George Chetcuti’s Blog

Last Updated on 24 April 2015, Total: 645 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
160 General
40 Implementation
24 Monitoring
226 News
95 Products
69 Security
5 Troubleshooting
16 Virtualization
  1. New Amazon AWS China Region

    Amazon has been working with a number of Chinese data centres, bandwidth, and content delivery partners to bring this Region to life... Read More

  2. New Cybercrime Center at Europol

    The Center will be the focal point in the EU’s fight against cyber-crime... Read More

  3. New GPU design for mobile devices

    Future smartphones and tablet computers can leverage the enhanced performance of the new Mali-T658 GPU designed by ARM. Up to ten times faster than its predecessor, the new GPU is aimed at boosting mobile graphics and increasing ARM's market share in mobile graphics. We have to wait about 2 years to experience the benefits of the new design as ARM... Read More

  4. New Payments Module in Zoho Creator

    Last month Zoho Corp. has released a Payment Module for its online Creator platform. Zoho Creator is an intuitive and feature-rich online platform that allows non-programmers to build custom database applications. Customers can build online applications based on business rules within minutes. With the Payments Module users can now build a wide range of online order forms and accept payments... Read More

  5. New features in Panda Security Managed service include a malware disinfection service

    The major new features in Adaptive Defense 1.5 include the malware disinfection service, and the ability to view the status of endpoints in real-time and manage the settings from a single Web console... Read More

  6. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  7. Nintex and Sharegate Announce Partnership to Move Customers to Office 365

    Tools enable customers to efficiently migrate to hybrid and cloud environments... Read More

  8. No botnet required for low-tech theft

    Pay attention where you leave your security blueprints as these may end up stolen at some train station! Actually, this has happened to a French defence contractor who was carrying blueprints of a drone aircraft being developed jointly by France and United Kingdom. No informatics strategies or high-tech tools were used in this incident! Read the full story here -... Read More

  9. November Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  10. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

Featured Links