starclick

Wednesday, 24 July 2013

Speed up your internet by 20%
 
Click Start then Run and type "gpedit.msc" without quotes. This opens the group policy editor.
Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.
 
Double click on Limit Reservable bandwidth.
 It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO (0). This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well. 

Tuesday, 23 July 2013

An IPv6 Configuration for Your LAN

Your Subnet as  16-bit subnet:-

IPv4 has the 192.168.*.*, 172.16-31.*, and 10.*.*.* ranges; IPv6 has one range that is enormously bigger than all of those three put together, which can contain

1,329,227,995,784,915,872,903,807,060,280,344,573 devices. The standard is to use a subnet randomly chosen, to minimize conflict. This page has just generated a 16-bit subnet for you, usable for a maximum of 65534 devices:

fd2f:84c9:7052:2627:4a40:71aa:6d88:xxxx
fd2f:84c9:7052:2627:4a40:71aa:6d88::/16 

Using the above 16-bit subnet, the following is the first IP:
fd2f:84c9:7052:2627:4a40:71aa:6d88:0001
and this is the last:
fd2f:84c9:7052:2627:4a40:71aa:6d88:FFFE 

And just as with v4, you will need a subnet mask. The subnet mask for any 16-bit v6 subnet, is:
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:0000 

The reverse DNS zone name, for the above zone, is:
8.8.d.6.a.a.1.7.0.4.a.4.7.2.6.2.2.5.0.7.9.c.4.8.f.2.d.f.ip6.arpa
 
Please note that the GUI of Windows Server 2008 and 2008 R2, support only 64-bit subnets for reverse DNS setup. So to keep subnet size manageably small, we use command line to create the v6 reverse DNS container object, and then add/change using GUI. A command line in Server 2008 and Server 2008 R2, to create the reverse DNS server object for the above v6 subnet, is:

dnscmd . /ZoneAdd 8.8.d.6.a.a.1.7.0.4.a.4.7.2.6.2.2.5.0.7.9.c.4.8.f.2.d.f.ip6.arpa /DsPrimary /DP /domain
The Windows Server GUI works perfectly well for forward DNS of all sizes as well as NIC configuration, and is therefore recommendable.

Your Subnet as  48-bit subnet:-

IPv4 has the 192.168.*.*, 172.16-31.*, and 10.*.*.* ranges; IPv6 has one range that is enormously bigger than all of those three put together, which can contain

1,329,227,995,784,915,872,903,807,060,280,344,573 devices. The standard is to use a subnet randomly chosen, to minimize conflict. This page has just generated a 24-bit subnet for you, usable for a maximum of 16,777,214 devices:

fddd:e112:833d:b6ad:a47b:xxxx:xxxx:xxxx
fddd:e112:833d:b6ad:a47b::/48
 
Using the above 48-bit subnet, the following is the first IP:
fddd:e112:833d:b6ad:a47b:0000:0000:0001

and this is the last:
fddd:e112:833d:b6ad:a47b:FFFF:FFFF:FFFE

And as with v4, you will need a subnet mask. The subnet mask for any 24-bit v6 subnet, is:
FFFF:FFFF:FFFF:FFFF:FFFF:0000:0000:0000
The reverse DNS zone name, for the above zone, is:

b.7.4.a.d.a.6.b.d.3.3.8.2.1.1.e.d.d.d.f.ip6.arpa
Please note that the GUI of Windows Server 2008 and 2008 R2, support only 64-bit subnets for reverse DNS setup. So to keep subnet size manageably small, we use command line to create the v6 reverse DNS container object, and then add/change using GUI. A command line in Server 2008 and Server 2008 R2, to create the reverse DNS server object for the above v6 subnet, is:

dnscmd . /ZoneAdd b.7.4.a.d.a.6.b.d.3.3.8.2.1.1.e.d.d.d.f.ip6.arpa /DsPrimary /DP /domain
The Windows Server GUI works perfectly well for forward DNS of all sizes as well as NIC configuration, and is therefore recommendable.

