Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Hardware

Careless user spills milk/fruit punch on computer twice

By Bill Detwiler September 19, 2007, 5:10 AM PDT on Twitter billdetwiler

Image
1
of 17

327926619JlNapR_ph.jpg
327926619JlNapR_ph.jpg
Careless user spills milk/fruit punch on computer twice

Milk, milk everywhere but not a drop to dink

Milk, milk everywhere but not a drop to dink

You would think someone who spills milk on their computer would learn that uncontained liquids and PC hardware don’t mix. You would be wrong.

Webshots member Midolm experienced two separate spills, merely 5 days apart.

You can see more careless user antics in these galleries:

Careless users prove PCs and drinks don’t mix

Convicted of endangering their computers?

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

The offending glass of milk

The offending glass of milk

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Chatting during the spill

Chatting during the spill

Midolm was chatting at the time of the incident.

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Milk on the printer

Milk on the printer

The computer wasn’t the only victim. This printer was caught in the crossfire.

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Soaked papers

Soaked papers

Hopefully, these papers weren’t important or the user had electronic copies.

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Milk drips from table onto computer

Milk drips from table onto computer

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Milky mouse

Milky mouse

At least this is an optical mouse and has fewer opening than an old roller ball model.

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Milk under the keyboard and CD cases

Milk under the keyboard and CD cases

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Milk under the monitor also

Milk under the monitor also

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Spill number two: Red fruit punch

Spill number two: Red fruit punch

Unfortunately, this individual failed to take precautions after her first spill. Less than five days after the “milk incident” this glass of fruit punch would prove a more dangerous foe.

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Fruit punch all over the computer keyboard

Fruit punch all over the computer keyboard

This time, the spill was not confined to the table. The fruit punch went all over the computer keyboard.

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Fruit punch goes in one side and out the other

Fruit punch goes in one side and out the other

So much fruit punch spilled into the keyboard’s right side, that it ran out the left side.

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

This is going to be a sticky keyboard

This is going to be a sticky keyboard

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Cleaning up the keyboard

Cleaning up the keyboard

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Fruit punch under the monitor

Fruit punch under the monitor

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

Pouring the spilled fruit punch from the keyboard

Pouring the spilled fruit punch from the keyboard

© Webshots – midolm

Careless user spills milk/fruit punch on computer twice

That's a lot of fruit punch

That's a lot of fruit punch

Hopefully, after the second spill, this user will be more careful with drinks around her computer.

© Webshots – midolm

  • Hardware
  • Account Information

    Share with Your Friends

    Careless user spills milk/fruit punch on computer twice

    Your email has been sent

Share: Careless user spills milk/fruit punch on computer twice
Image of Bill Detwiler
By Bill Detwiler
Bill Detwiler is the Editor for Technical Content and Ecosystem at Celonis. He is the former Editor in Chief of TechRepublic and previous host of TechRepublic's Dynamic Developer podcast and Cracking Open, CNET and TechRepublic's popular online show.
  • Account Information

    Contact Bill Detwiler

    Your message has been sent

  • |
  • See all of Bill's content

TechRepublic Premium

  • TechRepublic Premium

    Hardware inventory policy

    This policy describes guidelines your organization can follow to track, process and decommission IT equipment. From the policy: SUMMARY An organization’s IT hardware inventory constitutes a significant capital investment in order to perform company operations. Because hardware represents a critical asset and often holds organizational data, it is important for the company to track each ...

    Published:  January 23, 2023, 11:00 AM EST Modified:  January 24, 2023, 11:00 AM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Malware response checklist

    Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is to be minimized. Because even the best protected networks become infected, all organizations must have ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 1:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Checklist: Securing Windows 10 systems

    Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10 deployments follow this checklist from TechRepublic Premium. Also included in this checklist: Security solutions Product ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cloud data storage policy

    Third-party cloud-based file storage applications such as Dropbox, OneDrive and Google Drive have all contributed to the success of business cloud data storage. These products have brought proven flexibility and ease of data access to users and businesses alike while ensuring security of confidential information. Cloud data storage offers many benefits to consumers and companies ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 3:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice