George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Online leave booking system for Microsoft Office and Office 365 users

    Appogee Leave for Office launched bringing online absence management to Microsoft customers... Read More

  2. Open DNS Issues

    An open DNS server is a DNS server that responds to recursive queries (queries for domains that the DNS server is not authoritative for), and does so for anyone (not just clients on your local network)... Read More

  3. Open and Free Internet – net neutrality

    No blocking, no throttling, no paid prioritization, more transparency. The Internet is perhaps the most open network in history, and we have to keep it that way... Read More

  4. Open-source network scanner

    ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet... Read More

  5. OpenBSD Project releases OpenSSH version 7.0

    OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions... Read More

  6. OpenSSL releases security fix for the alternative chains certificate forgery

    OpenSSL version 1.0.2d includes bug and security fixes... Read More

  7. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  8. Operation WOOLEN-GOLDFISH

    State-sponsored cyberwarfare is no different than physical battles or terrorist attacks in terms of scope and damage. The Rocket Kitten group used spear-phishing emails in order to penetrate their target systems... Read More

  9. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  10. Oracle releases patch for vulnerabilities in Java 7

    Oracle has issued an out-of-cycle patch for vulnerabilities in Java 7 that have been widely exploited to spread malware. This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A and Vulnerability Note VU#636312) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications... Read More

Featured Links