George Chetcuti’s Blog

Last Updated on 8 Oct. 2015, Total: 733 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at

9 Command-line
167 General
46 Implementation
27 Monitoring
272 News
98 Products
92 Security
5 Troubleshooting
16 Virtualization
  1. Mac OS X Security Configuration Guides

    The guides are designed to give instructions and recommendations for securing Mac OS X and for maintaining a secure computer... Read More

  2. Magento e-commerce web platform vulnerability

    Store owners and administrators of Magento are urged to take action immediately and apply the patch released to address these flaws... Read More

  3. Major Trends in Cloud Security

    Holger Schulze, Group Founder Information Security Community on LinkedIn presents the outcome of a comprehensive research that shows how your peers are approaching security in the era of cloud infrastructure and gain valuable benchmark data to gauge how your own organization stacks up... Read More

  4. Major new release of AuditorSuite from Lepide

    The LepideAuditor Suite v15.2 - now with a completely new GUI, a new app for iPhone users, delegated console access and improvements to HealthCheck auditing... Read More

  5. Majority of US Workers Prefer Separate Phone Numbers For Work and Personal Use

    International Survey Reveals Lack of BYOD Policies, Looming Privacy Concerns and Strong Preference for Separate Phone Numbers... Read More

  6. Malicious Software Removal Tool

    Microsoft has released version 4.18 of its Malicious Software Removal Tool... Read More

  7. Malicious Word documents & Associated Phishing campaign

    In this two-part series three security researchers present an analysis of a particular attack that combines spearphishing and exploit attempt... Read More

  8. Malware Compromises 100,000+ WordPress Websites

    Researchers at Sucuri say that the SoakSoak Malware has impacted 100’s of thousands of WordPress specific websites... Read More

  9. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

  10. Manage Hyper-V Like a Pro with NEW 5nine Manager v3.6

    5nine Software, the vendor-delivering management and agentless/host-based security products for Windows Server and Hyper-V, has released NEW 5nine Manager for Hyper-V v3.6... Read More

Featured Links