George Chetcuti’s Blog

Last Updated on 30 Oct. 2014, Total: 565 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
38 Implementation 23 Oct. 2014
23 Monitoring 16 Oct. 2014
183 News 30 Oct. 2014
94 Products 28 Aug. 2014
45 Security 10 Oct. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Seagate and Samsung combined strength!

    Seagate claims that its acquisition of Samsung's hard drive business will allow them to offer a more extensive portfolio of innovative storage solutions. The acquisition was completed on December 19th, 2011 and the deal includes assets, infrastructure and employees. Also, Seagate will supply disk drives to Samsung for PCs, notebooks and consumer devices while, Samsung will supply Seagate with chips... Read More

  2. Seagate's 2TB external hard drive now backs up your phone

    Seagate announces its second generation external storage drive that backs up your iOS or Android mobile device... Read More

  3. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

  4. Security Professionals Nightmare

    Although, the virus Flame is no longer spreading and most of its command-and control servers discovered, it remains what security professionals have been terrified of - mimicking Microsoft's Windows update mechanism and spreading through it. Mikko Hypponen, chief research officer at F-Secure states that 'Having a Microsoft code signing certificate is the Holy Grail of malware writers. This has now... Read More

  5. Security implications of HDMI Ethernet Channel

    VGA is almost dead and with new PCs and laptops we get HDMI, but under the hood this brings many other capabilities than just displaying video. HDMI Ethernet Channel could circumvent corporate security in a number of ways, such as through the use of network-enabled display technologies and via HEC-enabled corporate laptops, but the technology is still largely unsupported. Often... Read More

  6. Security updates for Adobe Flash & Shockwave Players

    Adobe recommends users update their software installations by following the instructions found in the respective Security Advisories... Read More

  7. Selection and Operation of Secondary DNS Servers

    There are always lessons to learn from major incidents. For instance, outages like the one that the global hosting provider GoDaddy has suffered yesterday should remind us of how best online resources are deployed! A must-read RFC about the selection and operation of secondary DNS servers defines the best practices to set up a secondary DNS server for your domain... Read More

  8. September Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com August monthly newsletters... Read More

  9. September Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  10. September Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

Featured Links