Last Updated on 5 May 2016, Total: 769 Blog Posts
With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.
| 9 | Command-line |
| 168 | General |
| 46 | Implementation |
| 27 | Monitoring |
| 299 | News |
| 99 | Products |
| 99 | Security |
| 5 | Troubleshooting |
| 16 | Virtualization |
If you are a Visual Studio 2010 inexperienced user and need some help, then I suggest you download the following training kit from Microsoft. The Visual Studio 2010 and .NET Framework 4 Training Kit The training kit includes demos, presentations and hands-on labs that help you leverage the various features found in this development tool. Visual Studio 2010 is a... Read More
Microsoft is aware of a vulnerability in previous versions of Office that is actively exploited in targeted attacks using crafted Word documents sent by email. The vulnerability will not affect Office 2013 but will affect older versions such as Office 2003 and 2007... Read More
Amazon will be organizing a recruitment event in Berlin to get on board engineers experienced in distributed systems and storage development for building Machine Learning services and tools. The Machine Learning team at Amazon is comprised of technical leaders who develop planet-scale platforms for machine learning on the cloud, assist the benchmarking and future development of existing machine learning applications... Read More
The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More