George Chetcuti’s Blog

Last Updated on 6 Oct. 2015, Total: 732 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at

9 Command-line
167 General
46 Implementation
27 Monitoring
271 News
98 Products
92 Security
5 Troubleshooting
16 Virtualization
  1. Microsoft’s first ever $100,000 bounty

    Congratulations to James Forshaw for coming up with a new exploitation technique to get Microsoft’s first ever $100,000 bounty... Read More

  2. Migrating Printers in Windows Server 2008

    Moving services from server to another is an extensive job, especially if a resource has a long list of items to move such as, a long list of printers. With Virtualization migrating resources has been simplified in a way, however, some specific tasks remain the same. That is, they don't benefit from available tools at the virtualization layer. When performing... Read More

  3. Military bots to assist Police during the World Cup in Brazil

    PackBot robot system, designed by iRobot was the first remote controlled robot to enter the Fukushima nuclear facility after the East Japan Earthquake and tsunami in March 2011... Read More

  4. Mining for New C&C Domains

    Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates... Read More

  5. Mitt Romney's private Hotmail account hacked!

    Authorities are investigating whether Mitt Romney's private email account was hacked, his presidential campaign stated. It was reported that an unnamed hacker had broken into the Republican private Hotmail account by guessing the answer to a security question about Mr. Romney's favorite pet. Read the full story here - Read More

  6. Mobile DDoS may be coming - Just not now

    Mobile DDoS is possible but not feasible at the moment!... Read More

  7. Mobile Device Management solution market expected to grow

    Mobile Device Management (MDM) platform extending from big business to SMEs, public sector and non-profits... Read More

  8. Mobile phone money transfer app

    A "revolutionary" app enabling people to send and receive money just by using mobile phone numbers is to be made available to consumers across the UK. The Barclays Pingit allows users to send and receive cash to anyone with a UK current account and mobile phone number, without having to share bank details. Read more - Read More

  9. Mobile-connected devices will exceed the world’s population…

    In 2012 there will be more mobile devices than people, according to Cisco. Cisco's Global Mobile Traffic Forecast report shows that there will be more than 10 billion mobile-connected devices by the end of 2012 which would exceed the world's population estimated to reach 7.3 billion at that time! Two-thirds of the world's mobile data traffic will be video while,... Read More

  10. Modular security for scaling network performance and extending to the cloud

    HP Enterprise Security webinar on January 17th - 9AM PT... Read More

Featured Links