Your Subnet as  32-bit subnet:-

IPv4 has the 192.168.*.*, 172.16-31.*, and 10.*.*.* ranges; IPv6 has one range that is enormously bigger than all of those three put together, which can contain

1,329,227,995,784,915,872,903,807,060,280,344,573 devices. The standard is to use a subnet randomly chosen, to minimize conflict. This page has just generated a 32-bit subnet for you, usable for a maximum of 4,294,967,293 devices:

fd81:a04f:f070:77ee:61be:f06c:xxxx:xxxx
fd81:a04f:f070:77ee:61be:f06c::/32 

Using the above 32-bit subnet, the following is the first IP:
fd81:a04f:f070:77ee:61be:f06c:0000:0001

and this is the last:
fd81:a04f:f070:77ee:61be:f06c:FFFF:FFFE

And as with v4, you will need a subnet mask. The subnet mask for any 32-bit v6 subnet, is:
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:0000:0000 

The reverse DNS zone name, for the above zone, is:
c.6.0.f.e.b.1.6.e.e.7.7.0.7.0.f.f.4.0.a.1.8.d.f.ip6.arpa
 
Please note that the GUI of Windows Server 2008 and 2008 R2, support only 64-bit subnets for reverse DNS setup. So to keep subnet size manageably small, we use command line to create the v6 reverse DNS container object, and then add/change using GUI. A command line in Server 2008 and Server 2008 R2, to create the reverse DNS server object for the above v6 subnet, is:

dnscmd . /ZoneAdd c.6.0.f.e.b.1.6.e.e.7.7.0.7.0.f.f.4.0.a.1.8.d.f.ip6.arpa /DsPrimary /DP /domain
The Windows Server GUI works perfectly well for forward DNS of all sizes as well as NIC configuration, and is therefore recommendable.

Your Subnet as  64-bit subnet:-

IPv4 has the 192.168.*.*, 172.16-31.*, and 10.*.*.* ranges; IPv6 has one range that is enormously bigger than all of those three put together, which can contain

1,329,227,995,784,915,872,903,807,060,280,344,573 devices. The standard is to use a subnet randomly chosen, to minimize conflict. This page has just generated a 64-bit subnet for you, usable for a maximum of 18,446,744,073,709,551,613 devices:

fd8e:c733:f055:134e:xxxx:xxxx:xxxx:xxxx
fd8e:c733:f055:134e::/64

Using the above 64-bit subnet, the following is the first IP:
fd8e:c733:f055:134e:0000:0000:0000:0001

and this is the last:
fd8e:c733:f055:134e:FFFF:FFFF:FFFF:FFFE 

And as with v4, you will need a subnet mask. The subnet mask for any 64-bit v6 subnet, is:
FFFF:FFFF:FFFF:FFFF:0000:0000:0000:0000
The reverse DNS zone name, for the above zone, is:

e.4.3.1.5.5.0.f.3.3.7.c.e.8.d.f.ip6.arpa
64-bit subnets are certainly usable on a LAN, but they are far larger than necessary, and smaller ones may be more manageable; please see the links below! Please note that Windows Server 2008 and 2008 R2 support only 64-bit subnets (the kind on this page) in the GUI reverse DNS setup.

If you would like to create a reverse DNS zone for the above subnet by command line in Windows Server 2008 (or 2008 R2), the following works well:
dnscmd . /ZoneAdd e.4.3.1.5.5.0.f.3.3.7.c.e.8.d.f.ip6.arpa /DsPrimary /DP /domain

