George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. HTTPS sessions can be hijacked!

    Security researchers discovered that even HTTPS encryption that is used for secure connections throughout the Internet can allow attackers to hijack web browser sessions that support SPDY or TLS compression. SPDY is an open networking protocol used by Google and Twitter. This security weakness can be exploited when web sessions are protected by SSL or TLS and are using one... Read More

  2. Handling Destructive Malware

    The US Computer Emergency Readiness Team (US-CERT) has published a security tip on how to handle destructive malware... Read More

  3. Handling malicious Internet route leaks – check list

    Anyone connecting to the Internet must have this contingency as part of their routing policy... Read More

  4. Happy SysAdmin Day!

    WindowsNetworking team wishes all the best to all system administrators out there... Read More

  5. Hardening Early Boot Components against Malware in Windows 8

    Windows 8, both client and server editions will provide additional security capabilities against malware. Specifically, Microsoft provides guidelines for anti-malware and other security solution developers to develop security solutions to protect early boot components from malware. For instance, the Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started... Read More

  6. HashiCorp Launches a Key and Secret Manager to Improve and Simplify Modern Enterprise Security

    Vault Takes a Novel Approach to Key and Secret Management by Dynamically Rotating Access Credentials... Read More

  7. Health Information at Serious Risk of Abuse

    Timothy Libert, a doctoral student at the University of Pennsylvania, demonstrates that data on online health information seeking is being collected by entities not subject to regulation oversight... Read More

  8. Heartbleed Extensions for Firefox & Chrome browsers

    The Heartbleed SSL vulnerability presents significant concerns for users and major challenges for site operators... Read More

  9. Help Desk as a Service

    For large corporations it may be justified to have a highly customized and expensive IT help desk system that maintains sophisticated change and release processes. It may include sophisticated identity and access controls, or develop "best practices" based on standards, such as the IT Infrastructure Library (ITIL) and all this aligned with the business objectives. It is assumed that the... Read More

  10. How Has Surface Changed?

    The latest 40 inch Samsung SUR40 for Microsoft Surface takes the touchscreen technology to new levels. The 40-inch touchscreen can feel 50 'touches' at once, including pens, pointers or anything else placed on the table unlike other devices that can only feel fingers. The new Full HD screen has a high-powered Windows PC built in, which features some exciting changes... Read More