George Chetcuti’s Blog

Last Updated on 19 Dec. 2014, Total: 589 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
154 General 27 Nov. 2014
40 Implementation 4 Dec. 2014
23 Monitoring 16 Oct. 2014
192 News 19 Dec. 2014
94 Products 28 Aug. 2014
56 Security 16 Dec. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Vulnerability in Microsoft graphics component could allow remote code execution

    Microsoft is aware of a vulnerability in previous versions of Office that is actively exploited in targeted attacks using crafted Word documents sent by email. The vulnerability will not affect Office 2013 but will affect older versions such as Office 2003 and 2007... Read More

  2. Want to be part of the Machine Learning team at Amazon?

    Amazon will be organizing a recruitment event in Berlin to get on board engineers experienced in distributed systems and storage development for building Machine Learning services and tools. The Machine Learning team at Amazon is comprised of technical leaders who develop planet-scale platforms for machine learning on the cloud, assist the benchmarking and future development of existing machine learning applications... Read More

  3. Watch the top 5 IT governance, risk and compliance webinars in 2013 from BrightTALK

    Top 5 IT GRC webinars from 2013 based on the number of viewings and feedback from BrightTALK’s audience... Read More

  4. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  5. Webinar - Scalable Database Architectures

    Scalable Database Architectures Webinar... Read More

  6. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  7. Webinar - The TCO of Windows-to-Go Secure Workplace: Enabling Contractors and Teleworkers

    An interactive webinar that will help you understand what a Mobile Workspace employing Windows-to-Go can and cannot do for you... Read More

  8. Webinar - Unlocking IT with Big Data

    HP Software Web Event - Driving the New Style of IT... Read More

  9. Webmin contains a cross-site scripting vulnerability

    Webmin 1.670, and possibly earlier versions, contains a cross-site scripting vulnerability... Read More

  10. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

Featured Links