Friday, 19 July 2013


IPv6 tutorial


Internet has been growing extremely fast so the IPv4 addresses are quickly approaching complete depletion. Although many organizations already use Network Address Translators (NATs) to map multiple private address spaces to a single public IP address but they have to face with other problems from NAT (the use of the same private address, security…). Moreover, many other devices than PC & laptop are requiring an IP address to go to the Internet. To solve these problems in long-term, a new version of the IP protocol – version 6 (IPv6) was created and developed.
IPv6 was created by the Internet Engineering Task Force (IETF), a standards body, as a replacement to IPv4 in 1998. So what happened with IPv5? IP Version 5 was defined for experimental reasons and never was deployed.
While IPv4 uses 32 bits to address the IP (provides approximately 232 = 4,294,967,296 unique addresses – but in fact about 3.7 billion addresses are assignable because the IPv4 addressing system separates the addresses into classes and reserves addresses for multicasting, testing, and other specific uses), IPv6 uses up to 128 bits which provides 2128 addresses or approximately 3.4 * 1038 addresses. Well, maybe we should say it is extremely extremely extremely huge :)
IPv6 Address Types
Address TypeDescription
UnicastOne to One (Global, Link local, Site local)
+ An address destined for a single interface.
MulticastOne to Many
+ An address for a set of interfaces
+ Delivered to a group of interfaces identified by that address.
+ Replaces IPv4 “broadcast”
AnycastOne to Nearest (Allocated from Unicast)
+ Delivered to the closest interface as determined by the IGP
A single interface may be assigned multiple IPv6 addresses of any type (unicast, anycast, multicast)
IPv6 address format
Format:
x:x:x:x:x:x:x:x – where x is a 16 bits hexadecimal field and x represents four hexadecimal digits.
An example of IPv6: 
2001:0000:5723:0000:0000:D14E:DBCA:0764
There are:
+ 8 groups of 4 hexadecimal digits.
+ Each group represents 16 bits (4 hexa digits * 4 bit)
+ Separator is “:”
+ Hex digits are not case sensitive, so “DBCA” is same as “dbca” or “DBca”…
IPv6 (128-bit) address contains two parts:
+ The first 64-bits is known as the prefix. The prefix includes the network and subnet address. Because addresses are allocated based on physical location, the prefix also includes global routing information. The 64-bit prefix is often referred to as the global routing prefix.
+ The last 64-bits is the interface ID. This is the unique address assigned to an interface.
Note: Addresses are assigned to interfaces (network connections), not to the host. Each interface can have more than one IPv6 address.
Rules for abbreviating IPv6 Addresses:
+ Leading zeros in a field are optional
2001:0DA8:E800:0000:0260:3EFF:FE47:0001 can be written as
2001:DA8:E800:0:260:3EFF:FE47:1
+ Successive fields of 0 are represented as ::, but only once in an address:
2001:0DA8:E800:0000:0000:0000:0000:0001 -> 2001:DA8:E800::1
Other examples:
– FF02:0:0:0:0:0:0:1 => FF02::1
– 3FFE:0501:0008:0000:0260:97FF:FE40:EFAB = 3FFE:501:8:0:260:97FF:FE40:EFAB = 3FFE:501:8::260:97FF:FE40:EFAB
– 0:0:0:0:0:0:0:1 => ::1
– 0:0:0:0:0:0:0:0 => ::
IPv6 Addressing In Use
IPv6 uses the “/” notation to denote how many bits in the IPv6 address represent the subnet.
The full syntax of IPv6 is
ipv6-address/prefix-length
where
ipv6-address is the 128-bit IPv6 address
+ /prefix-length is a decimal value representing how many of the left most contiguous bits of the address comprise the prefix.
Let’s analyze an example:
2001:C:7:ABCD::1/64 is really
2001:000C:0007:ABCD:0000:0000:0000:0001/64
+ The first 64-bits 2001:000C:0007:ABCD is the address prefix
+ The last 64-bits 0000:0000:0000:0001 is the interface ID
+ /64 is the prefix length (/64 is well-known and also the prefix length in most cases)
In the next part, we will understand more about each prefix of an IPv6 address.
he Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for the assignment of IPv6 addresses. ICANN assigns a range of IP addresses to Regional Internet Registry (RIR) organizations. The size of address range assigned to the RIR may vary but with a minimum prefix of /12 and belong to the following range: 2000::/12 to 200F:FFFF:FFFF:FFFF::/64.
ipv6_Address_Allocation_Policy.jpg
Each ISP receives a /32 and provides a /48 for each site-> every ISP can provide 2(48-32) = 65,536 site addresses (note: each network organized by a single entity is often called a site).
Each site provides /64 for each LAN -> each site can provide 2(64-48) = 65,536 LAN addresses for use in their private networks.
So each LAN can provide 264 interface addresses for hosts.
-> Global routing information is identified within the first 64-bit prefix.
Note: The number that represents the range of addresses is called a prefix

