Search our website

Search Results for "Computers"
as of 10/22/2019 15:00

Computer Security Auditing Services

Defcon-5 can perform an audit on the computers present at your organization to find viruses, vulnerabilities, and other security related issues

Twitter DDoS attack more complex than you think

Today's denial of service attack on Twitter was a bit more than just twitter in the crosshairs

New Trend Micro Internet Security 2010

The latest version of Trend Micro Internet Security has been released, so it's time for me to give an updated review and opinion on it.

Malware Removal Services

Defcon-5 can remove various types of malware from your computers and network, such as spyware, viruses, and worms.

Data Recovery Service

Defcon-5 can recover data from pc's and macintosh computers, as long as the hard drive still runs, we can get your data.

Unable to connect to internet from multiple computers

Where do you buy your electronics equipment and gadgets from?

Some people have asked me where I purchase my equipment and parts from

How to increase your Website popularity in local searches

Increase the popularity of your website in local searches

Software Review: McAfee Internet Security

The NOC reviews the McAfee internet security product line.

Google Docs Review

Are you going to go GOOGLE for Google docs?

EEE PC Performance Tuning

Optimizing performance of a EEE PC Netbook running Windows XP home

Personal/Family Service

Learn about the various security services that Defcon-5 offers to individuals, and families.

Quick Tips and Tricks

Find out about some quick tips and tricks that you might not know about on your computer.

Free PDF Printer Software

Convert any document to PDF format for free with Bullzip

Does running at a higher resolution make your computer faster?

An odd question, but does your screen resolution impact performance of your computer?

Apple is becoming more like old school Microsoft every day.

Microsoft might be learning the good things from Apple, but Apple seems to be only learning only the bad things from Microsoft.

Stop being cheap and give me my restore CD

Why are system builders being cheap skates and not providing restore disks with new systems.

Adobe activation is ridiculous, and a failure

Adobe has managed time and time again to tick me off with software activations

5 Reasons why you should'nt use Google Chrome OS

Five reasons should be more than enough to tell you why you should'nt get a chrome book, besides the fact there are already devices like it.

NOC: Episode 7 Cool Gear

We discuss some options for making the NOC pay for itself.

NOC Episode Running Windows On A Mac

We got a question about how to run Windows on a Mac during a live stream

NOC Episode Cleaning Electrical Contacts

What is the best way to clean up dirty electrical contacts.

Screen saver does not work

Unable to login to Remote Web Workplace

Preventing Spyware

Learn about spyware, stopping spyware, and how to remove spyware once it is on your computer.

Wireless Security Services

Defcon-5 can lock down your wireless networks and access points to prevent unauthorized entry by hackers passing by.

Small Business Services

Learn about the various security services that Decon-5 offers to small, and new businesses.

Physical Security Audit Services

Defcon-5 can perform an audit on your physical security to find flaws that could result in the theft or loss of critical business information.

Operating System Hardening Service

Defcon-5 can perform an analysis on your servers to identify potential vulnerabilities that are often missed, and should be corrected to maximize the security of your infrastructure.

Programmer and Developer Services

Defcon-5 can perform an analysis on your application code to find vulnerabilities (such as SQL injection) that you did not know existed, allowing you to have a greater return on investment than ever before.

Corporate/Large Business Service

Learn about the various security services Defcon-5 offers to large businesses, and corporations.

Specific Services

Defcon-5 offers numerous security services to individuals, and businesses to increase the security of their computer systems, and their physical infrastructure.

Custom Built Computers

Have a computer custom built for you and your needs

Systems may not run login scripts from an active directory

Most Recent Videos