George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Are you the Tech Expert in your country?

    Join Microsoft's summer competition and become the next Technical Expert. Learn for free and gain as many points as possible while completing a number of courses. The participant with the highest number of points gained within the selected tracks will be the winner of the month! The process to participate is very simply - Register on Microsoft Virtual Academy, learn... Read More

  2. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  3. Attack Surface Analyzer 1.0 Released

    The beta version of Microsoft's Attack Surface Analyzer is now replaced with version 1. Microsoft's SDL team releases version 1.0 of the tool as a continuation of its effort to provide tools that hardened the stability and security of Windows environments. The tool helps software developers, Independent Software Vendors (ISVs) and IT Professionals understand changes in Windows systems' attack surface... Read More

  4. Audit plug-in for MySQL databases by McAfee

    McAfee, a leader in security solutions for systems, networks and mobile devices has released a free open-source audit plug-in for MySQL databases. The plug-in allows users to capture detailed activity of MySQL databases which will help organizations comply with database audit requirements. According to Dan Sarel, the vice president of Database Security Product Management at McAfee "McAfee developed the free... Read More

  5. August Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  6. August Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com August monthly newsletters... Read More

  7. August Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  8. Authentication Vulnerability in Microsoft Yammer Social Network

    Yammer is a secure, private social network for private communication within organizations or between organizational members and pre-designated groups... Read More

  9. Automate application management in the Cloud

    Amazon’s AWS cloud computing allows you to manage your cloud applications using a single service known as OpsWorks, which includes configuration management, application deployment, monitoring, and access control. The service allows you to implement any type of application independent of any particular architectural pattern. It was designed to simplify the process of managing the application life cycle without imposing arbitrary... Read More

  10. Automate the creation of user accounts

    Are you still creating users’ accounts manually? I suggest you start teaching yourself how to automate the creation of user accounts in Windows environments. A sample script prepared by Joseph Moody at windows7library.com/blog will give you a head start. These are the steps you need to take to become more efficient and pro on your job!... Read More

Featured Links