George Chetcuti’s Blog

Last Updated on 26 Sept. 2014, Total: 552 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
174 News 23 Sept. 2014
94 Products 28 Aug. 2014
43 Security 26 Sept. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Audit plug-in for MySQL databases by McAfee

    McAfee, a leader in security solutions for systems, networks and mobile devices has released a free open-source audit plug-in for MySQL databases. The plug-in allows users to capture detailed activity of MySQL databases which will help organizations comply with database audit requirements. According to Dan Sarel, the vice president of Database Security Product Management at McAfee "McAfee developed the free... Read More

  2. Develop your first Tizen application!

    Tizen is an open source software platform supported by leading mobile operators, device manufacturers, and silicon suppliers for multiple device categories, including smartphones, tablets, netbooks, in-vehicle infotainment devices, smart TVs, and more. Tizen will offer an innovative operating system, applications, and a user experience that consumers can take from device to device. The Tizen platform works on the Linux kernel... Read More

  3. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

  4. The end of Symantec and Huawei Technologies joint venture!

    The deal that took off four years ago between Symantec and the Chinese company Huawei, to develop computer network security products came to an end as the US government effort to enhance cyber security is producing both direct and indirect benefits! Symantec is a global leader in security, storage and systems management solutions and Huawei is a leading global information... Read More

  5. Windows SBS 2011 Trial

    If you are a small organization with limited IT resources and budget, then it is worth giving Windows Small Business Server 2011 a try! SBS 2011 is designed and priced for small businesses with up to 75 users. It's an all-in-one solution which has been updated to the most current Windows 2008 R2 server technology. It includes a new and... Read More

  6. Enemies of the Internet!

    Who are the enemies of the Internet? Governments like China, Vietnam and Iran that hold the largest number of cyber-citizens or netizens in jail. The latest countries to join the annual list are Bahrain and Belarus – these governments restrict Internet access, filter content and imprison bloggers. On the other hand, governments that try to introduce mandatory web filtering mechanisms... Read More

  7. The importance of log management

    According to recent investigations by Verizon companies are not aware of how precious and important systems logs are! Companies either do not maintain logs or simply ignore them but logs are needed to identify unusual system behavior and track events! Alan Brill, Senior Managing Director at Kroll has published an interesting article on net-security.org that discusses the importance and value... Read More

  8. IPv6 Webinar for African Operators

    AfriNIC, a source of information of Internet technology and governance for the African community, Internet Society a leader in Internet policy, and France Telecom a leading telecoms operator, will be organizing an IPv6 webinar to assist African operators with their adoption plans and raise awareness about IPv6 initiatives and activities. The agenda for the webinar is: The Cost of not... Read More

  9. Michael Jackson entire catalog…

    Michael Jackson's entire 50,000-track catalog which includes many songs that have never been released may have been compromised in last year's Sony hack! It is reported that hackers were able to download the entire catalog! In fact, Sony admits the breach and stated that all compromised servers have been patched. Sony purchased the catalog back in 2001 for $250 million!... Read More

  10. Bilingual avatars developed by Microsoft

    Microsoft Research presents bilingual avatars at the TechFest 2012. The Monolingual TTS can translate the user's speech into another language and in a voice that sounds like the original user's. Imagine, the tool recognizes your native tongue, translates it to a different language, and plays it with a great deal of approximation of what you sound like! The demo at... Read More

Featured Links