For millions of people Google is an indispensable search tool that they use every day, in all facets of their lives. From work or school, research, to looking up movies and celebrities to news and gossip, Google is the go-to search engine.
But instead of just typing in a phrase and wading through page after page of results, there are a number of ways to make your searches more efficient.
Some of these are obvious ones, that you probably know about. But others are lesser-known, and others are known but not often used. Use this guide to learn more about, or be reminded of, some of the best ways to get exactly what you're looking for, and quickly.
1. Either/or. Google normally searches for pages that contain all the words you type in the search box, but if you want pages that have one term or another (or both), use the OR operator -- or use the "|" symbol (pipe symbol) to save you a keystroke. [dumb | little | man]
2. Quotes. If you want to search for an exact phrase, use quotes. ["dumb little man"] will only find that exact phrase. [dumb "little man"] will find pages that contain the word dumb and the exact phrase "little man".
3. Not. If you don't want a term or phrase, use the "-" symbol. [-dumb little man] will return pages that contain "little" and "man" but that don't contain "dumb".
4. Similar terms. Use the "~" symbol to return similar terms. [~dumb little man -dumb] will get you pages that contain "funny little man" and "stupid little man" but not "dumb little man".
5. Wildcard. The "*" symbol is a wildcard. This is useful if you're trying to find the lyrics to a song, but can't remember the exact lyrics. [can't * me love lyrics] will return the Beatles song you're looking for. It's also useful for finding stuff only in certain domains, such as
educational information: ["dumb little man" research *.edu].
6. Advanced search. If you can't remember any of these operators, you can always use Google's advanced search.
7. Definitions. Use the "define:" operator to get a quick definition. [define:dumb] will give you a whole host of definitions from different sources, with links.
8. Calculator. One of the handiest uses of Google, type in a quick calculation in the search box and get an answer. It's faster than calling up your computer's calculator in most cases. Use the +, -, *, / symbols and parentheses to do a simple equation.
9. Numrange. This little-known feature searches for a range of numbers. For example, ["best books 2002..2007] will return lists of best books for each of the years from 2002 to 2007 (note the two periods between the two numbers).
10. Site-specific. Use the "site:" operator to search only within a certain website. [site:dumblittleman.com leo] will search for the term "leo" only within this blog.
11. Backlinks. The "link:" operator will find pages that link to a specific URL. You can use this not only for a main URL but even to a specific page. Not all links to an URL are listed, however.
12. Vertical search. Instead of searching for a term across all pages on the web, search within a specialized field. Google has a number of specific searches, allowing you to search within blogs, news, books, and much more:
# Blog Search # Book Search # Scholar # Catalogs # Code Search # Directory # Finance
# Images # Local/Maps # News # Patent Search # Product Search # Video
13 Movies. Use the "movie:" operator to search for a movie title along with either a zip code or U.S. city and state to get a list of movie theaters in the area and show times.
14 Music. The "music:" operator returns content related to music only.
15 Unit converter. Use Google for a quick conversion, from yards to meters for example, or different currency: [12 meters in yards]
16 Types of numbers: Google algorithms can recognize patterns in numbers you enter, so you can search for:
* Telephone area codes
* Vehicle ID number (US only)
* Federal Communications Commission (FCC) equipment numbers (US only)
* UPC codes
* Federal Aviation Administration (FAA) airplane registration number (US only)
* Patent numbers (US only)
* Even stock quotes (using the stock symbol) or a weather forecast regarding the next five days
17 File types. If you just want to search for .PDF files, or Word documents, or Excel spreadsheets, for example, use the "filetype:" operator.
18 Location of term. By default, Google searches for your term throughout a web page. But if you just want it to search certain locations, you can use operators such as "inurl:", "intitle:", "intext:", and "inanchor:". Those search for a term only within the URL, the title,
the body text, and the anchor text (the text used to describe a link).
19 Cached pages. Looking for a version of a page the Google stores on its own servers? This can help with outdated or update pages. Use the "cached:" operator.
