About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Tip of the Week: How to Keep a Laptop Tidy

Tip of the Week: How to Keep a Laptop Tidy

I don’t mean to gross you out, but have you ever considered how disgusting your laptop is? Studies have compared the relative cleanliness of a keyboard and a toilet seat… and unfortunately, the keyboard wasn’t the cleaner of the two. This is why it makes sense to regularly give your laptop devices a good cleaning, and why we’ve put together some tips to ensure you safely sanitize a laptop device.

To do so, we’ll start at the screen, and work our way around from there.

Cleaning the Screen

Use a Microfiber Cloth to Clear Dust

Unless you want to ruin your screen (and we can’t imagine why you would) you can’t just grab any old cloth and start scrubbing. Microfiber cloths are ideal for clearing dust from computer (or laptop) screens. Ideally, you will have access to microfiber, but if you’re in a pinch, almost any cloth will work… it may just leave some lint. Having said that under NO circumstances should you use paper towels or tissues.

In addition, try not to press too hard as you’re dusting your screen. You could cause some damage by applying too much pressure.

Carefully Clean the Screen

Remember, we’re working with an electronic device here - water isn’t going to get along with it too well. To protect your laptop, you will want to use distilled water. Soaking a clean sponge, and wringing it out until it’s practically dry, lightly wipe your screen. If there are still spots, you might add a small drop of gentle dish soap into your distilled water. If your device has a touchscreen, check if the soap is safe for its finish.

You have some other options as well, if you aren’t comfortable bringing water so close to your laptop. A cleaning wipe is a good option, as long as it doesn’t contain ammonia or bleach (as these can damage your screen). Whatever you do, don’t use a commercial glass cleaner on your device.

There are screen-cleaning kits made specifically for this purpose, so when in doubt, use one of those. Once your screen is cleaned, you can get rid of any streaks by gently rubbing it with a clean microfiber cloth in a circular motion.

Cleaning the Keyboard

Shaking Out Debris

Most of the cleanliness issue around the keyboard area pertains to debris working its way into the keys. Cleaning out your laptop’s keyboard is much like cleaning out a desktop’s keyboard: hold it upside-down and shake - although you will, of course, want to be very careful while doing this with your laptop. Tilting it slightly can help get extra junk out as well.

Using Compressed Air

Whatever you can’t shake out, you can likely blow out with a can of compressed air. In order to avoid simply pushing the debris further into your device, you should apply the compressed air at a 75-degree angle.

Cleaning the Keys

Finally, the keys themselves. You can use a cotton swab to gently (are you seeing a pattern yet?) get the rest of the grime from them. If the grime is proving stubborn, lightly dampening the swab with rubbing alcohol can help loosen it - on top of giving your keys a nice polish!

Cleaning the Case

Polishing Your Device

Finally, you should get rid of any remaining grime on the rest of your laptop. Similarly to your display, you will want to create a basic cleanser. Again, don’t use bleach, ammonia, or any other store-bought cleansers (unless these cleansers are designed to clean electronics).

For this cleanser, use equal parts rubbing alcohol and distilled water. You will want to make sure that none of this gets on the screen, as the rubbing alcohol can damage it. Barely dampening a sponge  - it shouldn’t drip - in your solution, gently clean your laptop’s exterior and (if you so choose) the touchpad. Avoid the ports - we’re taking care of them next, and it would be a shame to damage the device at this point.

Spot-Treatment on Small Details

The rest of the crevices around the device, including the ports, should be gently cleaned with cotton swabs and compressed air. Once this has been done to your satisfaction, give your entire device another once-over with a microfiber cloth, and your device will be clean!

Once this process is completed, your laptop will be considerably cleaner. This means you’ll probably feel a little better about being productive with it! For more tips regarding your technology and how to best use it, subscribe to our blog!

