Memphis Cyber Security Expo – Computer Summit

Cyber crimes are on the rise, so it is more important than ever to make sure you and your family are protected. The Cyber Security Expo in Memphis is a valuable resource to anyone that wishes to do the most possible to prevent being a victim of cyber crime. Industry leaders will be there to discuss common and new threats that users face today.

It is more likely that your security will be threatened by malicious software such as viruses and other malware, so keeping your computer repaired of these threats is crucial. Often times, people have viruses on their computer that they are not aware of. The may complain that the computer is too slow and blame it on the computer being a couple of years old. Your local computer repair shop can add memory or upgrade other hardware, which will help the importance, but it is more important to also have them check your computer for malware and repair any threats they find.

We recommend Microsoft Security Essentials along with responsible internet usage to keep the bad stuff of of your pc and help prevent the need for having it repaired.

The Key Priorities of the FBI cyber crime divison are:

  • Computer and Network Intrusions
  • Identity Theft
  • Fraud: Internet Crime Complaint Center

Computer and Network intrusion is the the most important of these priorities because it is most often the root cause of the other two.  Luckily, these intrusions are easy to spot to the trained eye and when followed with appropriate computer repair, you can feel safe knowing that your property is safe.

Memphis Cyber Security Expo
October 18
FedEx Institute of Technology

Tagged with: ,
Posted in Security

Step By Step Removal of AntiVirus Security Pro

Virus Causes Log Off and Shuts Down Windows®

Virus allows you to logon and immediately logs you off and shuts down the computer.

Windows® 7 security center service is missing in services (local) and can’t be started.

This virus is very hard to remove due to the fact that you can’t use Safe Mode.

Step One:

Create a bootable disk: “ERD Commander or UBCD” are very handy tools; you are looking for a file in Program Data (the name of the Folder and Executable will vary, look for the most recent date) usxgg333.exe, the folder is: AS2014 and the Virus is called: Antivirus Security Pro. You will need to delete the folder along with the executable contained in it.

Step Two:

Run all programs (Rkill, Malware Bytes, TDSSKiller, Norton Power Eraser, Microsoft® Security Essentials, and Microsoft® Windows® Malicious Software Removal Tool (KB890830); they can all be found at http://www.youhaveavirus.com

Step Three:

Once you have ran all tools; open up an administrative command prompt: Start, All Programs, Accessories folder open, find command and right click, left click run as administrator. In the command type “chkdsk /r” and restart your computer.

Step Four:

Open up an administrative command prompt: Start, All Programs, Accessories folder open, find command and right click, left click run as administrator. In the command type “sfc /scannow”

Step Five:

Start enjoying your Microsoft® Windows® 7 operating system again.

Posted in Virus/Malware

Cricket Air Card Installation after Virus Removal

I spent 15 minutes correcting a problem with a Cricket Air Card after support told them they had hardware issues.

To resolve the issue I had to:

  • remove all the dialup connections they installed
  • ran a run as administrator command to release the ip (ipconfig /release)
  • renew the ip; (ipconfig /renew)
  • flush the DNS (ipconfig /flushdns)
  • and then register DNS (ipconfig /registerdns)

I was then able to reload the Cricket drivers and connect to the Air card.

It was actually a Cricket issue that their support could not figure out. I sometimes feel that the easiest support is the support you get from your local hardware guy. It even amazes me sometimes how understaffed and unqualified the people who give support are. I had so many phone calls from the people who loaded and let the 24/7 support people crash their computers and load 200 viruses on them. They actually believe they are contacting Norton or HP.

They call the 800 number and are redirected to India or some other country where they are told that they have been hacked. The company then remotes into their computer and installs hundreds of viruses and requests $189 for a lifetime or yearly support contract.  What a world we are living in.

Posted in Laptop/Notebook

Memphis man arrested – child pornography found on computer

CRIME REPORT: Memphis man arrested on child pornography charges

Memphis police have arrested a 33-year-old man after a sting led to the discovery of hundreds of images of child pornography on his computer.

As police departments become more tech savvy and with Google joining the fight, child predators are running out of places to hide on the internet.  We have seen a rise in sting operations aimed at child predators over the past few years, and law enforcement is making great strides to combat these felons.  It is argued that Google has the most sophisticated internet technology in the world, and they are using their might to deal a devastating blow to the scourge of child pornography.

Google recently infused $5 million dollars into the fight against child pornography.  They are creating a database of child porn image hashes that can be used to match against new images as they found.  The images are not visible in a human understandable form.  An algorithm is used to create a hash for the image that can be used to compare against other images and alert on matches.  In most cases this will be used against those involved in the media trade, but it can also be used to track down the original offender and creator of the media.

Posted in Related News, Security

responsive bootstrap 3 wordpress theme

Today we rolled out a new design for the Go Worship Network.  It is a responsive design that uses the Twitter Bootstrap 3 framework with buttons and icons from Font Awesome.  After receiving the artwork and the overall vision, we worked diligently to create a professional, functional, and modern website that would render beautifully on desktops, tablets, and mobiles alike.

Design and Development

The first step was to prototype the homepage and general layout.  For the fonts, we chose Merriweather for the headings with a slight text shadow and standard sans-serif family(Arial, Helvetica, sans-serif) for the body text. Once the mock up was complete to the customer’s liking, we began adding features.