20 Answer to life, the universe, and everything. Search for that phrase, in lower case, and Google will give you the answer.
For more on Google's search syntax, see this guide, and this one.
Tuesday, September 2, 2008
Sunday, August 31, 2008
Securing data on laptop in case it gets stolen.
For Apple MAC users
Here is 10 Most Essential Things for Securing Your Mac
- Secure Accounts
- Secure Sleeping Mode on your Mac
- Secure Keychain Access
- Control Screen Sharing
- Build Strong Firewall
- Encrypt Sensitive Data with FileVault
- Backup Often
For PC users
- Bios supervisor password
- HDD password
- Windows logon password
- Encrypt Sensitive Data by Encrypting entire HD Disk or folder/files
You can also can try services like LaptopLock to protect your laptop.
For step by step instructions on how to implement those tasks just use Google.
I am short on space in this blog, so I am not providing instructions here. If you need help e-mail me information0123@gmail.com
Here is 10 Most Essential Things for Securing Your Mac
- Secure Accounts
- Secure Sleeping Mode on your Mac
- Secure Keychain Access
- Control Screen Sharing
- Build Strong Firewall
- Encrypt Sensitive Data with FileVault
- Backup Often
For PC users
- Bios supervisor password
- HDD password
- Windows logon password
- Encrypt Sensitive Data by Encrypting entire HD Disk or folder/files
You can also can try services like LaptopLock to protect your laptop.
For step by step instructions on how to implement those tasks just use Google.
I am short on space in this blog, so I am not providing instructions here. If you need help e-mail me information0123@gmail.com
Friday, August 22, 2008
CSI Stick grabs data from cell phones

If someone asks to borrow your cell phone, or you leave it unattended, beware!
Unless you actually watch them use it, they may be secretly grabbing every piece of your information on the device, even deleted messages. If you leave your phone sitting on your desk, or in the center console of your car while the valet parks it, then you and everyone in your contacts list may be at risk, to say nothing of confidential e-mails, spread sheets, or other information. And of course, if you do not want your spouse to see who you are chatting with on your phone, you might want to use extra caution.
There is a new electronic capture device that has been developed primarily for law enforcement, surveillance, and intelligence operations that is also available to the public. It is called the Cellular Seizure Investigation Stick, or CSI Stick as a clever acronym. It is manufactured by a company called Paraben, and is a self-contained module about the size of a BIC lighter. It plugs directly into most Motorola and Samsung cell phones to capture all data that they contain. More phones will be added to the list, including many from Nokia, RIM, LG and others, in the next generation, to be released shortly.
I recently attended and lectured at the Techno-Security conference in Myrtle Beach, Fla. About 1,500 law enforcement and security professionals participated and were briefed on the latest in cybersecurity vulnerabilities from participating federal agents, manufacturers, and cyber-consultants. The CSI Stick caught my attention because of the potential to rapidly and covertly download all of the information contained in many cell phones.
This device connects to the data/charging port and will seamlessly grab e-mails, instant messages, dialed numbers, phone books and anything else that is stored in memory. It will even retrieve deleted files that have not been overwritten. And there is no trace whatsoever that the information has been compromised, nor any risk of corruption. This may be especially troublesome for corporate employees and those that work for government agencies.
The good news: the device should find wide acceptance by parents who want to monitor what their kids are doing with their phones, who they are talking to and text messaging, and where they are surfing. It could also be valuable in secure areas where employees need to be randomly monitored to insure that sensitive information is not compromised through the use of a cell phone as a memory device.
The CSI Stick sells for $200 and requires an added piece of software to mine the data and do sophisticated processing on your computer. So now, in addition to worrying about your conversations or data being intercepted through your Bluetooth headset, there is a new threat, and it is very real.
The rule: if your phone contains sensitive data, do not leave it unattended. If you loan it to someone to use because they tell you theirs is not working, make sure you actually see them using the phone and there is nothing connected to it.
