George Chetcuti’s Blog

Last Updated on 20 Nov. 2014, Total: 574 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
38 Implementation 23 Oct. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
49 Security 14 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. GoDaddy.com outage was not caused by DDoS attacks

    The global hosting service provider GoDaddy.com says that a series of internal network events has corrupted its router data tables and caused the intermittent service outages of last Monday. Go Daddy also denies claims made by hackers on Twitter that the outage was due to DDoS attacks against their services. Read the full press release here - http://www.godaddy.com/newscenter/release-view.aspx?news_item_id=410... Read More

  2. Windows Server 2012 Test Lab Guide

    This Microsoft Test Lab Guide (TLG) provides step-by-step instructions to create the Windows Server 2012 Base Configuration test lab, using computers running Windows Server 2012 and Windows 8. For a test lab based on physical computers, you can image the drives for future test labs. For a test lab based on virtual machines, you can create snapshots of the base... Read More

  3. Selection and Operation of Secondary DNS Servers

    There are always lessons to learn from major incidents. For instance, outages like the one that the global hosting provider GoDaddy has suffered yesterday should remind us of how best online resources are deployed! A must-read RFC about the selection and operation of secondary DNS servers defines the best practices to set up a secondary DNS server for your domain... Read More

  4. Security implications of HDMI Ethernet Channel

    VGA is almost dead and with new PCs and laptops we get HDMI, but under the hood this brings many other capabilities than just displaying video. HDMI Ethernet Channel could circumvent corporate security in a number of ways, such as through the use of network-enabled display technologies and via HEC-enabled corporate laptops, but the technology is still largely unsupported. Often... Read More

  5. Zoho’s online office apps integrate with Google drive

    Zoho's online office apps integrate with Google Drive and users can now open their documents using Zoho's Writer, Sheet & Show – Zoho's word processor, spreadsheet and presentation applications. Zoho offers a comprehensive suite of award-winning online business, productivity & collaboration applications. This integration is not just for viewing files using Zoho's apps, but it also allows users to edit... Read More

  6. Many wireless networks in London are still unsecure!

    On his well-equipped bike, James Lyne cycled for 91 miles across central London to discover how many wireless networks he could find with outdated weak encryption or no encryption at all! With help from a GPS, two dynamos, and a computer pimped up with solar panels, thousands of unsecured wireless networks were discovered! Read the full article here - http://www.cybercrimesunit.com/warbiking-in-london/... Read More

  7. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  8. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  9. Microsoft Security Compliance Manager 2.5

    Microsoft Security Compliance Manager (SCM) is a free tool that enables you to quickly configure and manage your computers, traditional datacenter, and private cloud using Group Policy and Microsoft System Center Configuration Manager. SCM 2 includes sample policies and DCM configuration packs that are tested and fully supported, all set baselines are based on Microsoft Security Guide recommendations and industry... Read More

  10. Oracle releases patch for vulnerabilities in Java 7

    Oracle has issued an out-of-cycle patch for vulnerabilities in Java 7 that have been widely exploited to spread malware. This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A and Vulnerability Note VU#636312) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications... Read More

Featured Links