Search our website

Search Results for "Computer"
as of 05/27/2019 07:54

Computer Security Auditing Services

Defcon-5 can perform an audit on the computers present at your organization to find viruses, vulnerabilities, and other security related issues

Malware Removal Services

Defcon-5 can remove various types of malware from your computers and network, such as spyware, viruses, and worms.

Preventing Spyware

Learn about spyware, stopping spyware, and how to remove spyware once it is on your computer.

Building your own computer system Part 1 - What you need

Building a computer yourself is pretty easy, however for a first time you should start by following someone else's example if possible.

Computer Repair Services

Security, Computer, Repair, Physical, Analysis, Consultant, Computer Security, Corporate, Personal, Small, Business, Service, Information, Defcon, Defcon-5, CyberSecurity

Service Pricing

You will find that Defcon-5 offers highly competetive pricing for security solutions.

svchost.exe uses high amounts of processing time


Adobe activation is ridiculous, and a failure

Adobe has managed time and time again to tick me off with software activations

Extending the life of your monitor

What is the best way to extend the life of a computer screen

Protect your system from a random sudden death!

Ever worry about one day going to turn your computer on, and it just does'nt turn on. It can happen, but there is a way to help prevent it.

Apple is becoming more like old school Microsoft every day.

Microsoft might be learning the good things from Apple, but Apple seems to be only learning only the bad things from Microsoft.

Unable to print to HP Deskjet F4280 through the network


No Video on computer startup


Operating System Hardening Service

Defcon-5 can perform an analysis on your servers to identify potential vulnerabilities that are often missed, and should be corrected to maximize the security of your infrastructure.

Building your own computer system Part 3 - Finishing the Build

Now that all your computer components are combined you now have Voltron! Defender of the universe... or just a computer that needs to be started up, one or the other.

What to look for in purchasing a used computer

Keep an eye out for the following issues when you guy a used computer from someone, even a PC dealer.

Cleaning your desktop computer

A simple video on cleaning out dust and dirt from your desktop

New Trend Micro Internet Security 2010

The latest version of Trend Micro Internet Security has been released, so it's time for me to give an updated review and opinion on it.

Fraudulent Computer Repair Shops

A little bit of information about Fraudulent computer repair shops

Programmer and Developer Services

Defcon-5 can perform an analysis on your application code to find vulnerabilities (such as SQL injection) that you did not know existed, allowing you to have a greater return on investment than ever before.

Unable to browse or connect to the internet


Network Hardening Service

Defcon-5 can perform an analysis on your network to identify unsecured wireless access points, un-patched devices, and weaknesses in the security design. In addition to correcting them to maximize the security of your company.

Specific Services

Defcon-5 offers numerous security services to individuals, and businesses to increase the security of their computer systems, and their physical infrastructure.

Wireless Security Services

Defcon-5 can lock down your wireless networks and access points to prevent unauthorized entry by hackers passing by.

Personal/Family Service

Learn about the various security services that Defcon-5 offers to individuals, and families.

Network Hardening Service

Defcon-5 can perform an analysis on your network to identify unsecured wireless access points, un-patched devices, and weaknesses in the security design. In addition to correcting them to maximize the security of your company.

Screen saver does not work


Task Manager has been disabled by the administrator


Confidentiality Agreement

Our Confidentiality Agreement

About Us

Learn about who Defcon-5 is and what we do

Protect Yourself

Defcon-5 helps the public and the security community better understand the threats that face them everyday.

Diagnosing intermitent problems

The ultimate tech challenge, the breaker of souls, and remover of hair... Also known as intermitant issues

Building your own computer system Part 2 - Installing components

After getting all your parts together we can now we can get to the fun part! Assembling your computer one step at a time.

Creating an Ultimate boot CD for Windows

If you are serious about removing a virus from your computer these days, you need to have some serious tools.

How to test a desktop computer power supply

There are several ways in which you can test a desktop computer power supply

Video: Downgrading from Vista to XP

Step by step how to remove Windows Vista, and install Windows XP.

How to use compressed air safely

Using compressed air in a safe and cost effective method on computer equipment.

NOC Episode Can your computer run Windows Vista

Several folks have asked about upgrading their computer to run Windows Vista

Geek squad or do whatever the cd says squad?

During the course of running a small computer repair shop you always get unhappy Geek Squad customers.

Liquid cooling systems are not ready for home use

The average home computer user just can't maintain a Liquid cooling system.

Stop being cheap and give me my restore CD

Why are system builders being cheap skates and not providing restore disks with new systems.

