Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Clean Your PC Like an IT Pro

Tip of the Week: How to Clean Your PC Like an IT Pro

Just as anything else will, a computing device will need some TLC to keep it physically clean and in tip-top shape. In order to clean your system safely, you will need proper tools, and the know how to properly clean your PC.

For a basic cleaning, a can or two of compressed air and lint-free wipes should suffice. For jobs that will require a little more elbow grease, you will need to add a few more items to this list--a small screwdriver, cotton swabs, and isopropyl alcohol (make sure it's isopropyl, and not ethyl-based).

Cleaning Out the Desktop
Before you get started, keep in mind that you’ll be dealing with some pretty sensitive hardware. We highly recommend having an experienced technician handle this for you.

First and foremost, you’ll want to completely power-down your system. This includes not only powering down the machine but also killing power to the surge protector it is plugged into and removing the power supply cord from your system. Wipe down the case exterior using a static-free dust cloth and get rid of dust that has been caught in the external vents, preferably by using your compressed air once the case has been opened. For dust bunnies of above-average size and other assorted crumbs, carefully go through and wipe them away with cotton swabs before using the compressed air to rid the system of the remaining dust.

As you use the compressed air, be sure not to sustain the stream for too long, as it could damage some of the more sensitive components of your system. You should also be very careful of what you touch in the system and avoid any bare or soldered wire to avoid serious electric shock. As you will almost certainly be generating static, make sure that you touch the metal and plastic frameworks frequently enough to keep you fairly equalized.

Once you’ve finished with that, close the case back up and go over it again with your dust cloth.

While it may be tempting to just take a vacuum to the buildup of dust in your system, don’t. The bristles on the vacuum are notorious for generating static, which can easily damage the delicate internal parts that your system relies on to function.

Making Your Screen Spic and Span
There is little more annoying than fingerprints and smudges streaking up your screen, especially when you are trying to focus on your work. Fortunately, cleaning the screen of your display is fairly similar to cleaning a window, with a few special considerations.

If you utilize an LCD display, applying a half and half mixture of distilled water and white vinegar to a microfiber cloth and gently wiping the screen works wonders to rid it of debris. If you still operate a CRT monitor, an ammonia-free glass cleaner will do just fine while preserving the screen’s coating. Make sure that you don’t spray the device with whatever liquid you use in either case. Instead, apply the cleanser directly to the cloth and wipe down the screen that way.

Keeping the Keyboard and Mouse Clean
Of all of your computer’s components, the keyboard and mouse will be the ones that are exposed to the most debris and bacteria as they are handled almost constantly during computer use. To do a basic cleaning, unplug your keyboard from the rest of the system and turn it upside-down, gently shaking it to dislodge any crumbs and other particles that are trapped between the keys. Another option is to use a can of compressed air, spraying between the keys at a 45-degree angle. Once you’re confident that most of the accumulated mess is cleared away, gently flip it over and shake it out again before carefully wiping it with an antibacterial wipe and drying it with a microfiber cloth.

If your keyboard is a membrane type keyboard, it is possible to remove the keys to get a good, comprehensive clean. Before you do so, be sure to create a record of the keyboard’s layout so your keys may be replaced properly.

To remove the keycaps, use the small screwdriver to gently pry them from their housing. However, because they can be difficult to put back on, leave larger keys (like the space bar, shift, and enter) on the keyboard as it is being cleaned. Use compressed air, cotton swabs, and isopropyl alcohol to clean out the grime that was hiding under the keys. Once you’re satisfied, snap the keycaps back in place and test thoroughly.

As far as the mouse goes, the overwhelmingly more common LED-sensor models will only need to be wiped down with a lint-free cloth and a few quick swabs of rubbing alcohol.