ipv6_policy_ISP.jpg
Now let’s see an example of IPv6 prefix: 2001:0A3C:5437:ABCD::/64:
IPv6_prefix_length_example.jpg
In this example, the RIR has been assigned a 12-bit prefix. The ISP has been assigned a 32-bit prefix and the site is assigned a 48-bit site ID. The next 16-bit is the subnet field and it can allow 216, or 65536 subnets. This number is redundant for largest corporations on the world!
The 64-bit left (which is not shown the above example) is the Interface ID or host part and it is much more bigger: 64 bits or 264 hosts per subnet! For example, from the prefix 2001:0A3C:5437:ABCD::/64 an administrator can assign an IPv6 address 2001:0A3C:5437:ABCD:218:34EF:AD34:98D to a host.
IPv6 Address Scopes
Address types have well-defined destination scopes:
IPv6 Address Scopes              Description
Link-local address+ only used for communications within the local subnetwork (automatic address configuration, neighbor discovery, router discovery, and by many routing protocols). It is only valid on the current subnet.
+ routers do not forward packets with link-local addresses.
+ are allocated with the FE80::/64 prefix -> can be easily recognized by the prefix FE80. Some books indicate the range of link-local address is FE80::/10, meaning the first 10 bits are fixed and link-local address can begin with FE80, FE90,FEA0 and FEB0 but in fact the next 54 bits are all 0s so you will only see the prefix FE80 for link-local address.
+ same as 169.254.x.x in IPv4, it is assigned when a DHCP server is unavailable and no static addresses have been assigned
+ is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).
Global unicast address+ unicast packets sent through the public Internet
+ globally unique throughout the Internet
+ starts with a 2000::/3 prefix (this means any address beginning with 2 or 3). But in the future global unicast address might not have this limitation
Site-local address+ allows devices in the same organization, or site, to exchange data.
+ starts with the prefix FEC0::/10. They are analogous to IPv4′s private address classes.
+ Maybe you will be surprised because Site-local addresses are no longer supported (deprecated) by RFC 3879 so maybe you will not see it in the future.

All nodes must have at least one link-local address, although each interface can have multiple addresses.
However, using them would also mean that NAT would be required and addresses would again not be end-to-end.
Site-local addresses are no longer supported (deprecated) by RFC 3879.
Special IPv6 Addresses
Reserved Multicast AddressDescription
FF02::1+ All nodes on a link (link-local scope).
FF02::2+ All routers on a link
FF02::5+ OSPFv3 All SPF routers
FF02::6+ OSPFv3 All DR routers
FF02::9+ All routing information protocol (RIP) routers on a link
FF02::A+ EIGRP routers
FF02::1:FFxx:xxxx+ All solicited-node multicast addresses used for host auto-configuration and neighbor discovery (similar to ARP in IPv4)
+ The xx:xxxx is the far right 24 bits of the corresponding unicast or anycast address of the node
FF05::101+ All Network Time Protocol (NTP) servers
Reserved IPv6 Multicast Addresses
Reserved Multicast AddressDescription
FF02::1+ All nodes on a link (link-local scope).
FF02::2+ All routers on a link
FF02::9+ All routing information protocol (RIP) routers on a link
FF02::1:FFxx:xxxx+ All solicited-node multicast addresses used for host auto-configuration and neighbor discovery (similar to ARP in IPv4)
+ The xx:xxxx is the far right 24 bits of the corresponding unicast or anycast address of the node
FF05::101+ All Network Time Protocol (NTP) servers

Thursday, 18 July 2013

RAID 0, RAID 1, RAID 5, RAID 10 Explanation

On most situations you will be using one of the following four levels of RAIDs.
  • RAID 0
  • RAID 1
  • RAID 5
  • RAID 10 (also known as RAID 1+0)
This article explains the main difference between these raid levels along with an easy to understand diagram.

In all the diagrams mentioned below:
  • A, B, C, D, E and F – represents blocks
  • p1, p2, and p3 – represents parity

RAID LEVEL 0


Following are the key points to remember for RAID level 0.
  • Minimum 2 disks.
  • Excellent performance ( as blocks are striped ).
  • No redundancy ( no mirror, no parity ).
  • Don’t use this for any critical system.

    RAID LEVEL 1

    Following are the key points to remember for RAID level 1.
  • Minimum 2 disks.
  • Good performance ( no striping. no parity ).
  • Excellent redundancy ( as blocks are mirrored ).