Have You Figured Out Your Next Technology Implemen...
Will U.S. Leaders Consider Data Privacy?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, April 23, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IP Address Network Security Save Time Employer Employee Relationship Running Cable Fraud Web Server cloud computing Environment Programming Professional Services Computers Google Docs Data Management Business Computing Windows10 Relocation Conferencing Search Network Management Legislation Google Maps Microchip Social Media Documents Bitcoin Upgrade Patching Hosted Solutions Download In Internet of Things Trends Content Filtering Data Analysis Regulation Bandwidth Health Patch Management Hacker Managed IT Facebook Hacking Business Value Telephony Distribution Staffing Business Cards Cleaning Update uptime Cost Electricity Productuvuty Disaster Recovery GDPR Printers Physical Security Gaming Console Skype Apps Windows Workers Business Mangement Backup LiFi communications Device security Computer Malfunction Proxy Server Redundancy Productivity Managed Service Provider Mobile Computing Permissions Monitors Supercomputer Internet of Things G Suite Machine Learning Net Neutrality Content Hacks Risk Management Managed Service Computing Infrastructure Hard Drive IT Management Consultation End of Support Digital Signature Efficiency Application Data Protection Reading Desktop Business Intelligence Wireless Wireless Technology Mobile Security Going Green Word News Project Management Multi-Factor Security outsource cloud computing Healthcare Microsoft 365 User Tip VoIP Wi-Fi Cost Management Data Finance Disaster Google Play Bring Your Own Device Applications Technology Tips Windows 8 Quick Tips Two-factor Authentication Private Cloud Voice over Internet Protocol Remote Computing Email Business Technology Software License File Sharing Office Tips Shortcut Domains Capital Windows Server 2008 UTM Help Desk Cache Service Level Agreement Social Engineering App Analytics History Heating/Cooling Avoiding Downtime Virtual Assistant BDR Virtualization Printing Augmented Reality Securty Displays Users Uninterrupted Power Supply Smartphones Tech Support Congratulations Asset Tracking Unified Threat Management Thank You Cooperation Robot hardware Outlook Retail Medical IT Regulations Processing Gamification Time Management Customer Relationship Management A.I. Computer Accessories IT Social Networking Business Metrics Browsers Gadgets Hiring/Firing Backup and Disaster Recovery User Tips Logistics HTML Chamber cloud storage Mobile Device Management Vulnerability IT Consultant Telephone Systems Social Business Owner Black Market YouTube Society Customer Service Technology Legal Mobile Payment Competition Electronic Medical Records Transportation Advertising Corporate Profile Data Warehousing Business Continuity Human Resources Wireless Headphones Tech Term Dark Web Miscellaneous Bookmark Product Reviews Productivity Apple Messenger Operating System Current Events Microsoft Office Automation Ransomware Fake News iPhone Tip of the Week Lithium-ion battery Cybercrime Television Budget Chromebook Analytic Text Messaging Citrix Xenapp Blockchain Proactive IT Business Management Smart Tech Monitoring Phishing Downtime CCTV Software Vendor Samsung Telephone System Safety Downloads Mouse Settings Fileless Malware Managed IT services WannaCry Tracking How To IT Support Migration Network Congestion Privacy Digital Flexibility Connected Devices WiFi Spyware Troubleshooting Management Teamwork email scam Communication Laptop Tactics Startup Fleet Tracking the Internet of Things Printer Recovery Sports Data Recovery Windows 10 Navigation Experience Devices Phone System Tablet PDF Distributed Denial of Service IT service Information Technology Data storage Database Customer Resource management Processors Websites IT Plan Licensing Statistics Password IT Support Server cloud Equifax Excel Inbound Marketing Drones Unified Threat Management Co-Managed IT 3D Printing Screen Reader outsource cloud storage Money Encryption Mobile Technology Scam Politics Maintenance Company Culture Identity Theft Alert Smartphone SaaS Gmail Webcam Computer Repair Security CrashOverride Visible Light Communication Computer Care Presentation Travel Hack Cortana Mobility User Bluetooth Directions Employer-Employee Relationship Meetings Memory Health IT Entrepreneur Cybersecurity HIPAA Google Drive Touchscreen Error Emails CIO Addiction Tip of the week Banking Modem Processor Windows 10 Passwords Public Cloud Big data IT Services Solid State Drive Specifications clout services Browser Data Security Micrsooft Small Business Trending Audit Nanotechnology Data Breach Data Loss IBM Virus Assessment Outsourced IT Taxes Accountants Vendor Management Integration Electronic Payment Emergency IT consulting Law Enforcement Chrome Flash Digital Payment SSID Information Hard Drives Pain Points Google Wallet Artificial Intelligence Automobile Writing Sync Firewall Vendor Mangement Multi-factor Authentication Worker eWaste SharePoint Public Speaking Internet Best Practice Access Control VoIP Innovation PowerPoint Mobile Device Training Cryptocurrency Fiber-Optic Knowledge Marketing Tech Start Menu Motion Sickness Rapid City Business Growth Cabling Managed IT Service Music Term Read Hosted Solution Work/Life Balance Piracy User Error Keyboard DDoS Office 365 Collaboration Intranet Tablets Microsoft Excel Books switches Managing Stress Freedom of Information Google Calendar Unified Communications Website Spam Paperless Office Mobile Devices Best Practices BYOD Storage Virtual Reality Reliable Computing cyber security Administration Solutions MSP Document Management Botnet Saving Time Upgrades Android Malware Networking Holiday Deep Learning Entertainment Compliance Hard Drive Disposal Streaming Media Hackers Vulnerabilities Access Network Workplace Tips Evernote Office Save Money Notifications Software as a Service Tech Terms Virtual Desktop Social Network Scalability Government Administrator Remote Monitoring Education Username Windows 7 Rental Service Google Computer Antivirus Best Available Computing Language Twitter VPN Microsoft Windows XP Saving Money Router Bata Backup Security Cameras Telephone Enterprise Resource Planning Data Backup USB Managed IT Services Comparison Upload

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150