George Chetcuti’s Blog

Last Updated on 13 Aug. 2014, Total: 532 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
21 Monitoring 13 Aug. 2014
165 News 11 Aug. 2014
93 Products 29 July 2014
34 Security 25 July 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Police Ransomware Threat Assessment

    The European Cybercrime Centre at Europol publishes its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the European Union (EU) over the last two years... Read More

  2. Power Grids threatened by Cyber Attacks

    According to reports by McAfee, one in four of the world's power companies had suffered extortion from criminals who had gained access to their system's utilities. Two weeks ago a German power utility admits that it suffered a DDoS attack that blocked the company's Internet communications for several hours. This is the first confirmed Cyber-attack against a European grid operator... Read More

  3. Predicting Long-Term Human Mobility

    Where are you going to be 285 days from now at 2PM?... Read More

  4. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

  5. Productivity Future Prediction by Microsoft

    A very reasonably view of the future technology is presented by Microsoft's Office Labs where the overall concept integrates information flow, gadgets and everyday surrounding objects seamlessly together. Glass walls turn into huge displays and tables into tablets! Plausible sci-fi as some of the technology shown in these videos already exists; some has reached the level of prototypes while, some... Read More

  6. Q&A With Sanbolic CEO Momchil "Memo" Michailov

    Momchil V. Michailov, CEO of Sanbolic discusses next-generation storage technologies in view of the new virtualized enterprises... Read More

  7. Q&A with Unitrends CEO

    Unitrends CEO Uses Army Intelligence to Win the Backup War - In this brief Q&A, we will see how Mike Coney, Unitrends’ CEO used his vast experience with the U.S. Army Intelligence Agency and the industry to turn Unitrends from a lackluster vendor of backup and recovery solutions to one of the fastest growing companies in the market... Read More

  8. Quick resource utilization check on Windows 2008 Servers

    There are a number of tools which give you details about resource utilization on Windows based machines. Detailed reports are best used when digging further down into an existing problem or analyzing a complex problem that requires a lot of details but an ad hoc quick performance check would suffice with few details. Actually, routine quick checks would benefit most... Read More

  9. ReactOS!

    A potential competitor to Microsoft Windows Desktop Operating Systems may be round the corner! ReactOS a new Operating System similar to Windows is just waiting for funding before it can be finalized. A venture which took off some years ago by Russian students is said to be compatible with all Windows-based applications, programs and services. According to the young Russian... Read More

  10. Read-Only Domain Controllers

    The RODC (Read-Only Domain Controller) in AD DS environments is designed specifically for the branch office scenario. RODC receives authentication requests from branch office users and forwards them to a domain controller in the hub site for authentication. There are two types of configuration scenarios, one option is to allow caching of branch office users login credentials and the other... Read More

Featured Links