HP DM1-3210US

10133913

SYSTEM SPECS:

- WINDOWS 7 HOME PREMIUM 64BIT
- AMD E-350 1.6GHz DUAL-CORE PROCESSOR
- 3GB RAM – 1 x 2GB + 1 x 1GB PC3-10600
(MAX RAM: 8GB RAM – 2 x 4GB + PC3-10600 )
- 160GB SATA HARD DRIVE
- DVD-RW/CD-RW
- ON-BOARD VIDEO
- VGA/HDMI VIDEO OUT
- ON-BOARD HD AUDIO
- HEADPHONE & MIC JACK
- B/G/N WIFI
- 10/100/1000 ETHERNET
- BLUETOOTH
- 1 x CARD READER
- 3 x USB PORTS
- WEB CAM
- BATTERY AND AC ADAPTER

***** ADD *****
- KASPERSKY ANTIVIRUS @ $49.99
- ROXIO CREATOR WITH CINEPLAYER @ $19.99

#NOTE: BATTERY USEAGE ON NOTEBOOKS CANNOT BE GUARANTEED OR WARRANTIED

Dell Vostro 1510

10132808

SYSTEM SPECS:

- WINDOWS VISTA HOME BASIC 64BIT SERVICE PACK 2
- INTEL CORE 2 DUO 2.0GHz PROCESSOR
- 3GB RAM – 1 x 1GB + 1 x 2GB NBPC2-6400
(MAX RAM: 4GB – 2 x 2GB PC2-5300/6400)
- 250GB SATA HARD DRIVE
- DVD-RW/CD-RW
- ON-BOARD VIDEO
- VGA VIDEO OUT
- ON-BOARD AUDIO
- HEADPHONE & MIC JACK
- G WIFI
- 10/100/1000 ETHERNET
- BLUETOOTH
- 1 x EXPRESS CARD SLOT
- MULTI CARD READER
- 1 x FIREWIRE PORT
- 4 x USB PORTS
- WEBCAM
- FINGER PRINT READER
- NO BATTERY WITH SYSTEM

***** ADD *****
- KASPERSKY ANTIVIRUS @ $49.99
- ROXIO CREATOR WITH CINEPLAYER @ $19.99

#NOTE: BATTERY USEAGE ON NOTEBOOKS CANNOT BE GUARANTEED OR WARRANTIED

Fake FBI Infection

If you see either one of these screens you are infected with with the fake FBI infection which is a root kit.

What is a Root Kit?

 

rootkit is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of ”root” (the traditional name of the privileged account on Unix operating systems) and the word “kit” (which refers to the software components that implement the tool). The term “rootkit” has negative connotations through its association with malware.

Rootkit installation can be automated, or an attacker can install it once they’ve obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e. exploiting a known vulnerability, password (either by cracking, privilege escalation, or social engineering)). Once installed it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.

 

The only way to remove these types of infections is to back up your data, reformat your hard drive, and reload your operating system.

***YOU WILL LOSE ALL SOFTWARE***

 Software includes but is not limited to, Microsoft Office (Word, PowerPoint, Excel, and Outlook), QuickBooks, Quicken, Proprietary Business Software, etc… If you want your software reinstalled we will need to have your CD’s with the official activation key. We are able to, however, save the data created by those programs, as well as other documents, photos, music and videos.

 

Needed new computer

Needed new computer. Found great deal here (yes, I know how to shop hard). They had very good machine in stock. Was able to get my employee back to work fast. It is good to know that I can go to a local supplier, and get a top quality machine, without having to wait a week to have it shipped in, or pay over $100 to have it sent overnight by FedEx. The manager’s knowledge of computers was impressive (I have hired and fired a lot of IT staff over the years) and up to date

- Ben Shull