George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Can we trust the Chinese with our critical data infrastructure?

    The Chinese world leader in fourth generation communication networks, known as 4G, sets its eye on the U.S market. This latest technology is used for high volumes of phone calls, data, and high definition video. Its innovative low cost systems have already captured markets in Africa, Latin America and Europe. Many U.S. congressional leaders and others see this move as... Read More

  2. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  3. Career Development

    For those IT Professionals who would like to plan their future career based on a job role rather than technology or platform, I suggest Microsoft's Professional Career Chart. The chart is structured around the different roles we find in IT operations, management and software development based on Microsoft technologies. For example, an application developer can match his current job description,... Read More

  4. Cellphones That Can See Through Walls

    Researchers at the University of Texas in Dallas have designed an imager chip that could turn mobile phones into devices that can see through walls, wood, plastics, paper and other objects. The team's research linked two scientific advances. One involves tapping into an unused range in the electromagnetic spectrum. The other is a new microchip technology. Read more here -... Read More

  5. Check your DNS Servers configuration!

    More DNS administrators need to understand the security risks implications related to Open DNS Resolvers... Read More

  6. Chkdsk Performance on Windows Server 2008 R2

    When a volume on Windows Servers is found to be corrupted, NTFS schedules a Chkdsk operation for the next reboot. This is done by invoking Autochk.exe during startup. From personal experience you can tell that reboots occur for many reasons such as, in the event of Windows updates and an inadvertent delay is caused if an Autochk is scheduled. Although,... Read More

  7. Choosing a VDI solution?

    Citrix claims 4 reasons to go beyond VMware View using Citrix XenDesktop... Read More

  8. Cisco IOS XR Software Route Processor Denial of Service Vulnerability

    Customers that are running version 4.2.1 or later of Cisco IOS XR Software, or that have previously installed the Software Maintenance Upgrades (SMU) for Cisco bug ID CSCtz62593 are not affected by this vulnerability... Read More

  9. Cisco TelePresence VX Clinical Assistant Administrative Password Reset Vulnerability

    Cisco has released free software updates that address this vulnerability... Read More

  10. Cisco’s reply about Connect Cloud policies

    Cisco apologizes for the inconvenience caused after a new software platform for its Linksys Wi-Fi routers was released. It also explains the objectives of the platform and clarifies its Connect Cloud policies and terms of service after several days of complaints received by its customers. In a blog post, Brett Wingo states "We also wanted to clear up any confusion... Read More