How to increase your Website popularity in local searches

Increase the popularity of your website in local searches

Downloads

Defcon-5 Often writes useful tools and utilities to help with day to day jobs

Keep your software up to date

I wish I could stress this even more, keep your software up to date and prevent issues.

Does your system have a virus, or something else?

Poor performance of your computer could be due to a virus, or something worse.

Doc: Adobe Tech Support

Another classic case of poor product and tech support

You receive Stop error 0x0000007E after installing service pack 3 on Windows XP


Unknown bluetooth device


svchost.exe uses 100% cpu when an HP printer is installed


Adobe Photoshop CS2 always requires activation for Windows Vista


Mac OS X starts up to a blue screen.


Printing PDF Files cause Print spooler to crash with HP Laserjet 1020


Unable to remove missing dynamic disk in Windows 2000


Unable to install SQL Server 2008 or SQL 2008 SP a restart is required


Google Chrome OS Beta Review

Google has released Chrome OS in beta form for developer preview and testing. I have managed to get ahold of a copy in virtual machine disk format to review.

Remote Support

Defcon-5 Offers remote support options over the internet, this page is a guide to help you understand what our technicians require.

Services

Defcon-5 offers numerous security services to individuals, and businesses to increase the security of their computer systems, and their physical infrastructure.

Security Policy Services

Defcon-5 can perform an analysis on your security policies to make sure that they are up to date, and provide you and your customers with the maximum benefit.

Small Business Services

Learn about the various security services that Decon-5 offers to small, and new businesses.

Physical Security Audit Services

Defcon-5 can perform an audit on your physical security to find flaws that could result in the theft or loss of critical business information.

Security Policy Services

Defcon-5 can perform an analysis on your security policies to make sure that they are up to date, and provide you and your customers with the maximum benefit.

Social Engineering Prevention Services

Defcon-5 can perform an analysis on your company policies to identify social engineering risks, and recommendations to prevent those risks.

Custom Built Computers

Have a computer custom built for you and your needs

Unable to Install USB HP printer


Corporate/Large Business Service

Learn about the various security services Defcon-5 offers to large businesses, and corporations.

Unable to acquire an IP address from a DHCP Server


Trend Micro Internet Security 2008 Freezes After start up.


Systems may not run login scripts from an active directory


Web Hardening Service

Defcon-5 can perform an analysis on your website and webserver to identify potential vulnerabilities that are often missed on websites, and webservers.

Internet Hardening Service

Defcon-5 can perform an analysis on your internet connection to identify security weaknesses. In addition to correcting them to maximize the security of your company.

Internet Hardening Services

Defcon-5 can perform an analysis on your internet connection to identify security weaknesses. In addition to correcting them to maximize the security of your company.

Unable to change home page in internet explorer


0xc000000e Missing or corrupt winload.exe


Unable to login to Remote Web Workplace


Task Scheduler eerror - 0x80090016: Keyset does not exist


.Trashes folder exists on external drive


Server Hardening Service

Defcon-5 can perform an analysis on your servers to identify potential vulnerabilities that are often missed, and should be corrected to maximize the security of your infrastructure.

You receive popup ads while Browsing the internet.


Unable to connect to the internet on Windows Vista


Doc: Adding printers on a Macintosh should be easier

Installing printers on a Macintosh should be easier than this.

Contact Us

Our contact page provides you with all the various forms of contact that we have, and provides you the methods needed to contact us.

Web Designer - Job Listing

Job listing for Web designer position

Phishing Attacks

Learn about phishing attacks, what they are and how to spot them.

Quick Tips and Tricks

Find out about some quick tips and tricks that you might not know about on your computer.

Does running at a higher resolution make your computer faster?

An odd question, but does your screen resolution impact performance of your computer?

Obvious fake anti virus is obvious!

If you suddenly got a message saying your system is infected, do you know if it's the real deal or a fake?

Twitter DDoS attack more complex than you think

Today's denial of service attack on Twitter was a bit more than just twitter in the crosshairs

Just exactly why do celeron and sempron processors run so slow

Do you know why your celeron or sempron powered system runs so slow?

NOC Episode The Awesome Gizmo

Want to make free computer to computer calls, try Gizmo

Video Episode 6 Cam Twist

A brief run through of cam twist and what it can do

Cleaning your keyboard

Simple yet effective method for cleaning your keyboard

Palm Pre Review

Review of the Palm Pre and some of it's issues

Epson Workforce 600 - An Epic Fail Like no Other

I have never seen a wireless printer so crippled and messed up out of the box

Google Docs Review

Are you going to go GOOGLE for Google docs?

Asus T91MT Netbook Tablet Review

I waited for the Apple iPad to be announced prior to reviewing this product.

