Last Updated on 5 May 2016, Total: 769 Blog Posts
With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.
| 9 | Command-line |
| 168 | General |
| 46 | Implementation |
| 27 | Monitoring |
| 299 | News |
| 99 | Products |
| 99 | Security |
| 5 | Troubleshooting |
| 16 | Virtualization |
During any NAP (Network Access Protection) deployment, it is important to have a record of events in particular during the initial stages. During initial stages you will be gathering information about computers and their compliancy levels. Through the NAP logs you identify which computers are non-compliant and can take the necessary actions before going for NAP enforcement. Additionally, you would... Read More
NASA's Jet Propulsion Laboratory (JPL) uses Amazon Simple Workflow Service (SWF) as an integral part of several missions including the Mars Exploration Rover (MER) and Carbon in the Arctic Reservoir Vulnerability Experiment (CARVE). These missions continuously generate large volumes of data that must be processed, analyzed, and stored efficiently and reliably. Read more - http://aws.amazon.com/swf/testimonials/swfnasa/... Read More
The National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent of its system administrators to reduce the number of people with access to secret information... Read More
Tenable Network Security has released version 5.0 of its vulnerability and configuration assessment product Nessus. Tenable Network Security is a major provider of Unified Security Monitoring tools, including Nessus, the well-known vulnerability scanner. Version 5 includes new plugin features, customized reporting with multiple filters and new report formats, new severity levels and much more. Read about the new features here... Read More
The simplest way to share folders is through Windows Explorer and in almost every environment this is a common practice, however, Server core installations are getting more popular in virtualized environments. In case, you need to upload some files to a server core installation, the net share command may save your day! To view any existing shares on your machine... Read More
OneClick version of Network Monitor is a quick solution that allows you to capture network traffic from a Windows computer without the need of installing the complete Network Monitor package. Still, you need Network Monitor installed on a separate computer in order to able to analyze the saved data. This tool is useful for customer support scenarios. The two One... Read More