George Chetcuti’s Blog

Last Updated on 19 Sept. 2014, Total: 549 Blog Posts

With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.

9 Command-line 10 Sept. 2013
152 General 23 June 2014
37 Implementation 10 July 2014
22 Monitoring 26 Aug. 2014
173 News 12 Sept. 2014
94 Products 28 Aug. 2014
41 Security 19 Sept. 2014
5 Troubleshooting 2 May 2012
16 Virtualization 23 June 2014
  1. Windows 7 Phone Banking Application

    Bank of America customers can now perform banking activities such as, finding ATMs, transferring funds, managing accounts, etc. from their Windows 7 phones if they own one! The application that runs on Windows 7 Phones was launched on Tuesday. The news was more than welcomed by Microsoft's phone users after months of waiting and which left them behind iPhone, Blackberry... Read More

  2. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

  3. Windows 8 Developer Preview

    Get a glimpse of Microsoft's new operating system by trying the pre-beta version of Windows 8 for developers. Though, it is nowhere near finished and should not be used in production environments, it would be quite interesting to know where Microsoft is heading with this new generation of Windows. You have the ability to try out both the touch-centric 'Metro'... Read More

  4. Windows 8 Refresh Points & System Recovery

    Both Refresh Points and System Recovery features in Windows 8 can be used to remove malicious and corrupted files. W. Kenneth Johnson has published some notes from his research about Windows 8 forensics and where you can find a good explanation about various artifacts related to these two features. Read more here - http://randomthoughtsofforensics.blogspot.co.uk/2012/05/windows-8-refresh-excerpt.html... Read More

  5. Windows 8 will install faster!

    According to Microsoft, Windows 8 will be easier to use and faster to install! Windows 8 has a revamped install process and will install in only 21 minutes on a clean system. Until we are able to verify such statements (second half of 2012) Microsoft will continue to improve reliability while also improving the installation experience and raw performance. PCs... Read More

  6. Windows 8.1 Preview FAQ

    Check out the frequently asked questions and get more information about Windows 8.1 Preview... Read More

  7. Windows ADK for Windows 8 Release Preview

    Download Windows Assessment and Deployment Kit (ADK) for Windows 8 Release Preview, and start some hands-on training how to best deploy a future roll-out of Windows 8 to end users' workstations. The Windows Assessment and Deployment Kit is a collection of tools that you can use to customize, assess, and deploy Windows operating systems to new computers. Windows Deployment is... Read More

  8. Windows Azure AD Rights Management tools

    Windows Azure AD Rights Management provides the ability to enable the use of digital rights management technology in organizations that subscribe to the Office 365 preview services. Office 365 Preview customers can enable rights management capabilities within the Preview versions of Exchange Online, SharePoint and Office. These downloads enable an administrator to manage Windows Azure AD rights management features and... Read More

  9. Windows Firewall Logs

    Troubleshooting network problems can be quite daunting at times and a recommended good practice when troubleshooting Windows Firewalls is to enable the native logs. If you need to verify whether a firewall rule is blocking or allowing traffic, you should enable logging, re-create the problem and then examine the log files. By default, Windows Firewall saves log entries in %SystemRoot%\System32\LogFiles\Firewall\Pfirewall.log... Read More

  10. Windows Live Family Safety 2011

    How many caring parents would like to have the appropriate tools to manage their kids' online activities! With MS Windows Live Family Safety 2011, parents can manage which websites their children are allowed to visit, which programs they can run and for how long they can use the computer. The product records the children online activity and has some cool... Read More

Featured Links