George Chetcuti’s Blog

Last Updated on 30 Oct. 2014, Total: 565 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
38 Implementation 23 Oct. 2014
23 Monitoring 16 Oct. 2014
183 News 30 Oct. 2014
94 Products 28 Aug. 2014
45 Security 10 Oct. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. EU lacks the tech workforce

    Half of Europe's workforce is too tech-challenged to fill all the extra ICT jobs that will be knocking around in the next few years, according to the European Commission (EC). The EC's Digital Agenda crew released its scoreboard of how well the continent is doing. The overall aim of the EC Digital Agenda is to deliver sustainable economic and social... Read More

  2. System Update Readiness Tool for Windows 7and Windows Server 2008 R2

    Check out this free tool provided by Microsoft which was released to fix an inconsistency in the Windows servicing store which may prevent the successful installation of future updates, service packs, and software. This tool checks your computer for such inconsistencies and tries to resolve issues if found. This tool is for Windows Vista, Windows Server 2008, Windows Server 2008... Read More

  3. Track Privileged Identities!

    If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More

  4. Be aware of fake Google’s Chrome installers for Windows

    Trend Micro, the antivirus vendor has identified suspicious URLs which appear to be hosted on legitimate sources such as, Facebook and Google domains that promote a malicious file called ChromeSetup.exe. This file has nothing to do with Google's Chrome installation but is simply an information-stealing Trojan application and is offered for download on various websites! An analysis of the file... Read More

  5. Security Professionals Nightmare

    Although, the virus Flame is no longer spreading and most of its command-and control servers discovered, it remains what security professionals have been terrified of - mimicking Microsoft's Windows update mechanism and spreading through it. Mikko Hypponen, chief research officer at F-Secure states that 'Having a Microsoft code signing certificate is the Holy Grail of malware writers. This has now... Read More

  6. Try Visual Studio 2012 RC

    Visual Studio 2012 Release Candidate (RC) supports the new Windows 8 and Azure platforms with new tools that make HTML 5 and CSS 3 development more productive and higher quality end results. The development tool includes Windows Azure project templates and a whole slew of features for Windows 8 Metro and desktop applications. Download the Visual Studio 2012 Release Candidate... Read More

  7. Disk Space Monitoring Tool

    How many times you get a support call that a resource is performing very low and after you perform your tests, you find out that this resource is out of disk space!!! As the saying goes, prevention is better than cure and automating a prevention mechanism can help you avoid such mishaps. For instance, Netwrix has a freeware product that... Read More

  8. Submarine cables – Internet’s physical infrastructure

    If you're into the physical infrastructure of the Internet then this map should be your starting point. The Submarine Cable Map is a free resource from TeleGeography. Data contained in this map is drawn from Global Bandwidth Research Service and is updated on a regular basis. The map is rich of information including cable capacity, provider name and other elements;... Read More

  9. Google Chrome is no. 1

    Google Chrome market share is now 32.8% exceeding Microsoft's Internet Explorer by approx. 1% which is at 31.9% according to StatCounter. Mozilla Firefox stands third with 25%. Read more here - http://www.businessinsider.com/google-overtakes-internet-explorer-as-most-popular-browser-2012-5?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=Feed%3A+businessinsider+%28Business+Insider%29... Read More

  10. Windows 8 Refresh Points & System Recovery

    Both Refresh Points and System Recovery features in Windows 8 can be used to remove malicious and corrupted files. W. Kenneth Johnson has published some notes from his research about Windows 8 forensics and where you can find a good explanation about various artifacts related to these two features. Read more here - http://randomthoughtsofforensics.blogspot.co.uk/2012/05/windows-8-refresh-excerpt.html... Read More

Featured Links