George Chetcuti’s Blog

Last Updated on 27 March 2015, Total: 632 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
159 General 21 March 2015
40 Implementation 4 Dec. 2014
24 Monitoring 4 March 2015
217 News 27 March 2015
94 Products 28 Aug. 2014
67 Security 18 March 2015
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Mobile-connected devices will exceed the world’s population…

    In 2012 there will be more mobile devices than people, according to Cisco. Cisco's Global Mobile Traffic Forecast report shows that there will be more than 10 billion mobile-connected devices by the end of 2012 which would exceed the world's population estimated to reach 7.3 billion at that time! Two-thirds of the world's mobile data traffic will be video while,... Read More

  2. Modular security for scaling network performance and extending to the cloud

    HP Enterprise Security webinar on January 17th - 9AM PT... Read More

  3. Monitor Your DNS for Hijacking

    Dnstest is a free tool that helps you monitor your DNS for Hijacking... Read More

  4. Monitoring tools for Large-Scale Networks

    A suite of open source tools for monitoring large-scale networks using flow data... Read More

  5. Monthly Newsletters Teaser

    Some salient points from our monthly newsletters... Read More

  6. More Than Half of IT Professionals Make Undocumented Changes to IT Systems - Netwrix Survey Finds

    Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime... Read More

  7. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  8. More organizations move to Private Clouds

    The University of Western Australia is shifting its 400 TB of data resources to private cloud. All of the University IT resources will now be hosted on the cloud while the connections between the cloud data centers and the University have been upgraded to 10Gbps. So what's the big fuzz? The move is quite big and the interesting part is... Read More

  9. More security features for Amazon AWS

    Amazon AWS adds support for encryption of EBS data volumes and the associated snapshots... Read More

  10. Mozilla Thunderbird Vulnerability

    The vulnerability in Mozilla Thunderbird email application 17.0.6 can result in multiple attack vectors on the client end which may eventually result in complete compromise of the end user system... Read More

Featured Links