George Chetcuti’s Blog

Last Updated on 17 April 2014, Total: 480 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
149 General 17 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
141 News 4 April 2014
86 Products 7 April 2014
21 Security 15 April 2014
5 Troubleshooting 2 May 2012
14 Virtualization 6 March 2014
  1. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  2. What is Amazon’s Cloud Service Activate?

    AWS Activate is a package of resources for start-ups. It was designed to make it even easier for start-ups to get started and to quickly scale on AWS. It is an international program, with members from all over the world... Read More

  3. What is Passive DNS?

    Passive DNS or Passive DNS replication is a technique invented by Florian Weimer in 2004 where inter-server DNS messages are captured by sensors and forwarded to a collection point for analysis... Read More

  4. What kind of information does Microsoft provide to governments?

    Microsoft has several programs through which it disclose information regarding vulnerabilities, some of which have government participants... Read More

  5. What will Platform-as-a-Service (PaaS) look like in 2014?

    In 2014 PaaS has reached a new level of maturity, in 2013 PaaS was adopted by many organizations... Read More

  6. What's new in GFI MailArchiver 2013 R2?

    The latest release of GFI MailArchiver comes with calendar archiving and GFI FaxMaker integration... Read More

  7. What’s New in GFI MailEssentials 2014

    SpamTag , IP Blocklist AntiSpam plugin, Windows 8.1 / Windows Server 2012 R2 support, and Easy email management from an updated web-based dashboard are some of the new exciting features included in the latest edition of GFI’s MailEssentials... Read More

  8. When will you switch to Windows Server 2012?

    Windows Server 2012 has been released and many questions about the software have been answered. But there was still one question that was looming; when is the tech industry planning to integrate Windows Server into their network? To answer this question, Firebrand surveyed over a thousand Technology companies and created an Info-graphic to share the results: Read more here -... Read More

  9. Why Can My Devices Be Searched at the Border?

    The U.S. Constitution prevents the government from performing searches without a valid reason; the government generally can't snoop through your laptop for no reason. Electronic data stored on personal devices is a reflection of our lives - family photos, medical documents, banking information, details about what websites we visit, and so much more. But those privacy protections don't safeguard travelers... Read More

  10. Why Cloud Computing

    Learn the benefits of cloud computing and Amazon Web Services (AWS) from Amazon Sr. Vice President Andy Jassy in this video:... Read More

Featured Links