Last Updated on 5 May 2016, Total: 769 Blog Posts
With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.
| 9 | Command-line |
| 168 | General |
| 46 | Implementation |
| 27 | Monitoring |
| 299 | News |
| 99 | Products |
| 99 | Security |
| 5 | Troubleshooting |
| 16 | Virtualization |
There are certain times when organizations decide not to deploy a software update solution and use Windows native functionality – Microsoft Update, as their main solution. This may be the best approach when organizations have dispersed offices around the globe with a small number of standalone computers. It is simpler to enable automatic updates on these clients' computers rather than... Read More
Performance Monitor is a great tool for identifying performance bottlenecks! You can identify the source of performance problems that make your system performs slow or sometimes completely unusable. Performance Monitor is best suited when you are collecting performance statistics over a period of time such as, when users on regular basis report system degradation at specific times. You can set... Read More
I rarely come across systems administrators that use Windows reliability monitor when troubleshooting server or client platforms! I guess we either completely forget about this tool or the issue at hand is so critical that the tool is unavailable or even inadequate. However, I do recommend administrators to become acquainted with Reliability Monitor and leverage the power of its graphical... Read More
If you are a small organization with limited IT resources and budget, then it is worth giving Windows Small Business Server 2011 a try! SBS 2011 is designed and priced for small businesses with up to 75 users. It's an all-in-one solution which has been updated to the most current Windows 2008 R2 server technology. It includes a new and... Read More
DNS implementations in Windows Server 2008 environments can have four types of deployments. The most productive is the dynamic DNS server which is integrated with every DC in the network. Read-write DCs will also contain read-write DNS servers. In remote sites where a DC may be present for availability purposes, read-only DCs will also include read-only DNS servers. External networks... Read More
Windows Server 2008 and Windows 7 include tools that help you manage printers from the command prompt using Visual Basic scripts. You can find these scripts in the Windows\System32\Printing_Admin_Scripts\en-US\ folder. Since these tools are Visual Basic scripts you need to run the cscript command and pass the full path to the script file as the first parameter. Additional parameters can... Read More
Windows Server 2008 R2 and Windows 7 Service Pack 1 provides further improvements and hardens these Operating Systems. Although, SP1 includes previous updates which many organizations and users have deployed through Windows Update, Windows Server Update Services (WSUS) or third-party patch management systems, it is quite often the practice to use a Service Pack as a baseline. That is, having... Read More
This Microsoft Test Lab Guide (TLG) provides step-by-step instructions to create the Windows Server 2012 Base Configuration test lab, using computers running Windows Server 2012 and Windows 8. For a test lab based on physical computers, you can image the drives for future test labs. For a test lab based on virtual machines, you can create snapshots of the base... Read More
Managing outbound traffic has become very crucial in determining computer infections. Malware infects computers and then tries to send out stolen data to perpetrators. Viruses seek to replicate themselves by attempting to send packets to infect other computers. Users might use unapproved applications which may result in the transmission of confidential data. Therefore, it is appropriate to review your Windows... Read More