Is your boss tracking your computer activities?
Admit it -- you've used your computer at work to view non-work-related Web sites. Heck, if you are reading this article at work, you might already be guilty as charged. More than 70 percent of the adult online population has accessed the Internet at work for personal use at least once, according to a September 2000 eMarketer study. Employees are sending personal e-mails, playing games, viewing pornography, shopping, checking stock prices and gambling online during working hours.
Don't think these cyberslacking activities are going unnoticed. With a simple software application, your boss can be tapping into your computer and see what you're doing in real-time. Whether you are guilty of wasting company time or not, your computer might be under surveillance. You can be monitored without your knowledge -- employers are not required to notify you that you're being observed.
The growing number of employers who are monitoring their employees' activities is a result of the low cost of the monitoring technology, a growing percentage of employees using their computers for personal use and an increase in employees leaking sensitive company information. Employers are also watching their workers to avoid sexual harassment and discrimination lawsuits that stem from inappropriate and offensive e-mails circulating within a company.
Instead of monitoring those employees who exhibit suspicious behavior, many employers are instituting "continuous, systematic surveillance" in the workplace, according to a Privacy Foundation study written by Andrew Schulman. Reports of companies firing workers for misusing workplace computers are becoming more common as an increasing number of employers implement electronic monitoring software.
Computers leave behind a trail of bread crumbs that can provide employers with all the information they could possibly need about an employee's computer-related activities. For employers, computers are the ultimate spy. There's little that can stop an employer from using these surveillance techniques.
There are basically five methods that employers can use to track employee activities:
* Packet sniffers
* Log files
* Desktop monitoring programs
* Phones
* Closed-circuit cameras
Computer-monitoring programs carry such names as Shadow, SpyAgent, Web Sleuth and Silent Watch. The prices of these programs range from as little as $30 to thousands of dollars. The number of employers who believe that they need these programs and the relatively low cost has resulted in an emerging multi-million dollar industry called employee Internet management.
Anti-Forensics
Anti-forensics can be a computer investigator's worst nightmare. There are dozens of ways people can hide information. Some programs can fool computers by changing the information in files' headers. A file header is normally invisible to humans, but it's extremely important -- it tells the computer what kind of file the header is attached to. If you were to rename an mp3 file so that it had a .gif extension, the computer would still know the file was really an mp3 because of the information in the header. Some programs let you change the information in the header so that the computer thinks it's a different kind of file. Detectives looking for a specific file format could skip over important evidence because it looked like it wasn't relevant. Other programs can divide files up into small sections and hide each section at the end of other files. Files often have unused space called slack space. With the right program, you can hide files by taking advantage of this slack space. It's very challenging to retrieve and reassemble the hidden information.
It's also possible to hide one file inside another. Executable files -- files that computers recognize as programs -- are particularly problematic. Programs called packers can insert executable files into other kinds of files, while tools called binders can bind multiple executable files together.
Encryption is another way to hide data. When you encrypt data, you use a complex set of rules called an algorithm to make the data unreadable. For example, the algorithm might change a text file into a seemingly meaningless collection of numbers and symbols. A person wanting to read the data would need the encryption's key, which reverses the encryption process so that the numbers and symbols would become text. Without the key, detectives have to use computer programs designed to crack the encryption algorithm. The more sophisticated the algorithm, the longer it will take to decrypt it without a key.
Other anti-forensic tools can change the metadata attached to files. Metadata includes information like when a file was created or last altered. Normally you can't change this information, but there are programs that can let a person alter the metadata attached to files. Imagine examining a file's metadata and discovering that it says the file won't exist for another three years and was last accessed a century ago. If the metadata is compromised, it makes it more difficult to present the evidence as reliable.
Some computer applications will erase data if an unauthorized user tries to access the system. Some programmers have examined how computer forensics programs work and have tried to create applications that either block or attack the programs themselves.
