Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Hardware

Convicted of endangering their computers?

By Bill Detwiler March 9, 2006, 4:42 AM PST on Twitter billdetwiler

Image
1
of 11

Plants need water--most computers don't
Plants need water--most computers don't
Convicted of endangering their computers?

Plants need water--most computers don't

© Webshots

Plants need water--most computers don't

ntJust because you can take your laptop into the bathroom, doesn’t mean you should. Unfortunately, users often ignore common sense and place expensive computer equipment in harms way. From soft drink spills to duct-tape fixes, these users are support calls just waiting to happen. I recommend they all be convicted for endangering their computers.
nt
ntPosted by Bill Detwiler
ntSection Editor, TechRebuplic
nt
ntSure, a few plants add a nice Zen quality to your workspace, but this user is ignoring the first rule of mixing computers and vegetation–don’t put the plants above the electronics. Water runs downhill.
nt
ntu00a9 Webshots – emily_ak

© Webshots
Convicted of endangering their computers?

Computer desk or garbage dump?

Computer desk or garbage dump?

ntBy hiding the computer under a mountain of trash, this user is cleverly protecting it from would-be thieves. I can hear the user asking a support tech “Is grease in the power supply a bad thing?”
nt
ntu00a9 Webshots – jipjob

Convicted of endangering their computers?

Watch where you sit

Watch where you sit

ntThis user is letting her computer “air dry” after a friend spilled a beverage on it. Although the spill is bad enough, my favorite aspect of this picture is the laptop’s precarious position on the desk chair. I would hate to see this ThinkPad become a $1,500 seat cushion. Luckily, the user has applied an overabundance of colorful stickers to the machine’s top that will alert passers by.
nt
ntu00a9 Webshots – nikiwfu

Convicted of endangering their computers?

Sink full of keys

Sink full of keys

ntThis hungry user spilled Ramen noodles all over her keyboard. Hopefully she’ll be able to put all the keys back together again.
nt
ntu00a9 Webshots – audder100

Convicted of endangering their computers?

Peach-flavored laptop

Peach-flavored laptop

ntThis user spilled peach schnapps on her laptop. What’s funny about her situation is that she’s following her friend Katie’s advice for “tent drying” the machine. How did Katie know what to do? She spilled hot chocolate on her Dell laptop, and Dell Support suggested this very technique. This user should have learned from her friend’s mistake and not kept open containers of schnapps around her laptop in the first place.
nt
ntu00a9 Webshots – katelyn928

Convicted of endangering their computers?

Duct tape wiring job

Duct tape wiring job

ntUndeterred by a broken power cord, this enterprising user mended the cable with duct tape. I’m a huge fan of fixing problems with duct tape, but not exposed wires. She should have replaced the power cord or, at the very least, used electrical tape. I see call to tech support in her future, or the fire department.
nt
ntu00a9 Webshots – jaxx121

Convicted of endangering their computers?

Death by fruit punch

Death by fruit punch

ntAnother case of a keyboard cut down in its prime by a careless spill. The keyboard functioned for a short time after the spill, but quickly gave up the ghost.
nt
ntu00a9 Webshots – midolm

Convicted of endangering their computers?

Kids and Dell Dimensions eat mac and cheese

Kids and Dell Dimensions eat mac and cheese

ntAlthough not as serious as a liquid spill, solid food can still gum up CD drives, power switches, and ports.
nt
ntu00a9 Webshots – eyesclosedtight377

Convicted of endangering their computers?

Some spills have a sliver lining

Some spills have a sliver lining

ntThis user reported getting “a new, better computer for free” because of the spill that lead to this drying session. I wonder who footed the bill for the replacement–the retailer, the vendor’s warrantee, or an insurance plan.
nt
ntu00a9 Webshots – onelovetmc3

Convicted of endangering their computers?

Waiting to chase the mouse

Waiting to chase the mouse

ntNothing improves a laptop’s performance more than cat hair! Heck, I doubt this laptop is going to last long enough for the hair to be a problem. This laptop is sitting so far over the edge, a sudden move by our sleepy feline could send the machine onto the floor.
nt
ntu00a9 Webshots – mere8414

Convicted of endangering their computers?

Bathroom laptop

Bathroom laptop

I saved the best for last. Yes, laptops are portable computers you can take almost anywhere, but come on! The bathroom is a veritable mine field of laptop dangers–water, hard floors, soap, slippery surfaces. Did I mention the water? This user may get lucky and never have an accident. But my cynical side knows better. This ThinkPad will likely end up in pieces on the ceramic tile or fried in the sink.

Submitted by fritchbitch

  • Hardware
  • Account Information

    Share with Your Friends

    Convicted of endangering their computers?

    Your email has been sent

Share: Convicted of endangering their computers?
Image of Bill Detwiler
By Bill Detwiler
Bill Detwiler is the Editor for Technical Content and Ecosystem at Celonis. He is the former Editor in Chief of TechRepublic and previous host of TechRepublic's Dynamic Developer podcast and Cracking Open, CNET and TechRepublic's popular online show.
  • Account Information

    Contact Bill Detwiler

    Your message has been sent

  • |
  • See all of Bill's content

TechRepublic Premium

  • TechRepublic Premium

    Checklist: Network and systems security

    Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups. It stands to reason that cybersecurity pros who effectively identify network and systems risks ...

    Published:  June 1, 2023, 4:00 PM EDT Modified:  June 2, 2023, 7:48 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to host multiple websites on Linux with Apache

    In this guide from TechRepublic Premium we’re going to explore the various things you can do with a Linux server. We won’t leave out any steps, so you won’t have to refer to another tutorial to complete the process. The only step we will leave out is the installation of Linux, as we’ll assume you ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:45 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to deploy an application with Kubernetes

    If you want to deploy applications into a Kubernetes cluster, be warned — it’s not the easiest task. There are a lot of moving pieces that go into these scalable containers. Don’t you wish you had a complete roadmap, from start to finish, to walk you through the process of deploying the Kubernetes cluster, deploying ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:51 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cross-training tool kit

    The more flexibility you can create in your technology workforce, the better you’ll be equipped to manage tomorrow, whatever the future brings. Too often, we focus on helping our teams become technical specialists who know volumes about a single technology, but quickly lose sight of how that technology connects with others. This makes their skills ...

    Downloads
    Published:  May 30, 2023, 4:00 PM EDT Modified:  May 31, 2023, 4:50 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice