George Chetcuti’s Blog

Last Updated on 21 May 2015, Total: 658 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
160 General
40 Implementation
24 Monitoring
237 News
95 Products
71 Security
5 Troubleshooting
16 Virtualization
  1. New Payments Module in Zoho Creator

    Last month Zoho Corp. has released a Payment Module for its online Creator platform. Zoho Creator is an intuitive and feature-rich online platform that allows non-programmers to build custom database applications. Customers can build online applications based on business rules within minutes. With the Payments Module users can now build a wide range of online order forms and accept payments... Read More

  2. New features in Panda Security Managed service include a malware disinfection service

    The major new features in Adaptive Defense 1.5 include the malware disinfection service, and the ability to view the status of endpoints in real-time and manage the settings from a single Web console... Read More

  3. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  4. Nintex and Sharegate Announce Partnership to Move Customers to Office 365

    Tools enable customers to efficiently migrate to hybrid and cloud environments... Read More

  5. No botnet required for low-tech theft

    Pay attention where you leave your security blueprints as these may end up stolen at some train station! Actually, this has happened to a French defence contractor who was carrying blueprints of a drone aircraft being developed jointly by France and United Kingdom. No informatics strategies or high-tech tools were used in this incident! Read the full story here -... Read More

  6. November Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  7. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

  8. October Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  9. October Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  10. Office 356 Beta Program

    There are two business options in the beta program for Microsoft's Office 365 – the Small Business and the Enterprise. The Small Business is designed for up to 25 employees with monthly subscriptions when the final release is launched. It has the essential email, calendar and website services. It is considered as a business solution that needs no dedicated IT... Read More

Featured Links