George Chetcuti’s Blog

Last Updated on 30 Oct. 2014, Total: 565 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
38 Implementation 23 Oct. 2014
23 Monitoring 16 Oct. 2014
183 News 30 Oct. 2014
94 Products 28 Aug. 2014
45 Security 10 Oct. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  2. GUI-based Log Parser

    Log Parser is a very powerful and versatile query software tool that provides universal query access to text-based data, such as log files, XML files, and CSV files, as well as key data sources on the Microsoft Windows operating system, such as the event log, IIS log, the registry, the file system, and the Active Directory services. Get more information... Read More

  3. Audit plug-in for MySQL databases by McAfee

    McAfee, a leader in security solutions for systems, networks and mobile devices has released a free open-source audit plug-in for MySQL databases. The plug-in allows users to capture detailed activity of MySQL databases which will help organizations comply with database audit requirements. According to Dan Sarel, the vice president of Database Security Product Management at McAfee "McAfee developed the free... Read More

  4. Develop your first Tizen application!

    Tizen is an open source software platform supported by leading mobile operators, device manufacturers, and silicon suppliers for multiple device categories, including smartphones, tablets, netbooks, in-vehicle infotainment devices, smart TVs, and more. Tizen will offer an innovative operating system, applications, and a user experience that consumers can take from device to device. The Tizen platform works on the Linux kernel... Read More

  5. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

  6. The end of Symantec and Huawei Technologies joint venture!

    The deal that took off four years ago between Symantec and the Chinese company Huawei, to develop computer network security products came to an end as the US government effort to enhance cyber security is producing both direct and indirect benefits! Symantec is a global leader in security, storage and systems management solutions and Huawei is a leading global information... Read More

  7. Windows SBS 2011 Trial

    If you are a small organization with limited IT resources and budget, then it is worth giving Windows Small Business Server 2011 a try! SBS 2011 is designed and priced for small businesses with up to 75 users. It's an all-in-one solution which has been updated to the most current Windows 2008 R2 server technology. It includes a new and... Read More

  8. Enemies of the Internet!

    Who are the enemies of the Internet? Governments like China, Vietnam and Iran that hold the largest number of cyber-citizens or netizens in jail. The latest countries to join the annual list are Bahrain and Belarus – these governments restrict Internet access, filter content and imprison bloggers. On the other hand, governments that try to introduce mandatory web filtering mechanisms... Read More

  9. The importance of log management

    According to recent investigations by Verizon companies are not aware of how precious and important systems logs are! Companies either do not maintain logs or simply ignore them but logs are needed to identify unusual system behavior and track events! Alan Brill, Senior Managing Director at Kroll has published an interesting article on net-security.org that discusses the importance and value... Read More

  10. IPv6 Webinar for African Operators

    AfriNIC, a source of information of Internet technology and governance for the African community, Internet Society a leader in Internet policy, and France Telecom a leading telecoms operator, will be organizing an IPv6 webinar to assist African operators with their adoption plans and raise awareness about IPv6 initiatives and activities. The agenda for the webinar is: The Cost of not... Read More

Featured Links