RAID LEVEL 5


Following are the key points to remember for RAID level 5.
  • Minimum 3 disks.
  • Good performance ( as blocks are striped ).
  • Good redundancy ( distributed parity ).
  • Best cost effective option providing both performance and redundancy. Use this for DB that is heavily read oriented. Write operations will be slow.
  • RAID LEVEL 10

Wednesday, 17 July 2013

What are the various types of Cat x cables

The commonly found Category (Category is the full form of Cat) x cables include Cat 5, Cat 5E, Cat 6, Cat 6A, Cat 7, Cat 7A. All these cables differ in the amount of bandwidths/ frequencies they can support, distance for which they support such bandwidth, amount of copper, number of twists, ability to defer EMI and Alien Cross Talk interferences, size, etc. We will see two important factors for each type of the Cat x cable below:
(Though the distances in some of the below cases might be referred to as 100 meters, in practice it is 90 meters UTP cable and 10 meters patch cord distance).
Cat 3 Cable – Supports 10 Base-T Standard for bandwidths up to 10 Mbps over a maximum distance of 100 meters. They can support frequencies in the range of 0-10 Mhz.
Cat 5/5E Cable – Supports 100 Base-T Standard for bandwidths up to 100 Mbps over a maximum distance of 100 meters. They can support frequencies in the range of 0-100 Mhz. Cat 5E cables can support 1000 Base-T as well.
Cat 6 Cable – Supports 1000 Base-T Standard for bandwidths up to 1000 Mbps over a maximum distance of 100 meters. Cat 6 standard can support frequencies in the range of 0-250 Mhz. They also support 10GE bandwidth over limited distances.
Cat 6A Cable – Supports 10G Base-T standard for bandwidths up to 10 Gbps over a maximum distance of 100 meters. Cat 6A standard can support frequencies in the range of 0-500 Mhz.
Cat 7 Cable – Supports 10G Base-T standard for bandwidths up to 10 Gbps over a maximum distance of 100 meters. Cat 7 standard can support frequencies in the range of 0-600 Mhz. It offers better performance and improved cross talk suppression over the Cat 6A cables.
Cat 7A Cable – Supports 10G Base-T standard for bandwidths up to 10 Gbps over a maximum distance of 100 meters. In addition to this, they can also support 40 Gbps bandwidth for around 50 meters and 100 Gbps bandwidth for around 15 meters. They support frequencies in the range of 0-1000 Mhz.

Friday, 12 July 2013

Open Command Prompt in a Folder

When you open the command prompt, it opens up in either User or System folder depending upon whether you ran it as administrator or not. Now the thing is, if you want to execute a file in any particular folder, you would have to use the change directory(cd) command to navigate to the folder which can be a problem if the directory is nested way too deep.



To ease things you can open the folder in your Windows Explorer, hold Shift key when you right-click in the folder and select Run command window here to directly open the CMD prompt with the path to that folder directly.

Thursday, 11 July 2013

 Enable F8 Key to on Safe Mode Windows 8
Windows 8 offered a new begin operating device that reduced the rate that  windows 8 begins. Unfortunately, to be able to do this needed to eliminate the capability to accessibility the Impressive Start Choices display when you press the F8 key when windows begins. This designed that there was no quick way to accessibility Secured Strategy any longer by simply pushing the F8 key while windows begins. Instead to be able to accessibility Secured Strategy, you would need to either begin windows 8 and then tell it to reboot into protected technique or for windows to are failed to begin, where you could then tell windows reboot again into protected technique. Regardless of how you did, it became a 2-3 level procedure to accessibility the windows 8 Secured Strategy rather than a 1-step procedure that we have become familiar with.

In my perspective having accessibility analytic resources quickly is more important than men some a few minutes off of the time it takes windows to begins. With that said, this information will describe how to allow the F8 key in windows 8 so you can quickly accessibility the Secured Strategy begin options and other analytic resources. As a make up, by allowing this choice on a dual-boot program with several operating-system, you will now find it easier to choose the os you wish to use when you begin your computer.


To enable the F8 key in Windows 8 you will first need to open a command prompt as an Administrator

When the elevated command prompt is open you will be at the C:\Windows\System32> prompt. To enable F8 in Windows 8 you need to type the following in the command prompt and then press the Enter key.

bcdedit /set {default} bootmenupolicy legacy

Once you enter the above text, your command prompt should look like:



F8 key enable on windows 8



Once the command has been enter as shown above, press the Enter key on your keyboard. If you entered the command correctly, Windows will report that the "The operation completed successfully.". You now need to restart your computer for the change to go into effect. With this settings configured, you can now press F8 while Windows 8 starts in order to access Safe Mode and other Advanced Boot options.