Don't think these cyberslacking activities are going unnoticed. With a simple software application, your boss can be tapping into your computer and see what you're doing in real-time. Whether you are guilty of wasting company time or not, your computer might be under surveillance. You can be monitored without your knowledge -- employers are not required to notify you that you're being observed.
The growing number of employers who are monitoring their employees' activities is a result of the low cost of the monitoring technology, a growing percentage of employees using their computers for personal use and an increase in employees leaking sensitive company information. Employers are also watching their workers to avoid sexual harassment and discrimination lawsuits that stem from inappropriate and offensive e-mails circulating within a company.
Instead of monitoring those employees who exhibit suspicious behavior, many employers are instituting "continuous, systematic surveillance" in the workplace, according to a Privacy Foundation study written by Andrew Schulman. Reports of companies firing workers for misusing workplace computers are becoming more common as an increasing number of employers implement electronic monitoring software.
Computers leave behind a trail of bread crumbs that can provide employers with all the information they could possibly need about an employee's computer-related activities. For employers, computers are the ultimate spy. There's little that can stop an employer from using these surveillance techniques.
There are basically five methods that employers can use to track employee activities:
* Packet sniffers
* Log files
* Desktop monitoring programs
* Phones
* Closed-circuit cameras
Computer-monitoring programs carry such names as Shadow, SpyAgent, Web Sleuth and Silent Watch. The prices of these programs range from as little as $30 to thousands of dollars. The number of employers who believe that they need these programs and the relatively low cost has resulted in an emerging multi-million dollar industry called employee Internet management.
Anti-Forensics
Anti-forensics can be a computer investigator's worst nightmare. There are dozens of ways people can hide information. Some programs can fool computers by changing the information in files' headers. A file header is normally invisible to humans, but it's extremely important -- it tells the computer what kind of file the header is attached to. If you were to rename an mp3 file so that it had a .gif extension, the computer would still know the file was really an mp3 because of the information in the header. Some programs let you change the information in the header so that the computer thinks it's a different kind of file. Detectives looking for a specific file format could skip over important evidence because it looked like it wasn't relevant. Other programs can divide files up into small sections and hide each section at the end of other files. Files often have unused space called slack space. With the right program, you can hide files by taking advantage of this slack space. It's very challenging to retrieve and reassemble the hidden information.
It's also possible to hide one file inside another. Executable files -- files that computers recognize as programs -- are particularly problematic. Programs called packers can insert executable files into other kinds of files, while tools called binders can bind multiple executable files together.
Encryption is another way to hide data. When you encrypt data, you use a complex set of rules called an algorithm to make the data unreadable. For example, the algorithm might change a text file into a seemingly meaningless collection of numbers and symbols. A person wanting to read the data would need the encryption's key, which reverses the encryption process so that the numbers and symbols would become text. Without the key, detectives have to use computer programs designed to crack the encryption algorithm. The more sophisticated the algorithm, the longer it will take to decrypt it without a key.
Other anti-forensic tools can change the metadata attached to files. Metadata includes information like when a file was created or last altered. Normally you can't change this information, but there are programs that can let a person alter the metadata attached to files. Imagine examining a file's metadata and discovering that it says the file won't exist for another three years and was last accessed a century ago. If the metadata is compromised, it makes it more difficult to present the evidence as reliable.
Some computer applications will erase data if an unauthorized user tries to access the system. Some programmers have examined how computer forensics programs work and have tried to create applications that either block or attack the programs themselves.
Sunday, August 17, 2008
WiFi Setup and security

Wireless networks are a great way to share files, printers, and your Internet connection to any computer in your home. With a wireless network adapter installed on your portable computer, you are no longer tied to your desk. You can communicate with friends, read the news, and surf the Web anywhere you can receive a wireless network signal.
The risks
Wireless networks don't stop at the walls of your home. In fact, wireless networks often extend more than 300 feet from your wireless router. If you live in an apartment, dorm, or condominium, you may have dozens of neighbors who can access your wireless network. If you live in a house, your neighbors and even people on the street may be able to connect to your network.
