George Chetcuti’s Blog

Last Updated on 24 Nov. 2015, Total: 754 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at

9 Command-line
168 General
46 Implementation
27 Monitoring
286 News
99 Products
97 Security
5 Troubleshooting
16 Virtualization
  1. Register for free training - Windows Server 2012: First Look

    Learn how to cloud optimize your IT with Windows Server 2012 and how to take advantage of the skills and investment you have already made in building a familiar and consistent platform. With Windows Server 2012, you gain all the Microsoft experience behind building and operating private and public clouds, delivered as a dynamic, available, and cost-effective server platform. This... Read More

  2. Remote Support and Monitoring

    The GoToManage tool is a service that allows IT support staff manage IT resources remotely. The tool by Citrix Online is now available in three languages. Localized versions of GoToManage helps international organizations with geographically dispersed branches consolidate remote management services using one tool. The tool allows you to connect to unattended computers and servers, provide remote support services to... Read More

  3. Research IT as a Service

    I would like to share with you a couple of points taken from Ian Foster's presentation about the future of research computing and the current trend of moving the administrative load to the cloud. While, the big science projects are the ones that most often get the required funds and resources, the small to medium projects on the other hand... Read More

  4. Resolving Your PST Nightmares Once and for All!

    Join Microsoft MVP, J. Peter Bruzzese, and Sherpa Solutions Architect, Rick Wilson, on Thursday, November 14th, at1pm EST to explore the regulatory and operational challenges associated with managing PST files and gain insights into getting control of your organization's data once and for all... Read More

  5. RetroFit and Unitrends Keep Zenith Customers in Business with Rapid Replacement Program

    Managed Services Company and Data Protection Leader Ease Zenith Customers' Fears of Data Loss as October 15 Deadline Looms... Read More

  6. Rights Protected Folder Explorer

    Rights Protected Folder Explorer is a Windows based application that allows you to work with Rights Protected Folders. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder. It works with Active Directory Rights Management... Read More

  7. RightsWATCH is available in the Microsoft Azure Marketplace

    Watchful Software’s RightsWATCH Achieves Certification for Immediate Availability in the Microsoft Azure Marketplace... Read More

  8. Routers default passwords online database provides quick access for technicians to default passwords used on routers, default web logins, CCTV systems and other electronic devices... Read More

  9. Run Android Apps on Windows 7

    BlueStacks has just released a software player (BlueStacks App Player) that allows Windows 7 users to run Android apps within the Windows environment. It is available for free and has some pre-loaded apps. You may encounter some problems installing it on older netbooks or tablets but it should perfectly install and run on any decent x86 Windows system. In addition,... Read More

  10. SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SM

    A vulnerability in the remote support functionality of Cisco WSAv, Cisco ESAv, and Cisco SMAv Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user... Read More

Featured Links