If you would like to disable the F8 key and go back to the original Windows 8 setting you can open an elevated(Administrator Mode) command prompt and enter the following command:

bcdedit /set {default} bootmenupolicy standard

Once you enter the above command, press Enter on your keyboard. If you entered the command correctly, Windows will report that the "The operation completed successfully." and you should now restart your computer. The F8 key will now be disabled in Windows 8.

Thursday, 4 July 2013

Make your own Free Cabinet Files (.cab)

Make your own Free Cabinet Files (.cab)

icon.jpg
Like many people i have Thousands of old files that i rarely need to use but just cant do without.
By Archiving them into Cabinet files, you can save alot of disk space than you would by simply putting them into ordinary zip files, Making them ideal for old wedding photos, videos and so on.

You dont need any Special software for this simple 2 step procedure, all of the software is already installed on windows so this wont cost you a penny and with no risk of downloading anything harmful.

In Windows 2000 and all other versions since then like XP and so on, there is a Hidden Dos program called MakeCab.exe which allows users to create compressed Cabinet files, We cant open this program directly so we need to do some typing.

Cabinet files are like the Big Brother of Zip folders and are read only, you can still open them like you would any other Zip folder, they are just as easily sent over the internet and opened by someone who maybe doesnt have zip capabilities.


Step 1.

Choose your files that you want to Compress and put them in a folder, I used C:\files (change it to whatever suits you).

Now you need to create a directive file for the MakeCab.exe program.
The basics are listed below, In NotePad just copy and paste the following text and list the files at the bottom like i have.


.OPTION EXPLICIT ; Will Generate errors for mistakes
.set DiskDirectoryTemplate=CDROM ; All cabinets go into a folder
.Set CompressionType=MSZIP ;** All files are compressed to cabinet files
.Set UniqueFiles="OFF"
.Set Cabinet=on

; Destination Folder
.Set DiskDirectory1=c:\cabinets

; File name for the new cab file
.Set CabinetNameTemplate=Sample.cab

; Files to be added are listed below
c:\files\a.txt
c:\files\b.txt


In the menu click Save As, Where it says 'Save as Type:' change it to All Files, Save it as c:\a.ddf .

Everything that follows the ; semicolon is treated as a comment and ignored by the compiler, you dont need the comments in the actual file but it will help you understand what you typed and where to put stuff.

Step 2.

Open the start menu and click run, Type cmd and click ok.

You should now see the command prompt window, type the following:

makecab /f c:\a.ddf

If youre Successful some information should appear and the folder c:\cabinets will be created with your file inside of it, if you do get errors the cabinet file wont be created, look at the errors listed and you should easily understand them enough to correct any mistakes and try again.

If you only want to compress a single file then skip the first 2 steps and in command prompt type.

makecab C:\files\simple.txt c:\Cabinet.cab

This compresses the simple.txt file into a file called Cabinet.cab



And thats it, Now you can Archive to your hearts content.

Wednesday, 3 July 2013

How to Save a Laptop from Liquid Damage

  1.  

