George Chetcuti’s Blog

Last Updated on 1 Sept. 2014, Total: 540 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
169 News 1 Sept. 2014
94 Products 28 Aug. 2014
36 Security 29 Aug. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Many wireless networks in London are still unsecure!

    On his well-equipped bike, James Lyne cycled for 91 miles across central London to discover how many wireless networks he could find with outdated weak encryption or no encryption at all! With help from a GPS, two dynamos, and a computer pimped up with solar panels, thousands of unsecured wireless networks were discovered! Read the full article here - http://www.cybercrimesunit.com/warbiking-in-london/... Read More

  2. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  3. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  4. Microsoft Security Compliance Manager 2.5

    Microsoft Security Compliance Manager (SCM) is a free tool that enables you to quickly configure and manage your computers, traditional datacenter, and private cloud using Group Policy and Microsoft System Center Configuration Manager. SCM 2 includes sample policies and DCM configuration packs that are tested and fully supported, all set baselines are based on Microsoft Security Guide recommendations and industry... Read More

  5. Oracle releases patch for vulnerabilities in Java 7

    Oracle has issued an out-of-cycle patch for vulnerabilities in Java 7 that have been widely exploited to spread malware. This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A and Vulnerability Note VU#636312) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications... Read More

  6. An overview of security articles in EU legislation

    A whitepaper published by the European network and Information Security Agency (ENISA) gives an overview of the legal aspects of cyber security in the European Union (EU). Although, the majority of data breaches do normally make it to the press but there are many breaches which remain either undetected or not reported. EU considers effective legislation is key here and... Read More

  7. Free SDL Threat Modeling Tool

    Threat modeling can help organizations minimize the potential cost and need to rework code while in development or in post-production support. To help make threat modeling a little easier, Microsoft offers a free SDL Threat Modeling Tool that enables non-security subject matter experts to create and analyze threat models by communicating about the security design of their systems, analyzing those... Read More

  8. MS Script Explorer for Windows PowerShell RC

    Microsoft Script Explorer for Windows PowerShell (Release Candidate) helps scripters find Windows PowerShell scripts, snippets, modules, and how-to guidance in online repositories such as the TechNet Script Center Repository, PoshCode, local or network file systems and Bing Search Repository. Read more and download the setup file from here - http://www.microsoft.com/en-us/download/details.aspx?id=29101... Read More

  9. Amazon’s AWS re:Invent event

    Attend Amazon's AWS re: Invent this November, the No.1 event for the AWS Cloud community. It is the event of the cloud computing developers, hottest start-ups, and visionary technology leaders. The event includes topics that will make you a Cloud expert in: monitoring cloud resources, optimizing performance, managing security, and cutting costs. Plus you can meet with Amazon's AWS engineers... Read More

  10. Drive-by download attacks - a favorite tactic used by many attackers

    According to Microsoft's Tim Rains, drive-by download attacks continue to be a favorite tactic used by many attackers attempting to compromise large numbers of systems around the world. In his MS Security blog, Tim discusses drive-by download attacks and the need to keep all software up-to-date in an effort to mitigate this type of attack. He refers to information from... Read More

Featured Links