George Chetcuti’s Blog

Last Updated on 24 April 2015, Total: 645 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
160 General
40 Implementation
24 Monitoring
226 News
95 Products
69 Security
5 Troubleshooting
16 Virtualization
  1. The ‘Masquerade’ Behind ACTA

    The appointed rapporteur for ACTA in the European Parliament resigns and explains the situation, Mr. Kader Arif says: "I want to denounce in the strongest possible manner the entire process that led to the signature of this agreement: no inclusion of civil society organizations, a lack of transparency from the start of the negotiations, repeated postponing of the signature of... Read More

  2. Therapy for Health Care System’s Information Security

    Netwrix outlines top tips that will help health care providers protect sensitive data from being compromised... Read More

  3. There is Too Much Cooling in Data Centers

    According to an assistant professor of computer science at the University of Toronto Scarborough, server environments can easily operate at warmer temperatures thus saving costs on air conditioning without endangering the health and performance of the hardware. Read more here – http://www.tomsitpro.com/articles/datacente-cooling-science_research-UTSC,1-549.html... Read More

  4. Threat Landscape report for 2013

    The European Union Agency for Network and Information Security (ENISA) has issued its annual Threat Landscape 2013 report... Read More

  5. Top-secret base revealed on Apple Maps

    'A top-secret base in Taiwan, revealed on Apple Maps. The Navy SEALs' rehearsal site for the Osama bin Laden raid, found on Bing. Once again, commercial satellites have snapped images of things that governments would rather hide from public view. And once again, those governments are finding that there's not much they can do once this sensitive imagery ends up... Read More

  6. Track Privileged Identities!

    If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More

  7. Tracking the FREAK Attack

    Make sure you have the most recent version of your browser installed, and check for updates frequently. Updates that fix the FREAK attack should be available for all major browsers soon... Read More

  8. TransVault Compliance TimeMachine

    TransVault Creates Compliance TimeMachine for Email Records Moved into Office 365... Read More

  9. Trial run Windows Azure

    Are you an MSDN subscriber? I can imagine that most of you somehow are connected to MSDN and enjoy the benefits it offers, however, Microsoft are now offering free compute hours on their Windows Azure infrastructure if you are an MSDN Premium or Ultimate subscriber. Check with your manager or superiors your subscription level and take advantage of this offer... Read More

  10. Troubleshooting DNS using NMCap

    Network Monitor is a free tool available from Microsoft. You can capture data using either the graphical Network Monitor or the command-line NMCap tool. Analysis of the captured data must be done through the graphical interface. As network traffic is in abundance especially on busy servers, you would need to use filters to reduce the number of packets collected and... Read More

Featured Links