George Chetcuti’s Blog

Last Updated on 15 April 2014, Total: 479 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
148 General 3 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
21 Security 15 April 2014
5 Troubleshooting 2 May 2012
14 Virtualization 6 March 2014
  1. Enterprise Risk Management Simplified

    SimpleRisk is a free and open source web application, released under Mozilla Public License 2.0, and is extremely useful in performing risk management activities... Read More

  2. New 5nine Cloud Security 4.0 for Hyper-V is Now Available

    Agentless Multi-Tenant Security, Antivirus and VM Isolation Help Enterprises and Cloud Providers to Enforce Security and Compliance for Hyper-V... Read More

  3. Users advised to avoid visiting nhs.uk

    Was NHS.uk compromised due a coding error? - Many pages are serving malware and re-directing users to advertisements... Read More

  4. Readers Choice Awards December Winners

    TechGenix websites conduct monthly polls to discover which product is preferred by visitors in a particular category of third party solutions... Read More

  5. Amazon’s Simple Email Service New Regions

    Amazon Simple Email Service (SES) allows you to send transactional emails, marketing emails, or any other high-quality messages to your customers... Read More

  6. Mozilla Thunderbird Vulnerability

    The vulnerability in Mozilla Thunderbird email application 17.0.6 can result in multiple attack vectors on the client end which may eventually result in complete compromise of the end user system... Read More

  7. Does your organisation still use certificates with an RSA key-length of at most 1024 bits?

    The Dutch National Cyber Security Centre (NCSC) publishes a factsheet about certificates that contain RSA keys which are being phased-out. This provides you with more information and perspectives for action... Read More

  8. Amazon announces new reduced prices for its EBS and S3 Cloud Services

    The new pricing take effect on February 1, 2014 and will be applied automatically... Read More

  9. VMware VMX process denial of service vulnerability

    VMware's security advisory addresses several security issues in VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director... Read More

  10. Cover your webcam when you're not using it

    Belgium's Federal Computer Crime Unit says it's "a good precaution" to tape up or cover your computer's webcam when you are not using it... Read More

Featured Links