Won't Turn Over

Posted on 2004-11-04
Last Modified: 2010-04-26
This is an odd problem that I am having problems trouble shooting.  I am running an Athlon Processor with a ECS K7s5a motherboard, 256 crucial and 512 kingston RAM.  I built the computer about 2 years ago and everything has been running fine until a couple months ago when I turned the computer on and it won't get passed the initial boot screen that checks the memory and IDE devices, it would just stop at that screen after verify the hardware profile and won't let me enter setup. After waiting overnight and turning it back on it seemed to work.  This has happened now about 6 times.  Each time it is different and I have no idea when the computer will boot back up.  I changed memory slots, took out memory, unplugged on IO devices, tried to reset bios, and everything else I could think of.  The hard part about it is that all of a sudden it will turn on and work perfectly for a month or so then it goes out again for a day or two.  This is very inconvenient considering all my work is done on this that computer.  My guess is that the motherboard is going out.  Has anyone run into a situation like this or might know how to fix it?
Question by:Docjayman
    LVL 69

    Accepted Solution

    The first thing I would do is swap out the power supply.  If things don't work and your cure is to turn it off and wait a while before turning it back on, the power supply is probably going bad.
    LVL 8

    Expert Comment

    If not PSU as Callandor suggests then

    Bad motherboard ?

    Open case and thoroughly inspect capacitors, no leaking stuff and no bulging allowed - top has to be flat
    see pictures in this link to identify capacitors

    Could also be caused by bad connection, somewhere

    Reseat everything
    LVL 8

    Expert Comment

    Perhaps a bad power cable to the harddisks? They are very annoying sometimes...

    Author Comment

    I love you guys.  I went to the store bought a new power supply and bam it works! Thanks

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    More and more people are using the enhanced small form-factor pluggable (SFP+) tranceivers, and speed is of utmost importance. Testing of speeds are critical to ensure that the devices will meet the speed requirements. There are some testing challen…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now