George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. New email filtering service for Exchange Online

    Microsoft's technical product manager for the Office 365 team writes about the new defense mechanism for Exchange Online which protects email services against advanced and sophisticated attacks... Read More

  2. New features in Panda Security Managed service include a malware disinfection service

    The major new features in Adaptive Defense 1.5 include the malware disinfection service, and the ability to view the status of endpoints in real-time and manage the settings from a single Web console... Read More

  3. News from Intel Security McAfee Knowledge Center

    Useful commands when troubleshooting DAS issues with McAfee SIEM Enterprise Security Manager and Event Receiver... Read More

  4. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  5. Nintex and Sharegate Announce Partnership to Move Customers to Office 365

    Tools enable customers to efficiently migrate to hybrid and cloud environments... Read More

  6. No botnet required for low-tech theft

    Pay attention where you leave your security blueprints as these may end up stolen at some train station! Actually, this has happened to a French defence contractor who was carrying blueprints of a drone aircraft being developed jointly by France and United Kingdom. No informatics strategies or high-tech tools were used in this incident! Read the full story here -... Read More

  7. November Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  8. November Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  9. OWA Webmail Server Attack

    A New Persistent Attack Methodology Targeting Microsoft Outlook Web Application (OWA)... Read More

  10. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

Featured Links