George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. The KEMP Free LoadMaster

    Free LoadMaster is a new free product from KEMP Technologies... Read More

  2. The Repadmin tool

    The Replication diagnostics tool is a command-line tool that enables you to report the status of replication on each domain controller. The tool is built into Windows Servers 2008 and Windows Servers 2008 R2 and the information retrieved by Repadmin.exe can help you identify potential problems related to replication within a forest. The detailed views allow you to even identify... Read More

  3. The Risks of SSL Inspection

    SSL and TLS do not provide the level of end-to-end security that users may expect... Read More

  4. The Wbadmin Command

    Windows Server 2008 has inbuilt functionality to perform reliable and effective data backups! The native tools can back up an entire volume to a .vhd file on a second local disk while you can still restore individual files from the vhd file! In cases of system volume failures where Windows does not start you can boot from the Windows installation... Read More

  5. The Web’s Shadiest Neighbourhoods

    Blue Coat Reveals the Web's Shadiest Neighborhoods... Read More

  6. The Windows Server 2008 scwcmd command

    The scwcmd command-line tool provides greater functionality than the GUI-based Security Configuration wizard. The tool allows you to remotely apply role-based security policy to groups of computers, analyze the configuration of groups of computers against the role-based security policy and build GPOs that apply the settings in the role-based security policy. Security policy allows you to enforce a baseline security... Read More

  7. The annual CERT Polska report

    Polish national CERT presents the most important trends and observations that shaped Polish cybersecurity in 2014... Read More

  8. The deployment of IoT devices is ahead of the technology necessary to protect them

    These devices are expected to bring a range of new security and risk challenges to the enterprise... Read More

  9. The desktop is not dead!

    According to a senior analyst at IDC, the main reason behind the laptop success sales figures is price. They are leading the market because they are simply much cheaper than they used to be, and the price gap has gone. However, the desktop remains the first choice for resource hungry applications, durability, scalability and security where thieves are less attracted... Read More

  10. The end of Symantec and Huawei Technologies joint venture!

    The deal that took off four years ago between Symantec and the Chinese company Huawei, to develop computer network security products came to an end as the US government effort to enhance cyber security is producing both direct and indirect benefits! Symantec is a global leader in security, storage and systems management solutions and Huawei is a leading global information... Read More

Featured Links