George Chetcuti’s Blog

Last Updated on 29 July 2014, Total: 527 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
20 Monitoring 19 May 2014
161 News 24 July 2014
93 Products 29 July 2014
34 Security 25 July 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Passwords are not the bottleneck

    Passwords were and remain an important aspect of security in the financial sector, however, when you reflect on the whole scenario of financial mechanisms you might be surprised to find out that the impact of stolen passwords or compromised credentials is quite low in terms of financial losses. In fact, two researchers from Microsoft published a stimulating paper about this... Read More

  2. Patch Management as a Service

    Keep software up-to-date the easy way – Patch Management in GFI Cloud... Read More

  3. PayPal Persistent Mail Encoding Vulnerability

    The Vulnerability Laboratory Research Team discovered an input validation mail encoding vulnerability in the official PayPal Inc (Ebay) MainStreet finance service company website... Read More

  4. Paypal Persistent Payment Mail Vulnerability

    The Vulnerability Laboratory Research Team discovered a Web Vulnerability in the official Paypal ecommerce website application... Read More

  5. Penalizing success!

    What's going on in the UK? 'constant attacks on success; an absurd belief that fixed pay is a better system than variable pay and that politicians can determine what a "fair" wage is; the government's failure to deregulate labour markets; high income and other taxes; an energy policy which is killing manufacturing; the tax raid on the North Sea; an... Read More

  6. Phishing scam aimed at Facebook users

    A fake social media application aimed at Facebook users enticed users to enter their login credentials to gain access to the fake security app which promotes the security of their Facebook accounts and prevent them from being hacked. Users are reminded to never provide personal information such as, login credentials to unknown and unverified pop-up pages/screens, third-party apps, email requests,... Read More

  7. Police Ransomware Threat Assessment

    The European Cybercrime Centre at Europol publishes its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the European Union (EU) over the last two years... Read More

  8. Power Grids threatened by Cyber Attacks

    According to reports by McAfee, one in four of the world's power companies had suffered extortion from criminals who had gained access to their system's utilities. Two weeks ago a German power utility admits that it suffered a DDoS attack that blocked the company's Internet communications for several hours. This is the first confirmed Cyber-attack against a European grid operator... Read More

  9. Predicting Long-Term Human Mobility

    Where are you going to be 285 days from now at 2PM?... Read More

  10. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

Featured Links