George Chetcuti’s Blog

Last Updated on 25 July 2014, Total: 526 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
20 Monitoring 19 May 2014
161 News 24 July 2014
92 Products 17 July 2014
34 Security 25 July 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Attack Surface Analyzer 1.0 Released

    The beta version of Microsoft's Attack Surface Analyzer is now replaced with version 1. Microsoft's SDL team releases version 1.0 of the tool as a continuation of its effort to provide tools that hardened the stability and security of Windows environments. The tool helps software developers, Independent Software Vendors (ISVs) and IT Professionals understand changes in Windows systems' attack surface... Read More

  2. iCloud apparent flaw

    An apple user sells his MacBook Air and finds out that he can still track the device using Apple's "Find My Mac" feature, even though the laptop's hard drive has been completely erased. An apparent flaw in Apple's iCloud, allows owners of second-hand Apple devices to be tracked by the original owner, who can also remotely wipe all the data... Read More

  3. Register for free training - Windows Server 2012: First Look

    Learn how to cloud optimize your IT with Windows Server 2012 and how to take advantage of the skills and investment you have already made in building a familiar and consistent platform. With Windows Server 2012, you gain all the Microsoft experience behind building and operating private and public clouds, delivered as a dynamic, available, and cost-effective server platform. This... Read More

  4. Rights Protected Folder Explorer

    Rights Protected Folder Explorer is a Windows based application that allows you to work with Rights Protected Folders. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder. It works with Active Directory Rights Management... Read More

  5. Dell introduces a new Big Data Retention solution

    The new Dell Big Data Retention solution is designed for organizations that leverage big data analytics to derive business value from their data. The solution integrates with existing analytics platforms as a frontend big data repository for large datasets or a backend archive. It can also serve as a standalone repository or as an analytics platform with Hadoop. According to... Read More

  6. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  7. Amazon’s Cloud announces the availability of a high I/O Instance

    Amazon customers can now launch an EC2 High I/O Quadruple Extra Large (hi1.4xlarge in the EC2 API) instance. This I/O beast consists of 8 virtual cores, clocking in at a total of 35 ECU (EC2 Compute Units), HVM and PVM virtualization, 60.5 GB of RAM, 10 Gigabit Ethernet connectivity with support for cluster placement groups, and 2 TB of local... Read More

  8. Fake Skype malware app on Android

    Days after Trend Micro, a global leader in antivirus solutions broke the news of a fake Skype malware app for Android devices, Microsoft acknowledges the existence of the malware and releases an alert notification on its Malware Protection Center website. It urges users of Android phones to install security software or download the latest updates for those who already have... Read More

  9. Office Mobile 2010 for Windows Mobile

    The Office Mobile application suite includes Microsoft Office Word Mobile, Excel Mobile, and Microsoft Office PowerPoint® Mobile for Windows Mobile 6.5 powered devices, helping users manage and review documents. Microsoft Office Mobile includes support for rich reviewing and minor editing capabilities as well as support for rights-managed documents. Download the files appropriate for you from here - http://www.microsoft.com/en-us/download/details.aspx?id=29981... Read More

  10. Mitt Romney's private Hotmail account hacked!

    Authorities are investigating whether Mitt Romney's private email account was hacked, his presidential campaign stated. It was reported that an unnamed hacker had broken into the Republican private Hotmail account by guessing the answer to a security question about Mr. Romney's favorite pet. Read the full story here - http://www.telegraph.co.uk/news/worldnews/us-election/9312904/Mitt-Romneys-private-email-account-hacked.html... Read More

Featured Links