It's one thing to let a neighbor borrow your lawn mower, but you should think twice about allowing anyone to access your home network. There are several good reasons for this. People who can connect to your wireless network might be able to:
• Slow down your Internet performance.
• View files on your computers and spread dangerous software.
• Monitor the Web sites you visit, read your e-mail and instant messages as they travel across the network, and copy your usernames and passwords.
• Send spam or perform illegal activities with your Internet connection.
By setting up security features on your wireless network, you can make it very difficult for uninvited guests to connect.
How to protect your wireless network
Most wireless networks are completely unprotected when you first set them up. However, in just a few minutes, you can protect your wireless network by using the same method banks use to protect your password when you log on to their Web sites: encryption. Encryption scrambles data on your wireless network so that only computers that have the encryption key can read your communications.
You have several choices for wireless encryption:
• 64-bit WEP (Wired Equivalent Protection). The original wireless encryption standard, it is now outdated. The main problem with it is that it can be easily "cracked." Cracking a wireless network means defeating the encryption so that you can establish a connection without being invited.
• 128-bit WEP. An updated, more secure version of the original WEP. However, skilled attackers can still crack 128-bit WEP in a few hours or less, giving them access to your network.
• WPA-PSK (also known as WPA-Personal). A more secure alternative to WEP, but because it is newer, it is not as widely supported. Microsoft Windows XP with Service Pack 2 supports WPA, so this type of encryption is the best choice if you plan to connect only Windows XP computers to your wireless network. However, if you have wireless devices that don't support WPA, such as media extenders or wireless cameras, you'll have to use WEP on your network instead.
You might also see the security method called "WPA-Enterprise." As the name suggests, this method of network encryption is designed for business use. Setup for WPA-Enterprise is more complex than for other types of encryption, and it requires special network infrastructure.
• WPA2. The newest type of wireless encryption, WPA2 provides the highest level of encryption available. WPA2 encryption should be your first choice if your wireless router and all of your wireless computers and devices support it.
Even though one type of encryption may be better than another, any type will dramatically improve your network's security by making you a more difficult target.
Can wireless encryption be "cracked"?
The short answer is, "Yes." Any encryption can be cracked. An individual with knowledge of computers and networking, and who is willing to spend a few hours researching free "hacking" tools, can crack encryption in a few hours (or less). However, most users who want to connect without authorization lack the expertise to crack wireless encryption, even relatively weak 64-bit WEP. In a crowded neighborhood with numerous unprotected networks, anyone looking for a free connection will likely choose the unprotected network rather than spend the time to crack your wireless encryption. Therefore, even WEP encryption offers better protection than not having encryption enabled at all.
Hackers
Thanks to the media, the word "hacker" has gotten a bad reputation. The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.
As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.
Thursday, August 7, 2008
Best deal ever on Laptop Just $579.99 at BestBuy

Compaq - Presario Laptop with Intel® Pentium® Dual-Core Mobile Processor T2390
Features
* Intel® Pentium® Dual-Core processor T2390 with 533MHz frontside bus, 1MB L2 cache and 1.86GHz processor speed
* 3GB DDR2 memory for multitasking power
* Multiformat DVD±RW/CD-RW drive with double-layer support records up to 8.5GB of data or 4 hours of video using compatible DVD+R DL media; also supports LightScribe direct-disc labels using compatible LightScribe media
* 17" WXGA+ high-definition widescreen TFT-LCD display with BrightView technology and 1440 x 900 resolution
* 200GB SATA hard drive
* Intel® Graphics Media Accelerator X3100 with up to 358MB total available memory as allocated by Windows Vista; S-video out
* Built-in webcam with integrated microphone enables live video chat
* 5-in-1 integrated digital media reader supports Secure Digital, MultiMediaCard, Memory Stick, Memory Stick Pro and xD-Picture Card
* 3 high-speed USB 2.0 ports for fast digital data transfer and easy peripheral connectivity
* Built-in 802.11b/g wireless LAN; built-in high-speed 10/100Base-T Ethernet LAN with RJ-45 connector; 56 Kbps modem
* Weighs 6.8 lbs. and measures just 1.8" thin for portable power; lithium-ion battery and AC adapter
* Microsoft Windows Vista Home Premium operating system with Service Pack 1 (SP1) preinstalled; software package included with HP PhotoSmart Essential, muvee autoProducer, more; 60-day trial of Microsoft Office 2007 Student & Teacher Edition also included
http://www.bestbuy.com/site/olspage.jsp?skuId=8898348&type=product&id=1212192622613
If you all ready bought this laptop please write about what you think about it here.