An image slider from the previous site was removed in favor of a custom slider with a fixed height to keep the page from shifting as the slider progressed. We were given an image that was to be used for the main content area of the homepage.  As delivered, the colors didn’t follow the scheme for the rest of the site, so we converted the image to a semi-transparent png via Gimp.  Using the -webkit-background-size:cover CSS element style,  the newly transparent image was used to cover the main content area.

It was requested that we add 3 link sections to the footer that would link to pages for third party sponsors and participants.  The footer uses a dark background, so we went with a slightly lighter background color for the links section and set the opacity of the headers to .3 to allow for the use of a standard color without it being too overbearing on the darker background.

As with most of the sites we design, we used the toplink jQuery plugin.  The implementation of this plugin is extremely simple, and by using a large font size and the icon-angle-up icon from Font Awesome, the topLink was complete in a matter of minutes.

Next, we pulled out the prod and added our branding.

Deployment

As with most wordpress themes, deployment is a breeze.  The theme directory was copied to the production server and then activated through the wordpress admin.

The site was already flush with content, and we had already identified the content areas that would have to be modified to work with the new theme.  Most of these changes were removing HTML tables(yuck) and replacing them with the Bootstrap 3 grid rows and columns.  The main sidebar was modified to include the blog categories to make browsing the site easier for users and search engines.  We also added cross links to several pages to make traversing related pages easier.

Conclusion

The overall project was a success and the end result is something that both TechANYWHERE and Go Worship can be proud of.  As with all development projects, the open line of communication with the customer is crucial.  It is impossible to capture all requirements on the front end, so every project should be flexible enough to allow for changes at any time during development.

Tagged with: , , ,
Posted in Web Development

Free Flow Solder HP Laptop Video Chip

Heat gun for free flow solder hp

Personally I have done many of these repairs. Many laptop and video card manufactures look for the cheap way out when designing the heat-sinks for their products. What they don’t plan for is environment factors of different households or businesses. Not all people or businesses are in the cleanest locations, and the result is: more dust than expected, animal hair, or lint, and the smoker’s nicotine goo. All of these factors increase the amount of heat necessary to cause the video chip to reach temperatures that cause solder to melt enough to make a bad connection to the motherboard or video card. The free Flow process is pretty simple in terms of the repair.

What you will need

  • denatured alcohol
  • tinfoil
  • heat gun
  • thermal laser
  • copper shims
  • thermal compound

How to free flow solder the video chip

We usually prep the chip by cleaning it with denatured alcohol (you can get it at most hardware stores). We also cover the area we plan to free flow with a thick layer of tinfoil, cut-out for the size of the chip. I have several of these templates in my tool box that vary due to the different sizes we encounter.

At first, I used a butane torch to heat the chip, but found out very quickly that this had more potential to damage the chip. We now use a heat-gun  and a thermal laser to produce the heat and carefully watch our temperature. We normally heat the chip at about 280 to 310 degrees, being very careful to use a circular motion and keeping the heat-gun about an inch and a half away from the board. We apply the heat until we reach our desired temperature (about one minute, we use the low temperature setting on the heat-gun). We then use copper shims  and thermal compound  to add extra heat dissipation.

After cleaning the fans and putting the laptop or video card back together, we test it for a few hours.

Conclusion

The process is usually successful (85% of the time). But I tell all my clients; “Save your data, and save your money for a new computer because I only warranty this repair for 90 days”. Hope this info is helpful. If you need help with the process or you are unsure of the proper steps; call me 24 hours a day 7 days a week at 901.515.8433.

Tagged with: , ,
Posted in Laptop/Notebook

Laptop Screen Replacement in Memphis

We stock LCD screens for most laptop computers, so we can usually fix your computer the same day! We stock 14.1″, 15.4″, 15.6″, 16.0″, and 17.3″ LED and LCD CCFL screens. We also have converters to change the connectors from left to right, and converters that change CCFL to LED.

 

We replace laptop screens, but we do not sell them to the general public. Screens are sold only if we install them. Standard screen replacement ranges from $100 to $159, please call with the model number of your laptop for estimates.

Tagged with: ,
Posted in Laptop/Notebook

City Security Consultants

City Security Consultants, Inc., Edward Lewis II, Vice President

It has come to my attention that you are looking at securing services with Techanywhere, and I wanted to take the time to inform you of my company’s experience. Rusty Allen of Techanywhere provides an outstanding service for our company. He personally set up our servers, built our computers, and has provided timely troubleshooting services to our organization.

It is very rare that you find a company which states that it can support you on a twenty-four by seven basis to actually come through when you need them. Time and time again, either with a new requirement or user error issue, Mr. Allen has been a game changer for us

I whole heartily recommend him and his services to any business which is in need of his computer technical services. He is withouth a doubt one of a kind.

Please feel free to contact me if you have any questions related to my experiences with Techanywhere.

Sincerely,

Edward Lewis II
Vice President

 

Posted in Testimonials

TechANYWHERE Android, iPhone, Blackberry, Tablet

[schema type=”product” url=”https://techanywhere.com” name=”TechANYWHERE Android” description=”The TechANYWHERE app offers customer and contact management, workorders, invoices, mass email campaigns, invoicing, credit card payments, and many more features” brand=”TechANYWHERE” manfu=”TechANYWHERE” model=”1.4.71″ ]

Desktop Version

techanywhere-android

Mobile Version

techanywhere-android-iosWorks on Android, iPhone, Blackberry, and all mobile devices and tablets.

Tagged with: , , , , ,
Posted in Software