George Chetcuti’s Blog

Last Updated on 21 Nov. 2014, Total: 575 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
49 Security 14 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. The first European Cyber Security Month – October 2012

    The Czech Republic, Luxembourg, Norway, Romania, Slovenia, Spain, Portugal, and the United Kingdom are participating with various activities and events throughout October, to raise awareness of cyber security. The objectives of the European Cyber Security Month (ECSM) are to promote cyber security awareness among citizens, to modify their perception of cyber threats, and to provide updated security information through education,... Read More

  2. Set the desired level of IOPS with Amazon RDS

    Amazon's Cloud computing now includes new high performance provisioned IOPS storage for its Relational Database Service. Now, you can provision new RDS database instances with 1,000 to 10,000 IOPS, and with 100GB to 1 TB of storage for MySQL and Oracle databases. If you are using SQL Server, the maximum IOPS you can provision is 7,000 IOPS. The creation of... Read More

  3. IT Pros and Technology Consumers – Monthly Newsletter

    We often think about the IT professional and the technology consumer as two very different and always separate entities. Tech vendors target their products to one market or the other. Tech publications write to one audience or the other. But whereas Grandma might not ever buy a Cisco Catalyst 6509 switch or understand a word of the articles published on... Read More

  4. The European Cloud Computing Strategy

    The European Commission aims at enabling and facilitating faster adoption of cloud computing throughout all sectors of the economy in order to boost the productivity, growth and jobs in Europe. The strategy includes three key actions which are Standards & Certification, Contract terms & Conditions, and European Cloud Partnership Read more here - http://ec.europa.eu/information_society/activities/cloudcomputing/cloud_strategy/index_en.htm... Read More

  5. There is Too Much Cooling in Data Centers

    According to an assistant professor of computer science at the University of Toronto Scarborough, server environments can easily operate at warmer temperatures thus saving costs on air conditioning without endangering the health and performance of the hardware. Read more here – http://www.tomsitpro.com/articles/datacente-cooling-science_research-UTSC,1-549.html... Read More

  6. A live MSExchange.org Webinar sponsored by KEMP Technologies

    Is your organization's network service up-to-date with the latest configuration best practices for High Availability and Load Balancing? Now is the time make sure, before you have an outage. Learn the latest from a Microsoft Exchange MVP who will help you identify where your High Availability network stands today and avoid future outages. Join J. Peter Bruzzese, Microsoft Certified Trainer... Read More

  7. Amazon’s Cloud VPN additional features

    Amazon's Virtual Private Cloud (VPC) include route tables and gateways features, that allow you to both extend your organization's network to Amazon's Cloud, and connect your VPC to the Internet and leverage the benefits of Amazon EC2. In addition, you can create VPNs using devices that do not support BGP. Some firewalls and entry-level routers support IPSec but not BGP... Read More

  8. Dell SecureWorks discovers another APT

    Security experts at Dell SecureWorks has been on the go discovering number of APTs (Advanced Persistent Threats) threatening various sectors such as, energy and military. This is the second cyber espionage activity that Dell's CTU (Counter Threat Unit) has discovered this year. Dell's experts have found that Mirage (latest APT) has C&C (command & control) servers IP addresses originating from... Read More

  9. HTTPS sessions can be hijacked!

    Security researchers discovered that even HTTPS encryption that is used for secure connections throughout the Internet can allow attackers to hijack web browser sessions that support SPDY or TLS compression. SPDY is an open networking protocol used by Google and Twitter. This security weakness can be exploited when web sessions are protected by SSL or TLS and are using one... Read More

  10. Microsoft latest staff giveaway

    Microsoft announces a massive giveaway to its 94,000 employees! According to v3.co.uk each Microsoft employee would get a Surface RT tablet, a Windows Phone 8 and a Windows 8 computer, which would cost Microsoft some $100 million. It is a noble gesture by Microsoft which would not only help keeping its employees happy but it would also raise the number... Read More

Featured Links