Wednesday, July 30, 2008
How to Save a Laptop from Liquid Damage
Don’t drink and type
If you're tempted to down a soda, water, glass of wine, coffee, or other liquid while typing away at your keyboard, you may end up paying the ultimate price—liquid spilled into your computer from an accidental knock, a few drips or a dropped cup. If this happens, don't panic. Instead, follow these simple instructions as quickly as you can to try to salvage your computer.
Steps
1. Shut it off! Immediately remove the battery, the A/C adapter, and unplug the device after the spill. The biggest danger at first is the device shorting out. The electrolytic activity of combining electricity and liquids will begin as soon as the liquid contacts the powered circuits so removing the power and battery immediately is essential.
2. Turn it upside down immediately to stop the liquid from traveling deeper into the machine.
3. Clean up any part of the spill you can get to. Use paper towels or any absorbent material that is lint-free.
4. Inspect the keyboard. Some keyboards are designed to protect the internals from liquids:
* Pour out any liquid contained in a keyboard enclosure.
* Remove and clean an easily removable keyboard.
5. Wipe up anything sticky. This may include the screen, the keys on the keyboard, and any buttons. Use a clean, slightly dampened, lint-free cloth.
6. Disconnect and remove any and all external devices.
7. Insulate yourself from static discharge. Static electricity can be very high voltage. Static discharge from your hands and body can destroy even a dry computer. Learn how to Avoid Destroying a Computer With Electrostatic Discharge.
8.
Remove the drive
Disassemble the case. If you cannot get to the whole spill, then it may be necessary to remove the laptop's case. Most spills will contain chemicals that can corrode internal circuit boards:
#
* If you aren't comfortable taking your device apart, then get it to someone who is, as soon as possible.
* Pull the hard drive to protect your data.
* Remove as many cards or drives as you can.
# Remove dry residue. Use a toothbrush or lint-free cloth to gently remove any dried residue from non-water stains such as cola or coffee. Blow the residue away with compressed air, or use a vacuum cleaner with an adjustable power setting or bypass valve to ensure a gentle attempt is made at removing the residue when it has dried to a powder.
# Rinse off the residue. If you spilled anything besides water on the laptop, rinsing it clean will be the most dramatic part. There are several ways to rinse your machine, depending on the kind of spill, and how much risk you are willing to endure:
* Think about what has been spilled on/in your computer, and determine whether it is water soluble or petro-chemical based. In the case of the former, deionized water will work fine. If it is oily, etc., then rinse with denatured alcohol, and then rinse with deionized water.
* Rinse with water. Take any components that have residue (a fresh spill or an old spill of cola) and rinse them under the tap. Most circuit boards and similar non-moving components handle water well, as long as they are not powered. Some internal components with moving parts may not handle water well, for example, fans and CD/DVD drives.
* Rinse with deionized or distilled water. Many people prefer to rinse with deionized water over tap water. Regular water will leave deposits that can cause electrical shorts, but deionized water will rinse clean, dry, and leave nothing behind.
* Don't get too carried away rinsing your machine. Water and laptops do not mix, either. Rinse as much as you need to, and not more. Carefully blot up excess water, if any.
Let it dry. Be completely sure that the parts are dry before you proceed. As with rinsing, there are different theories on drying:
* Dry naturally. Prop the machine up, away from surfaces, so that air can circulate in and around the entire unit. Leave the machine to dry for 24 to 48 hours.
