George Chetcuti’s Blog

Last Updated on 24 Nov. 2015, Total: 754 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at

9 Command-line
168 General
46 Implementation
27 Monitoring
286 News
99 Products
97 Security
5 Troubleshooting
16 Virtualization
  1. Amount of idle time required before suspending a session

    Playing around with idle time settings for SMB sessions... Read More

  2. 10 tips for cyber security

    The UK Federation for Small Businesses (FSB) published a report about cyber security best practices focusing on small and micro businesses... Read More

  3. Call for papers about Botnets

    Botconf’13 – Call for papers... Read More

  4. Is your ICS well protected?

    The oil-and-gas sector is one of the most heavily targeted industries for cyber-attacks... Read More

  5. Skype is reading everything you write

    According to the German security firm Heise Security, Microsoft monitors users’ instant messages and SMSs on Skype... Read More

  6. Microsoft Security Updates for May 2013

    May’s Patch Tuesday from Microsoft contain two critical security updates linked to vulnerabilities in Internet Explorer... Read More

  7. ITIL framework online resource

    The service desk is a single point of contact (SPOC) for end users who need assistance/help... Read More

  8. The world’s largest library

    ‘The Internet has often been called the world’s largest library with all the books on the floor’... Read More

  9. SSID Sniffer tool

    A tool called iSniff GPS is able to capture packets broadcasted by iPhones, iPads and other mobile devices as they connect to Wi-Fi networks and then queries the retrieved network names on to determine possible locations... Read More

  10. DNS configuration best practice

    Poorly configured DNS servers are being exploited in denial of service attacks against third-parties. Don't let your organization assets participate in such attacks! The REN-ISAC wants to raise awareness and drive change concerning common network and domain name system (DNS) configurations that fall short of accepted best practice. The REN-ISAC mission is to aid and promote cyber security operational protection... Read More

Featured Links