George Chetcuti’s Blog

Last Updated on 21 Nov. 2014, Total: 575 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
49 Security 14 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Penalizing success!

    What's going on in the UK? 'constant attacks on success; an absurd belief that fixed pay is a better system than variable pay and that politicians can determine what a "fair" wage is; the government's failure to deregulate labour markets; high income and other taxes; an energy policy which is killing manufacturing; the tax raid on the North Sea; an... Read More

  2. Phishing scam aimed at Facebook users

    A fake social media application aimed at Facebook users enticed users to enter their login credentials to gain access to the fake security app which promotes the security of their Facebook accounts and prevent them from being hacked. Users are reminded to never provide personal information such as, login credentials to unknown and unverified pop-up pages/screens, third-party apps, email requests,... Read More

  3. Police Ransomware Threat Assessment

    The European Cybercrime Centre at Europol publishes its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the European Union (EU) over the last two years... Read More

  4. Power Grids threatened by Cyber Attacks

    According to reports by McAfee, one in four of the world's power companies had suffered extortion from criminals who had gained access to their system's utilities. Two weeks ago a German power utility admits that it suffered a DDoS attack that blocked the company's Internet communications for several hours. This is the first confirmed Cyber-attack against a European grid operator... Read More

  5. Predicting Long-Term Human Mobility

    Where are you going to be 285 days from now at 2PM?... Read More

  6. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

  7. Productivity Future Prediction by Microsoft

    A very reasonably view of the future technology is presented by Microsoft's Office Labs where the overall concept integrates information flow, gadgets and everyday surrounding objects seamlessly together. Glass walls turn into huge displays and tables into tablets! Plausible sci-fi as some of the technology shown in these videos already exists; some has reached the level of prototypes while, some... Read More

  8. Q&A With Sanbolic CEO Momchil "Memo" Michailov

    Momchil V. Michailov, CEO of Sanbolic discusses next-generation storage technologies in view of the new virtualized enterprises... Read More

  9. Q&A with Unitrends CEO

    Unitrends CEO Uses Army Intelligence to Win the Backup War - In this brief Q&A, we will see how Mike Coney, Unitrends’ CEO used his vast experience with the U.S. Army Intelligence Agency and the industry to turn Unitrends from a lackluster vendor of backup and recovery solutions to one of the fastest growing companies in the market... Read More

  10. Quick resource utilization check on Windows 2008 Servers

    There are a number of tools which give you details about resource utilization on Windows based machines. Detailed reports are best used when digging further down into an existing problem or analyzing a complex problem that requires a lot of details but an ad hoc quick performance check would suffice with few details. Actually, routine quick checks would benefit most... Read More

Featured Links