Video: Get Information about your system with CPUZ

Find out information about your computer using cpuz

The NOC TV Live Stream!

Get your tech questions answered live on our streaming TV

How to Replace a graphics card in a desktop computer

Ever wonder what all is involved in replacing a graphics card in your computer. There is'nt much to it, it's just a few simple things you need to do.

How to clean a computer mouse

A quick trick to cleaning your mouse and getting more life out of it in just a few minutes.

Replacing the power supply on a small form factor Dell desktop

If you have a small form factor Dell desktop replacing the power supply is not too different than that of a normal computer.

How to use MSConfig to optimize your startup entries

MSConfig is built into your Windows system, you can use it to remove extra startup entries.

Software Review: McAfee Internet Security

The NOC reviews the McAfee internet security product line.

How to use Process Explorer and Task Manager to identify performance issues

If you ever had a system that was running a bit slow you might have thought about simply adding more ram to it, however that is not always the fix.

Review of the Sanyo Xacti VPC-CG10 digital camera

Bang for the buck the Xacti VPC-CG10 has more features than other video cameras in it's price range.

Using the Ultimate Boot CD to recover files from a damaged system.

If your system no longer starts windows, you can still recover your files before you reload the system. All you need is an Ultimate boot CD, and an external drive.

Wacom Bamboo Pen and Touch Review

When I get money from advertising I generally spend it on getting a new product to review. This time around I got the Wacom Bamboo pen and touch.

What CPU Thermal Compounds/Grease do I use?

There are a multitude of thermal products on the market, and some better than others. I actually use two products depending on the job itself.

NOC Episode Anti-Virus products

What antivirus product should you use

NOC Episode Running Windows On A Mac

We got a question about how to run Windows on a Mac during a live stream

Palm Pre vs iPhone which is better

I often get asked which device I prefer, which one is the better phone the Pre or the iPhone. Obviously this is something that is going to be more based on opinion, as there are only a few things hardware wise that seperate them.

NOC: Episode 3 Vista Barrows from the Mac

We demonstrate how some of the Mac OS X features have mysteriously shown up in Vista.

NOC Episode Cleaning Electrical Contacts

What is the best way to clean up dirty electrical contacts.

NOC Episode Changing your power button in Windows Vista

Change how your power button behaves in Windows Vista

NOC Episode Running Programs as Administrator in Windows Vista

Having trouble running programs on Windows Vista, try running it as Administrator

NYTimes.com Serving up Malware via Ads last weekend

Last weekend the news site NYTimes.com was displaying Ads that contained malware.

Laptops vs Liquids, how to salvage your laptop in the event of a liquid spill

When a liquid spills on your laptop, some quick thinking and knowing what to do can be it's last chance to be saved.

Netbooks vs Laptops what is the difference

What makes a netbook different from a laptop, they are cheaper, and smaller so why not get one? Well here's a few reasons why not to.

Quick Tip - Controlling your cursor position with the keyboard

A few keyboard shortcuts to help you control the position of your text cursor, using just your keyboard.

How to sync music to a device with Windows Media Player

A simple guide for syncing music to a MP3 player

Get a copy of your screen on your clip board

Need to get a picture of your desktop to send to tech support or someone else?

Published Articles

Articles on product implementation and general help on computer issues

Privacy Policy

Defcon-5 Privacy and data collection Policy

How to scan to PDF using Cannon MF Toolbox 4.9

Instructions on how to scan to PDF using the Cannon MF Toolbox 4.9

How to Stop and Start Services via the Command line

Simple guide for how to stop or start a service via the command line

How I almost bricked my system

I came close to bricking my desktop

Hard Drive Failures

A brief explanation as to why hard drives fail.

New Compaq POST screen

The new Compaq POST screen reminded me of something I did long ago

Messages may be stuck in the Outbox when you use Windows Mail


Unable to print only in word perfect


No audio playing from system with all connections and drivers in place


Unable to access registry keys or reset registry permissions


Unable to print to previously working printer


Unable to install update for .NET Framework 4 KB2160841


Software Patching Services

Defcon-5 can perform an audit on your systems to identify what software patches, and service packs your organization should implement.

Data Recovery Service

Defcon-5 can recover data from pc's and macintosh computers, as long as the hard drive still runs, we can get your data.

Unable to Connect to Internet with Panda Internet Security 2007


Unable to synchronize Palm OS Device with Outlook Calendar


Unable to update your protection. Make sure your internet connection works before trying again.


CD Rom drive is not recognized


Knowledge Base Articles for 2007

Listing of all Knowledge Base Articles created by Defcon-5 in 2007




Most Recent Videos