George Chetcuti’s Blog

Last Updated on 21 Nov. 2014, Total: 575 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
153 General 13 Nov. 2014
39 Implementation 21 Nov. 2014
23 Monitoring 16 Oct. 2014
187 News 20 Nov. 2014
94 Products 28 Aug. 2014
49 Security 14 Nov. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  2. Webinar - Scalable Database Architectures

    Scalable Database Architectures Webinar... Read More

  3. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  4. Webinar - The TCO of Windows-to-Go Secure Workplace: Enabling Contractors and Teleworkers

    An interactive webinar that will help you understand what a Mobile Workspace employing Windows-to-Go can and cannot do for you... Read More

  5. Webinar - Unlocking IT with Big Data

    HP Software Web Event - Driving the New Style of IT... Read More

  6. Webmin contains a cross-site scripting vulnerability

    Webmin 1.670, and possibly earlier versions, contains a cross-site scripting vulnerability... Read More

  7. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  8. Weekly updates for MS Web-based Services

    Microsoft has been moving toward more frequent updates with other programs, including Windows... Read More

  9. What Is the Windows Server "8" Beta Remote Access Server Role?

    Windows Server 8 new remote Access Server role combines the previous DirectAccess and RRAS roles into one unified service role. The new role allows for centralized administration, configuration, and monitoring of both DirectAccess and VPN-based remote access services. Apart, from the various articles and tech tips available at windowsnetworking.com and virtualizationadmin.com you can learn more about Remote Access in Windows... Read More

  10. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

Featured Links