance, Netwrix has a freeware product that... Read More

Featured Links