George Chetcuti’s Blog

Last Updated on 19 Dec. 2014, Total: 589 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
154 General 27 Nov. 2014
40 Implementation 4 Dec. 2014
23 Monitoring 16 Oct. 2014
192 News 19 Dec. 2014
94 Products 28 Aug. 2014
56 Security 16 Dec. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Last chance to sign up to the Spear Phishing: The Cost of Damages and How to Create the ROI Case for Bolstering your Defenses webinar!

    Spear phishing has quickly evolved into one of the dangerous forms of spam. Phishing emails, designed to steal passwords, banking info, and other sensitive information, have become very common and very costly. Many IT and Security professionals know they need to bolster their defenses but are having trouble justifying new investments internally with a good ROI case. Join Michael Osterman... Read More

  2. Cyber Warfare - electronic pulse cannon

    Scientists are a step closer to developing a weapon that could change modern warfare with its potential to target cyber terrorists and disable enemy nuclear facilities by blowing up their computer systems. Read more here - http://news.sky.com/story/1019596/cyber-warfare-missile-can-cripple-computers... Read More

  3. Outages by various cloud providers have been more common than security breaches

    Although, we continuously talk about security or the lack of it, the main threat to Cloud computing are power outages according to a Gartner analyst! Outages by various cloud providers have been more common than security breaches, Gartner says, but few businesses are prepared for them. Companies can suffer data losses during power outages which as we have seen in... Read More

  4. Greenpeace's Guide to Greener Electronics

    This 18th edition of Greenpeace's Guide to Greener Electronics evaluates leading consumer electronics companies based on their commitment and progress in three environmental criteria: Energy and Climate, Greener Products, and Sustainable Operations. The Guide scores companies on overall policies and practices – not on specific products – to provide consumers with a snapshot of the sustainability of the biggest names... Read More

  5. Crafty Malware

    Although, it's a recommended best practice to test and debug malware in an isolated and contained environment, this post by Marco Ramilli explains how crafty malware can eventually detect this environment and behave in a different way. Malware can detect virtualized environments, active debuggers and sandbox environments. Briefly, malware authors can easily insert code into their software that detects such... Read More

  6. When will you switch to Windows Server 2012?

    Windows Server 2012 has been released and many questions about the software have been answered. But there was still one question that was looming; when is the tech industry planning to integrate Windows Server into their network? To answer this question, Firebrand surveyed over a thousand Technology companies and created an Info-graphic to share the results: Read more here -... Read More

  7. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  8. Don’t look back in anger - a week with Windows 8

    Firebrand's Commercial Director Rob Chapman has written an in-depth review of the latest and biggest release, Windows 8. The new operating system was put through its paces and all the new features tested on a week-long trip around Europe. Find out how it went here - http://blog.firebrandtraining.co.uk/2012/10/windows-8-review.html... Read More

  9. WinHlp32.exe is required to display ‘.hlp’ help files on Windows 8

    Windows Help (WinHlp32.exe) is a Help program that has been included with Microsoft Windows versions starting with the Microsoft Windows 3.1 operating system. However, the Windows Help program has not had a major update for many releases and no longer meets Microsoft's standards. Therefore, starting with the release of Windows Vista and continuing in Windows 8, the Windows Help program... Read More

  10. Great Firewall of China blocks Google.com

    According to GreatFire.org, a service that monitors blocked websites and keywords by the Chinese government, the Great Firewall of China has censored Google.com and some other Google services during the 18th Party Congress. Read more here - http://www.ibtimes.co.uk/articles/403467/20121109/china-blocks-google-com-gmail-maps-docs.htm... Read More

Featured Links