George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Amazon’s Cloud service new DNS Failover features

    Now Amazon is offering DNS failover also for web applications behind its Elastic Load Balancers (ELC) service which was impossible to configure few days ago!... Read More

  2. Amazon’s RDS supports MS SQL Server Database Engine Tuning Advisor

    The Amazon Relational Database Service for SQL Server now supports the Microsoft SQL Server Database Engine Tuning Advisor. The Advisor will help you to select and create an optimal set of indexes, indexed views, and partitions even if you don't have an expert-level understanding of the structure of your database or the internals of SQL Server. Read more here -... Read More

  3. Amazon’s Simple Email Service New Regions

    Amazon Simple Email Service (SES) allows you to send transactional emails, marketing emails, or any other high-quality messages to your customers... Read More

  4. Amazon’s cloud DNS failover new feature

    Amazon’s Route 53 new DNS Failover feature gives you high availability functionality without the need of deploying complicated and expensive solutions. You can monitor your website and automatically route your visitors to a backup site if it goes down... Read More

  5. Amount of idle time required before suspending a session

    Playing around with idle time settings for SMB sessions... Read More

  6. An Examination of the Cybersecurity Labor Mark

    The not-for-profit institution RAND carried out a study about the current status of the labor market for cybersecurity professionals... Read More

  7. An Open, Safe and Secure Cyberspace

    To safeguard access and openness, to respect and protect fundamental rights online and to maintain the reliability and interoperability of the Internet... Read More

  8. An overview of security articles in EU legislation

    A whitepaper published by the European network and Information Security Agency (ENISA) gives an overview of the legal aspects of cyber security in the European Union (EU). Although, the majority of data breaches do normally make it to the press but there are many breaches which remain either undetected or not reported. EU considers effective legislation is key here and... Read More

  9. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  10. Another APT Campaign discovered - OPERATION BEEBUS

    APTs focus on stealing personal/organizational sensitive information to achieve financial gain... Read More