* Dry with light heat. Place your deck on a warm radiator or on top of a warm sill or shelf - out of direct sunlight - or near other source of warmth. Do not use high levels of heat, just moderately warm sources of heat. Let it dry for 12 hours, or so. A nearby dehumidifier may improve drying time. High heat will drive moisture and humidity further into the device and will ensure ongoing problems as that moisture causes oxidation and corrosion.
* Never use a hair dryer, as this will cause static problems and fill your machine with more contaminants and dust. A hair dryer at a high setting could also melt some of the plastic components. In extreme cases the hair dryer will drive moisture deeper into the circuits and components and that moisture will oxidize and create capacitive load connections under and inside of integrated circuits and connectors, eventually causing failure of the device. The best way to remove all residual moisture is to patiently draw it away with a vacuum cleaner held over the affected areas for up to 20 minutes in each accessible area, having already removed the majority of liquids and moisture manually and dried all visible moisture by hand, so that none enters the vacuum cleaner. This method is preferable to leaving it to dry naturally as it halts any oxidation from occurring deep inside small surface mount components and connections, such as can result in issues later on.
# Clean with a solvent. A second rinse with a solvent-based cleaner is recommended by some, and abhorred by others. It is recommended if the unit has been sitting long enough to be subject to corrosion and oxidation before repair and cleaning is attempted. Always use gloves and ensure good room ventilation when handling any solvent or alcohol based cleaners as some are known carcinogens.
* If you suspect that your first rinse did not remove all of the residue, a chemical rinse of this kind may be worth the risk. The advantages of such a rinse are: there is only one substance to apply and remove; that substance, typically, evaporates; long drying times are not required. The disadvantage is that, if you use the wrong solvents, you can literally dissolve your computer.
* Buy and use 99% (not 90%) isopropyl alcohol. Never, ever use gasoline or acetone to clean computer parts.
* Using a cotton swab and/or soft toothbrush, carefully rub or wipe each component of the board, until it is clean.
* Try flux remover, a spray-on can available in electronics stores, rather than isopropyl alcohol.
Put the laptop back together, and test it to see if it is working
If you're tempted to down a soda, water, glass of wine, coffee, or other liquid while typing away at your keyboard, you may end up paying the ultimate price—liquid spilled into your computer from an accidental knock, a few drips or a dropped cup. If this happens, don't panic. Instead, follow these simple instructions as quickly as you can to try to salvage your computer.
Steps
1. Shut it off! Immediately remove the battery, the A/C adapter, and unplug the device after the spill. The biggest danger at first is the device shorting out. The electrolytic activity of combining electricity and liquids will begin as soon as the liquid contacts the powered circuits so removing the power and battery immediately is essential.
2. Turn it upside down immediately to stop the liquid from traveling deeper into the machine.
3. Clean up any part of the spill you can get to. Use paper towels or any absorbent material that is lint-free.
4. Inspect the keyboard. Some keyboards are designed to protect the internals from liquids:
* Pour out any liquid contained in a keyboard enclosure.
* Remove and clean an easily removable keyboard.
5. Wipe up anything sticky. This may include the screen, the keys on the keyboard, and any buttons. Use a clean, slightly dampened, lint-free cloth.
6. Disconnect and remove any and all external devices.
7. Insulate yourself from static discharge. Static electricity can be very high voltage. Static discharge from your hands and body can destroy even a dry computer. Learn how to Avoid Destroying a Computer With Electrostatic Discharge.
8.
Remove the drive
Disassemble the case. If you cannot get to the whole spill, then it may be necessary to remove the laptop's case. Most spills will contain chemicals that can corrode internal circuit boards:
#
* If you aren't comfortable taking your device apart, then get it to someone who is, as soon as possible.
* Pull the hard drive to protect your data.
* Remove as many cards or drives as you can.
