George Chetcuti’s Blog

Last Updated on 5 Oct. 2015, Total: 731 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at

9 Command-line
167 General
46 Implementation
27 Monitoring
271 News
98 Products
91 Security
5 Troubleshooting
16 Virtualization
  1. Secret questions are insecure and easily forgotten

    Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google... Read More

  2. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

  3. Security Predictions 2015: New Challenges and Risk Mitigation Drive Changes to IT Security

    Netwrix shares top security trends that will drive information technology in 2015... Read More

  4. Security Professionals Nightmare

    Although, the virus Flame is no longer spreading and most of its command-and control servers discovered, it remains what security professionals have been terrified of - mimicking Microsoft's Windows update mechanism and spreading through it. Mikko Hypponen, chief research officer at F-Secure states that 'Having a Microsoft code signing certificate is the Holy Grail of malware writers. This has now... Read More

  5. Security implications of HDMI Ethernet Channel

    VGA is almost dead and with new PCs and laptops we get HDMI, but under the hood this brings many other capabilities than just displaying video. HDMI Ethernet Channel could circumvent corporate security in a number of ways, such as through the use of network-enabled display technologies and via HEC-enabled corporate laptops, but the technology is still largely unsupported. Often... Read More

  6. Security update causes problems on Windows 7 SP1 and Windows Server 2008 R2 SP1

    The KB 3004394 update that was dated December 10, 2014 can cause problems on computers that are running Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1... Read More

  7. Security updates available for Adobe Flash Player

    Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux... Read More

  8. Security updates for Adobe Flash & Shockwave Players

    Adobe recommends users update their software installations by following the instructions found in the respective Security Advisories... Read More

  9. Selection and Operation of Secondary DNS Servers

    There are always lessons to learn from major incidents. For instance, outages like the one that the global hosting provider GoDaddy has suffered yesterday should remind us of how best online resources are deployed! A must-read RFC about the selection and operation of secondary DNS servers defines the best practices to set up a secondary DNS server for your domain... Read More

  10. September Newsletters Teaser

    Some discussion points from,,, and August monthly newsletters... Read More

Featured Links