    How to Save a Laptop from Liquid Damage

  2.  Shut it off! Immediately remove the battery, the A/C adapter, and unplug the device after the spill. The biggest danger at first is the device shorting out. The electrolytic activity of combining electricity and liquids will begin as soon as the liquid contacts the powered circuits so removing the power and battery immediately is essential.
  3. 2
    Disconnect and remove any and all external devices.
  4. 3
    Turn it upside down immediately to stop the liquid from traveling deeper into the machine.
  5. 4
    Clean up any part of the spill you can get to. Use paper towels or any absorbent material that is lint-free.
  6. 5
    Inspect the keyboard. Some keyboards are designed to protect the internals from liquids:
  7. 6
    Wipe up anything sticky. This may include the screen, the keys on the keyboard, and any buttons. Use a clean, slightly dampened, lint-free cloth.
  8. 7
    Insulate yourself from static discharge. Static electricity can be very high voltage. Static discharge from your hands and body can destroy even a dry computer. Learn how to Avoid Destroying a Computer With Electrostatic Discharge.
  9. 8
    Disassemble the case. If you cannot get to the whole spill, then it may be necessary to remove the laptop's case. Some spills can contain chemicals that can corrode internal circuit boards:
    • If you aren't comfortable taking your device apart, then get it to someone who is, as soon as possible.
    • Pull the hard drive to protect your data.
    • Remove as many cards or drives as you can.
  10. 9
    Remove dry residue. Use a toothbrush or lint-free cloth to gently remove any dried residue from non-water stains such as cola or coffee. Blow the residue away with compressed air, or use a vacuum cleaner with an adjustable power setting or bypass valve to ensure a gentle attempt is made at removing the residue when it has dried to a powder.
  11. 10
    Rinse off the residue. If you spilled anything besides water on the laptop, rinsing it clean will be the most dramatic part. There are several ways to rinse your machine, depending on the kind of spill, and how much risk you are willing to endure:
    • Think about what has been spilled on/in your computer, and determine whether it is water soluble or petro-chemical based. In the case of the former, deionized water will work fine. If it is oily, etc., then rinse with denatured alcohol, and then rinse with deionized water.
    • Rinse with water. Take any components that have residue (a fresh spill or an old spill of cola) and rinse them under the tap. Most circuit boards and similar non-moving components handle water well, as long as they are not powered. Some internal components with moving parts may not handle water well, for example, fans and CD/DVD drives.
    • Rinse with deionized or distilled water. Many people prefer to rinse with deionized water over tap water. Regular water will leave deposits that can cause electrical shorts, but deionized water will rinse clean, dry, and leave nothing behind.
    • Don't get too carried away rinsing your machine. Water and laptops do not mix, either. Rinse as much as you need to, and not more. Carefully blot up excess water, if any.
  12. 11
    Let it dry. Be completely sure that the parts are dry before you proceed. As with rinsing, there are different theories on drying:
    • Dry naturally. Prop the machine up, away from surfaces, so that air can circulate in and around the entire unit. Leave the machine to dry for 24 to 48 hours. While it is drying, place the laptop battery in a bowl of uncooked rice.
    • Dry with light heat. Place your deck on a warm radiator or on top of a warm sill or shelf - out of direct sunlight - or near other source of warmth. Do not use high levels of heat, just moderately warm sources of heat. Let it dry for 12 hours, or so. A nearby dehumidifier may improve drying time. High heat will drive moisture and humidity further into the device and will ensure ongoing problems as that moisture causes oxidation and corrosion.
    • Never use a hair dryer, as this will cause static problems and fill your machine with more contaminants and dust. A hair dryer at a high setting could also melt some of the plastic components. In extreme cases the hair dryer will drive moisture deeper into the circuits and components and that moisture will oxidize and create capacitive load connections under and inside of integrated circuits and connectors, eventually causing failure of the device. The best way to remove all residual moisture is to patiently draw it away with a vacuum cleaner held over the affected areas for up to 20 minutes in each accessible area, having already removed the majority of liquids and moisture manually and dried all visible moisture by hand, so that none enters the vacuum cleaner. This method is preferable to leaving it to dry naturally as it halts any oxidation from occurring deep inside small surface mount components and connections, that can result in issues later on.
  13. 12
    Clean with a solvent. A second rinse with a solvent-based cleaner is recommended by some, and abhorred by others. It is recommended if the unit has been sitting long enough to be subject to corrosion and oxidation before repair and cleaning is attempted. Always use gloves and ensure good room ventilation when handling any solvent or alcohol based cleaners as some are known carcinogens.
    • If you suspect that your first rinse did not remove all of the residue, a chemical rinse of this kind may be worth the risk. The advantages of such a rinse are: there is only one substance to apply and remove; that substance, typically, evaporates; long drying times are not required. The disadvantage is that, if you use the wrong solvents, you can literally dissolve your computer.
    • Buy and use 99% (not 90%) isopropyl alcohol. Never, ever use gasoline or acetone to clean computer parts.
    • Using a cotton swab and/or soft toothbrush, carefully rub or wipe each component of the board, until it is clean.
    • Try flux remover, a spray-on can available in electronics stores, rather than isopropyl alcohol.
    • The damage does not happen when the laptop gets wet, the damage occurs when the current from the battery short circuits due to the water which can really put you out a couple hundred dollars. Make sure the laptop is absolutely dry before turning it back on.
  14. 13
    Put the laptop back together, and test it to see if it is working.
  15. 14
    If the laptop doesn't turn on, take it to a customer service center.

Every Admin Should Know These Commands Active Directory 1.   To quickly list all the groups in your domain, with members, run this c...