# Remove dry residue. Use a toothbrush or lint-free cloth to gently remove any dried residue from non-water stains such as cola or coffee. Blow the residue away with compressed air, or use a vacuum cleaner with an adjustable power setting or bypass valve to ensure a gentle attempt is made at removing the residue when it has dried to a powder.
# Rinse off the residue. If you spilled anything besides water on the laptop, rinsing it clean will be the most dramatic part. There are several ways to rinse your machine, depending on the kind of spill, and how much risk you are willing to endure:
* Think about what has been spilled on/in your computer, and determine whether it is water soluble or petro-chemical based. In the case of the former, deionized water will work fine. If it is oily, etc., then rinse with denatured alcohol, and then rinse with deionized water.
* Rinse with water. Take any components that have residue (a fresh spill or an old spill of cola) and rinse them under the tap. Most circuit boards and similar non-moving components handle water well, as long as they are not powered. Some internal components with moving parts may not handle water well, for example, fans and CD/DVD drives.
* Rinse with deionized or distilled water. Many people prefer to rinse with deionized water over tap water. Regular water will leave deposits that can cause electrical shorts, but deionized water will rinse clean, dry, and leave nothing behind.
* Don't get too carried away rinsing your machine. Water and laptops do not mix, either. Rinse as much as you need to, and not more. Carefully blot up excess water, if any.
Let it dry. Be completely sure that the parts are dry before you proceed. As with rinsing, there are different theories on drying:
* Dry naturally. Prop the machine up, away from surfaces, so that air can circulate in and around the entire unit. Leave the machine to dry for 24 to 48 hours.
* Dry with light heat. Place your deck on a warm radiator or on top of a warm sill or shelf - out of direct sunlight - or near other source of warmth. Do not use high levels of heat, just moderately warm sources of heat. Let it dry for 12 hours, or so. A nearby dehumidifier may improve drying time. High heat will drive moisture and humidity further into the device and will ensure ongoing problems as that moisture causes oxidation and corrosion.
* Never use a hair dryer, as this will cause static problems and fill your machine with more contaminants and dust. A hair dryer at a high setting could also melt some of the plastic components. In extreme cases the hair dryer will drive moisture deeper into the circuits and components and that moisture will oxidize and create capacitive load connections under and inside of integrated circuits and connectors, eventually causing failure of the device. The best way to remove all residual moisture is to patiently draw it away with a vacuum cleaner held over the affected areas for up to 20 minutes in each accessible area, having already removed the majority of liquids and moisture manually and dried all visible moisture by hand, so that none enters the vacuum cleaner. This method is preferable to leaving it to dry naturally as it halts any oxidation from occurring deep inside small surface mount components and connections, such as can result in issues later on.
# Clean with a solvent. A second rinse with a solvent-based cleaner is recommended by some, and abhorred by others. It is recommended if the unit has been sitting long enough to be subject to corrosion and oxidation before repair and cleaning is attempted. Always use gloves and ensure good room ventilation when handling any solvent or alcohol based cleaners as some are known carcinogens.
* If you suspect that your first rinse did not remove all of the residue, a chemical rinse of this kind may be worth the risk. The advantages of such a rinse are: there is only one substance to apply and remove; that substance, typically, evaporates; long drying times are not required. The disadvantage is that, if you use the wrong solvents, you can literally dissolve your computer.
* Buy and use 99% (not 90%) isopropyl alcohol. Never, ever use gasoline or acetone to clean computer parts.
* Using a cotton swab and/or soft toothbrush, carefully rub or wipe each component of the board, until it is clean.
* Try flux remover, a spray-on can available in electronics stores, rather than isopropyl alcohol.
Put the laptop back together, and test it to see if it is working
In this blog I will try to post step-by-step guides on how to solve most common problems with your PC. Also, readers of this blog can post they questions or problems they have with they PC's. I will try to help every body, so feel free to ask.
information0123@gmail.com
information0123@gmail.com
Subscribe to:
Posts (Atom)