George Chetcuti’s Blog

Last Updated on 6 Oct. 2015, Total: 732 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at

9 Command-line
167 General
46 Implementation
27 Monitoring
271 News
98 Products
92 Security
5 Troubleshooting
16 Virtualization
  1. Monitor Your DNS for Hijacking

    Dnstest is a free tool that helps you monitor your DNS for Hijacking... Read More

  2. Monitoring tools for Large-Scale Networks

    A suite of open source tools for monitoring large-scale networks using flow data... Read More

  3. Monthly Newsletters Teaser

    Some salient points from our monthly newsletters... Read More

  4. More Than Half of IT Professionals Make Undocumented Changes to IT Systems - Netwrix Survey Finds

    Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime... Read More

  5. More on the 19 year old bug

    Although APT3 is well known for employing zero-day exploits in their attacks, recent activity has demonstrated that they will also attack targets with known exploits or social engineering... Read More

  6. More organizations move to Private Clouds

    The University of Western Australia is shifting its 400 TB of data resources to private cloud. All of the University IT resources will now be hosted on the cloud while the connections between the cloud data centers and the University have been upgraded to 10Gbps. So what's the big fuzz? The move is quite big and the interesting part is... Read More

  7. More security features for Amazon AWS

    Amazon AWS adds support for encryption of EBS data volumes and the associated snapshots... Read More

  8. Mozilla Thunderbird Vulnerability

    The vulnerability in Mozilla Thunderbird email application 17.0.6 can result in multiple attack vectors on the client end which may eventually result in complete compromise of the end user system... Read More

  9. Mozilla increases rewards given to researchers

    Changes to the Firefox Bug Bounty Program... Read More

  10. Mozilla smartphone OS

    The Mozilla Foundation makers of the Firefox web browser will be releasing an operating system for mobile phones later on this year. The first handsets running Mozilla's "Boot to Gecko" (B2G) software will be available in Brazil on Telefonica Vivo's mobile network. Gary Kovacs, chief executive of Mozilla, said this openness would make a difference to the way applications on... Read More

Featured Links