George Chetcuti’s Blog

Last Updated on 12 April 2016, Total: 768 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
298 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Pipemetrics taps into the emerging market trend for higher quality Windows software

    A growing number of users expect more from their Windows... Read More

  2. Police Ransomware Threat Assessment

    The European Cybercrime Centre at Europol publishes its Threat Assessment on Police Ransomware – a class of computer malware that has seen exponential growth in the European Union (EU) over the last two years... Read More

  3. Power Grids threatened by Cyber Attacks

    According to reports by McAfee, one in four of the world's power companies had suffered extortion from criminals who had gained access to their system's utilities. Two weeks ago a German power utility admits that it suffered a DDoS attack that blocked the company's Internet communications for several hours. This is the first confirmed Cyber-attack against a European grid operator... Read More

  4. Predicting Long-Term Human Mobility

    Where are you going to be 285 days from now at 2PM?... Read More

  5. Preventing High Cost Security Breaches

    Join Brien Posey, Microsoft MVP, tomorrow, February 25th, at 12N EST | 11am CST | 9am PST | 5pm GMT for a discussion of the increasing trend of data breaches and real-life lessons learned by organizations, including recent examples such as the Anthem breach... Read More

  6. Preventing insider attacks

    A Trend Micro’s Security Intelligence blog post groups prevention and mitigation techniques against insider attacks into two categories: technical and non-technical... Read More

  7. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

  8. Productivity Future Prediction by Microsoft

    A very reasonably view of the future technology is presented by Microsoft's Office Labs where the overall concept integrates information flow, gadgets and everyday surrounding objects seamlessly together. Glass walls turn into huge displays and tables into tablets! Plausible sci-fi as some of the technology shown in these videos already exists; some has reached the level of prototypes while, some... Read More

  9. Q&A With Sanbolic CEO Momchil "Memo" Michailov

    Momchil V. Michailov, CEO of Sanbolic discusses next-generation storage technologies in view of the new virtualized enterprises... Read More

  10. Q&A with Unitrends CEO

    Unitrends CEO Uses Army Intelligence to Win the Backup War - In this brief Q&A, we will see how Mike Coney, Unitrends’ CEO used his vast experience with the U.S. Army Intelligence Agency and the industry to turn Unitrends from a lackluster vendor of backup and recovery solutions to one of the fastest growing companies in the market... Read More

Featured Links