A Clean Workstation is a Happy Workstation
Keeping your computer clean can provide many benefits beyond just the aesthetic value. Equipment will likely run better, last longer, and be less apt to make you sick through exposure to simmering bacteria and germs. For more ways to optimize your technology experiences, make sure you keep checking back to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Windows Managed IT Services Phishing Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Office Cloud Computing Passwords Windows 10 Tech Term Chrome Virtualization Gadgets Social Media Saving Money Holiday Managed Service Microsoft Office Managed IT Services Automation Cybercrime Operating System Computers Facebook Artificial Intelligence Health Networking IT Support Hacking Internet of Things BYOD Wi-Fi Mobile Device Management Information Covid-19 Managed Service Provider Spam Office 365 Telephone Systems Alert Information Technology Remote Bandwidth Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Money Human Resources Encryption Applications Big Data Remote Monitoring Data Breach Law Enforcement App History Mobile Computing Application Password Apps Paperless Office Data Storage Patch Management Remote Computing Mobile Office Government Office Tips Private Cloud Training How To Managed IT VPN Blockchain Two-factor Authentication Vulnerability Windows 7 Word Mouse HaaS Google Drive Infrastructure Voice over Internet Protocol Servers Avoiding Downtime Flexibility Data Security Marketing Wireless WiFi IT solutions Entertainment Website Gmail Budget Bring Your Own Device Data Management Settings Work/Life Balance Staff Software as a Service Telephone System Vendor Virtual Reality Conferencing Machine Learning Apple Managed Services End of Support Display Connectivity Remote Work Education Physical Security Scam Social Safety User Error HIPAA Sports Redundancy Employee/Employer Relationship Meetings Keyboard RMM Vendor Management Risk Management Data Protection Hacker The Internet of Things Save Time Lithium-ion battery USB Cleaning Firewall Managed Services Provider SaaS Humor Battery Database Update Shadow IT Remote Workers Legal Business Intelligence Network Congestion eWaste Google Docs Audit Processor Internet Exlporer Worker Identity Theft IT Management Botnet PDF Hard Drive IT Plan Wearable Technology Augmented Reality Proactive IT Hard Drives Computing Fraud Retail Unsupported Software Instant Messaging Virus Best Practice Robot Excel Remote Worker YouTube Charger Black Market Unified Threat Management Biometrics Computer Accessories Cryptocurrency Compliance Computer Care Virtual Desktop OneNote Current Events Digital Signage Document Management Telephony Wireless Technology Samsung DDoS Comparison Solid State Drive How to Downtime CES SharePoint Printer Value Bluetooth Procurement Workplace Strategy Data storage Net Neutrality Content Management Automobile Spam Blocking Business Technology Electronic Medical Records Help Desk Access Control Customer Service Environment Printing Computing Infrastructure Virtual Assistant Hiring/Firing Going Green Authentication IT Consultant Fax Server IT service Point of Sale Tip of the week Personal Reputation webinar Cryptomining Streaming Media Emergency Cables Content Professional Services Supply Chain Management Public Cloud Tech Support Employer Employee Relationship Tablet Batteries Project Management Laptop Assessment Nanotechnology Telecommuting Monitoring Techology Domains Windows 8.1 Windows Server 2008 Digitize Customers Cortana Digital Signature Audiobook Tools Windows Server 2008 R2 Warranty Touchpad Television IaaS Maintenance Customer relationships Email Best Practices Consultant Bloatware IT Assessment Manufacturing HVAC Google Apps Analysis Politics Advertising Analytics Tablets Managed IT Service Administrator Public Computer Security Cameras Devices Computer Tips Virtual CIO Regulations Best Available Entrepreneur OneDrive Biometric Security Enterprise Content Management Notifications Transportation Accountants WIndows 7 Peripheral Computer Fan MSP Rootkit Using Data Microchip Thought Leadership Credit Cards Shortcut Digital Security Cameras Cost Management Copiers Relocation Workers 5G Password Management Benefits Password Manager Multi-Factor Security Social Networking Quick Tip FENG Search Engine IBM Smartwatch Twitter Ergonomics Video Games Worker Commute Flash Development OLED NIST Smart Technology Business Mangement Windows Media Player Smart Tech Running Cable Trending Experience User PCI DSS PowerPoint Virtual Machine Scalability Software Tips Memory Fiber Optics Supercomputer Employee Addiction Amazon 2FA Business Owner Sync Messaging Emails Cabling Recycling NarrowBand Practices Managing Stress Policy Hypervisor Wiring Search Trend Micro Cache Amazon Web Services Dark mode SMS iPhone Netflix Cameras Default App Safe Mode Two Factor Authentication Criminal GDPR Hosted Computing Procedure Root Cause Analysis Science Saving Time HBO Shopping Knowledge Google Search Wireless Internet Music Online Shopping dark theme Skype AI Files IT Infrastructure File Sharing Camera Chromecast Bing Inventory Distributed Denial of Service Specifications Customer Relationship Management FinTech Data loss Outlook Analyitcs Social Network Leadership Wire Troubleshooting Evernote Travel Start Menu Programming Colocation Printer Server Investment Uninterrupted Power Supply Employee/Employer Relationships Printers Loyalty Millennials Employees Screen Mirroring Windows 365 Frequently Asked Questions Monitor ISP Smart Office Books Wireless Charging Antivirus Mobile Video Conferencing Windows 10s ROI Bitcoin Virtual Private Network Shortcuts Workforce Sales Cast Windows 8

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code