George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. CoroNet launches a solution to protect users on WiFi and Cellular Networks

    CoroNet’s Enterprise Offering Helps Carriers, MSSPs and Device Manufacturers to Protect their Customers from the Fastest-Growing Cyber Threat... Read More

  2. Cover your webcam when you're not using it

    Belgium's Federal Computer Crime Unit says it's "a good precaution" to tape up or cover your computer's webcam when you are not using it... Read More

  3. Crafty Malware

    Although, it's a recommended best practice to test and debug malware in an isolated and contained environment, this post by Marco Ramilli explains how crafty malware can eventually detect this environment and behave in a different way. Malware can detect virtualized environments, active debuggers and sandbox environments. Briefly, malware authors can easily insert code into their software that detects such... Read More

  4. Create and deliver presentations online

    Create stunning presentations with Zoho's Show 3.0. The tool has what it takes to create and deliver attractive presentations while there's no need to carry with you any removable media, you just need an Internet connection – deliver presentations on the go. You can import presentations from different formats such as, PPTX and collaborate with remote users modifying the same... Read More

  5. Creating an Office 365 Hybrid Deployment without a Lab Server

    Extract taken from September's MSExchange.org newsletter authored by Henrik Walther, MCM: Exchange Okay so there's quite a few of you that would like to test a migration from an on-premise Exchange environment to Office 365 in order to get some hands on experience prior to doing this as an administrator within your enterprise organization or maybe as a partner consultant... Read More

  6. Cross-VM RSA Key Recovery in a Public Cloud

    The cross-VM leakage is present in public clouds and can become a practical attack vector for both co-location detection and data theft... Read More

  7. CrowdStrike’s Global Threat Intelligence Report

    In 2014, it became abundantly clear that threat intelligence would provide the decisive advantage when protecting your network... Read More

  8. Customizing a Data Collector Set

    As we have seen in the previous post creating a customized Data Collector Set is pretty straight forward. Go here to read the post! In addition we have seen that the data sources defined were derived from a set template. In this post we are going to see how you can add your own data sources to a previously created... Read More

  9. Cyber Security Leader Invests in PassiveTotal Community

    RiskIQ Acquires PassiveTotal to Expand Portfolio of Threat Infrastructure Analysis Capabilities... Read More

  10. Cyber Security in the UK!

    According to Nick Hopkinson, the former head of GCHG and CESG, UK is lagging behind the US, Germany and France in its ability to respond to cyber-attacks. This is due to a "lack of cohesion" between the various organizations set up to work towards the national cyber security strategy. But according to UK's Cabinet Office one year after the Strategy... Read More