George Chetcuti’s Blog

Last Updated on 5 May 2016, Total: 769 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line
168 General
46 Implementation
27 Monitoring
299 News
99 Products
99 Security
5 Troubleshooting
16 Virtualization
  1. Firefox browsers block vulnerable Flash Player Plugin

    Flash Player Plugin 18.0.0.203 (click-to-play) has been blocked for your protection... Read More

  2. ManageEngine ADSelfService Plus Empowers Mobile Workforce with Cached Credentials Management

    Local Cached Passwords Automatically Updated When Remote Users Reset Their Active Directory Passwords... Read More

  3. LANDESK and WinMagic Partner to Provide Enterprise-Grade Encryption Software

    LANDESK One Partnership Brings WinMagic’s Encryption and Intelligent Key Management Solution, SecureDoc, to LANDESK Customers... Read More

  4. July Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  5. OpenSSL releases security fix for the alternative chains certificate forgery

    OpenSSL version 1.0.2d includes bug and security fixes... Read More

  6. Lepide Software Launches First Mobile App

    IT managers will now be able to keep track of critical changes to IT infrastructure while on the go – anytime, anywhere... Read More

  7. Mozilla increases rewards given to researchers

    Changes to the Firefox Bug Bounty Program... Read More

  8. Stop Firefox leaking data about you

    Disabling Google Safe Browsing exposes you to a risk of not being stopped from visiting malicious or phishing sites... Read More

  9. SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SM

    A vulnerability in the remote support functionality of Cisco WSAv, Cisco ESAv, and Cisco SMAv Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user... Read More

  10. Last chance to win a Pluralsight Annual Plus subscription!

    Until the end of June 2015 we will be conducting a site survey to help us learn more about our visitors and what you'd like to see on the site in the future... Read More