George Chetcuti’s Blog

Last Updated on 1 Sept. 2015, Total: 714 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
167 General
43 Implementation
27 Monitoring
263 News
98 Products
85 Security
5 Troubleshooting
16 Virtualization
  1. New Payments Module in Zoho Creator

    Last month Zoho Corp. has released a Payment Module for its online Creator platform. Zoho Creator is an intuitive and feature-rich online platform that allows non-programmers to build custom database applications. Customers can build online applications based on business rules within minutes. With the Payments Module users can now build a wide range of online order forms and accept payments... Read More

  2. New email filtering service for Exchange Online

    Microsoft's technical product manager for the Office 365 team writes about the new defense mechanism for Exchange Online which protects email services against advanced and sophisticated attacks... Read More

  3. New features in Panda Security Managed service include a malware disinfection service

    The major new features in Adaptive Defense 1.5 include the malware disinfection service, and the ability to view the status of endpoints in real-time and manage the settings from a single Web console... Read More

  4. News from Intel Security McAfee Knowledge Center

    Useful commands when troubleshooting DAS issues with McAfee SIEM Enterprise Security Manager and Event Receiver... Read More

  5. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  6. Nintex and Sharegate Announce Partnership to Move Customers to Office 365

    Tools enable customers to efficiently migrate to hybrid and cloud environments... Read More

  7. No botnet required for low-tech theft

    Pay attention where you leave your security blueprints as these may end up stolen at some train station! Actually, this has happened to a French defence contractor who was carrying blueprints of a drone aircraft being developed jointly by France and United Kingdom. No informatics strategies or high-tech tools were used in this incident! Read the full story here -... Read More

  8. November Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  9. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

  10. October Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

Featured Links