George Chetcuti’s Blog

Last Updated on 23 Oct. 2014, Total: 563 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
38 Implementation 23 Oct. 2014
23 Monitoring 16 Oct. 2014
181 News 20 Oct. 2014
94 Products 28 Aug. 2014
45 Security 10 Oct. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Intellectual Property Watchlist 2012

    Consumers International, an independent global campaigning voice for consumers has published its fourth annual IP Watchlist. CI looks towards a future in which creators and consumers support each other in a mutually beneficial ecosystem of content production, consumption and reuse. The report also states that the recent discontent caused by ACTA and SOPA could have been avoided if government policy-makers... Read More

  2. Conquest of Africa - Googlica

    Google has set its feet in Africa, and takes all the credit for the latest developments in Internet infrastructure, ecommerce and other online activity. Internet speeds have gone up and prices down! More Africans are participating in various online initiatives and the entire ecosystem seems to be growing very fast. Read the full story here - http://www.channelstv.com/home/2012/05/15/google-in-africa-its-a-hit/... Read More

  3. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  4. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  5. UK ISPs to block The Pirate Bay!

    "Sites like The Pirate Bay destroy jobs in the UK and undermine investment in new British artists," the British Phonographic Industry (BPI) said. According to U.K.'s High Court, Pirate Bay must be blocked by UK ISPs. However, the court order will neither influence the artists' pockets nor prevent users from accessing the site if they use proxy servers and other... Read More

  6. Amazon EC2 now supports Microsoft SQL Server 2012

    Amazon AWS Cloud now supports the launch of Microsoft SQL Server on m1.small (1 ECU, 1.7 GB RAM) and m1.medium (2 ECU, 3.75 GB RAM) instance types. Amazon is introducing support for Microsoft SQL Server Web Edition, which brings together affordability, scalability, and manageability in a single offering. SQL Server Web will be supported across all Amazon EC2 instance types,... Read More

  7. Try Windows Intune for free!

    Try Microsoft cloud services with Windows Intune. Windows Intune helps you manage and secure personal computers and with the 30-day free trial you can use up to 25 computers. Windows Intune includes both the cloud service for PC management and security and upgrade rights to Windows 7 Enterprise and future versions of Windows. You can remotely perform a number of... Read More

  8. Why Can My Devices Be Searched at the Border?

    The U.S. Constitution prevents the government from performing searches without a valid reason; the government generally can't snoop through your laptop for no reason. Electronic data stored on personal devices is a reflection of our lives - family photos, medical documents, banking information, details about what websites we visit, and so much more. But those privacy protections don't safeguard travelers... Read More

  9. Passwords are not the bottleneck

    Passwords were and remain an important aspect of security in the financial sector, however, when you reflect on the whole scenario of financial mechanisms you might be surprised to find out that the impact of stolen passwords or compromised credentials is quite low in terms of financial losses. In fact, two researchers from Microsoft published a stimulating paper about this... Read More

  10. What Is the Windows Server "8" Beta Remote Access Server Role?

    Windows Server 8 new remote Access Server role combines the previous DirectAccess and RRAS roles into one unified service role. The new role allows for centralized administration, configuration, and monitoring of both DirectAccess and VPN-based remote access services. Apart, from the various articles and tech tips available at windowsnetworking.com and virtualizationadmin.com you can learn more about Remote Access in Windows... Read More

Featured Links