We get asked quite a lot about how to best clean a computer. Here are some tips to help you keep the shine on without damaging the components.
- Always turn off and unplug your computer before coming at it with any liquid, including cleaning wipes.
- Cleaning the screen is best done with a dry microfiber cloth. Some computers come with a cleaning cloth, but you can also use window-cleaning cloths found at many stores.
- If there are spots on the screen that can’t be cleaned with a dry cloth, water is your next best bet–but never clean a screen when it’s hot. Use a light spray on a cloth, never on the screen, and take care that water doesn’t drip or spray into any crevices in the computer or monitor.
- If water isn’t doing the trick, you can purchase spray or wipes specifically formulated to clean a computer screen. Again, don’t put anything wet on a hot screen, and don’t let liquid get inside the computer or monitor.
- With any of these methods, be sure not to apply significant force to the screen. It is possible to break screens, so be careful.
- If you are using an external keyboard, unplug it from the computer before cleaning. If you’re cleaning a laptop keyboard unplug and turn off the computer before cleaning the keyboard.
- Remove crumbs and debris by gently shaking the keyboard upside down over a waste receptacle.
- For a more thorough de-crumbing you can use a vacuum with a dusting attachment to try to suck out crumbs.
- Condensed air is also an option for removing debris from keyboards, but it has to be used carefully to avoid blowing things further under the keys.
- Most computer manufacturers suggest water for cleaning keyboards. Use a damp (not dripping!) cloth.
- For tougher cleaning jobs, we often use damp (again, not dripping) wipes to clean keyboards. These are not generally recommended by manufacturers, however, so use care.
- As a last resort for an external keyboard (not part of a laptop, and not a bluetooth (wireless) keyboard) that has stopped working because of a sticky spill, you can run it through the dishwasher. Make sure you securely tape up any USB or other ports, and turn the drying cycle off before you run it through. After taking it out, turn it upside down for at least two days to ensure that it is completely dry before trying it out. No guarantees, but we have seen it work.
Cleaning a Mouse
- Unplug the mouse from your computer before cleaning.
- Older, mechanical mice can get a lot of gunk inside them. To clean:
- Turn the mouse upside down and twist the retaining plate to remove it.
- Turn it right side up to remove the ball. You can wipe the ball with a damp cloth.
- Turn the mouse upside down again, and gently scrape off debris from the rollers inside the ball cavity. The trick is to remove the gunk without allowing it to fall into the circuitry of the mouse. As you scrape it off, periodically turn the mouse right side up and shake it out.
- When you’re done de-gunking the rollers, reassemble the mouse and test it out. If necessary, take it apart again to finish the job.
- For optical mice, a damp cloth on the exterior is all that’s needed.
Cleaning the Case
- Always shut down and unplug your computer before bringing anything damp or wet near it.
- You can wipe a computer case with a cloth dampened with water, or a commercial wipe.
- You can use a damp cloth or wipe for the trackpad, but as with all areas on your computer, be careful around the crevices.
At this time of year it is important to take precautions against theft of your electronic devices. What can you do limit the chance of theft, and how can you prepare in case the worst happens? Read on.Don’t Leave Valuables Unattended
It only takes a moment for a computer to be stolen. When you’re working in a public place like the Library, never leave your computer unattended and unlocked, even for a few minutes. Bring it where you’re going, have a friend hold on to it–or better yet, invest in a lock and anchor it securely to an immovable objectTurn on Tracking
On a Mac, System Preferences/iCloud allows you to turn on Find my Mac, which will track your device and allow you to wipe it remotely or play an alarm if it is detected on line. Windows 10 has a “Find My Device” option in Settings/Update & Security, which will show you where your device is. There are other 3rd-party options for different platforms–Prey is one option for Android, Linux, as well as Mac, iOS and Windows.Know your Serial Number
Your serial number will be helpful for law enforcement if your computer is recovered. Many computers have the serial number printed on the computer or a sticker attached to it; if you don’t have a sticker or can’t read it, search online for how to find it on your computer–or for a Mac just use Apple–>About this Mac. If you need to know the serial number of your Hampshire-owned computer, IT has a record of it.Know your MAC Address(es)
Your computer has a “Media Access Control” (MAC) address which uniquely identifies it on each network connection it has. For example, there is a MAC address associated with the wireless connection, and a different one associated with its Ethernet connection (if it has one). The MAC address can be used to track the computer if it’s connected to the internet. View instructions for determining the MAC address of many different types of devices. If you need the MAC address of your Hampshire-owned computer, IT has a record of it.Keep your Files Backed Up
Losing your computer can be devastating, but losing your files can be irrecoverable. Keep your files backed up either on an external drive or on a cloud service. If you use an external drive to backup, always store it separately from your computer–you don’t want it to be stolen with your computer.What to do if your Computer is Stolen
If your computer is stolen from campus, notify campus police as soon as you realize it; if you’re off campus, call the local police. If it is a Hampshire-owned computer, let the IT Help Desk know. If you have a record of your serial number and MAC addresses, provide them to the police. If you have taken our advice and set up a device tracker, check to see if you can locate your device, and consider other options as allowed by the tracker–for instance, to play an alarm or erase the drive.