George Chetcuti’s Blog

Last Updated on 24 April 2014, Total: 483 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
149 General 17 April 2014
36 Implementation 15 Jan. 2014
19 Monitoring 10 March 2014
142 News 24 April 2014
86 Products 7 April 2014
22 Security 21 April 2014
5 Troubleshooting 2 May 2012
15 Virtualization 22 April 2014
  1. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  2. Weekly updates for MS Web-based Services

    Microsoft has been moving toward more frequent updates with other programs, including Windows... Read More

  3. What Is the Windows Server "8" Beta Remote Access Server Role?

    Windows Server 8 new remote Access Server role combines the previous DirectAccess and RRAS roles into one unified service role. The new role allows for centralized administration, configuration, and monitoring of both DirectAccess and VPN-based remote access services. Apart, from the various articles and tech tips available at windowsnetworking.com and virtualizationadmin.com you can learn more about Remote Access in Windows... Read More

  4. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  5. What is Amazon’s Cloud Service Activate?

    AWS Activate is a package of resources for start-ups. It was designed to make it even easier for start-ups to get started and to quickly scale on AWS. It is an international program, with members from all over the world... Read More

  6. What is Passive DNS?

    Passive DNS or Passive DNS replication is a technique invented by Florian Weimer in 2004 where inter-server DNS messages are captured by sensors and forwarded to a collection point for analysis... Read More

  7. What kind of information does Microsoft provide to governments?

    Microsoft has several programs through which it disclose information regarding vulnerabilities, some of which have government participants... Read More

  8. What will Platform-as-a-Service (PaaS) look like in 2014?

    In 2014 PaaS has reached a new level of maturity, in 2013 PaaS was adopted by many organizations... Read More

  9. What's new in GFI MailArchiver 2013 R2?

    The latest release of GFI MailArchiver comes with calendar archiving and GFI FaxMaker integration... Read More

  10. What’s New in GFI MailEssentials 2014

    SpamTag , IP Blocklist AntiSpam plugin, Windows 8.1 / Windows Server 2012 R2 support, and Easy email management from an updated web-based dashboard are some of the new exciting features included in the latest edition of GFI’s MailEssentials... Read More

Featured Links