Solved

How do I open my ultraportable laptop (Vaio VGN 270P) to dust the CPU and fan? Removing screws doesn't do it.

Posted on 2008-06-15
6
1,429 Views
Last Modified: 2013-11-17
I have removed all 9 screws with arrows on the back, and I still can't pry the keyboard off this ultraportable notebook. It has been shutting down spontaneously, due to overheating I suppose. I can peek inside with the screws removed, but can't pry it apart, and I don't want to break it. Are there other steps I need to do?

The computer also has model number PCG 4D1L

Thanks a lot!!!

Stewart
0
Comment
Question by:sdesoto
  • 3
  • 2
6 Comments
 
LVL 19

Expert Comment

by:pheidius
ID: 21790024
0
 

Author Comment

by:sdesoto
ID: 21790085
No, my computer is much smaller than that one. Mine is a T series. The link is for an S series Vaio.

It looks like this one:

http://www.notebookreview.com/default.asp?newsID=2502&review=Sony+VAIO+T270P%2FL+Notebook+%2D+VGN%2DT270P%2FL
0
 
LVL 32

Accepted Solution

by:
Mark earned 500 total points
ID: 21790220
Here is the service manual for the VGN-T series
Your model is actually the VGN-T270P (pcg-4D1L)
http://home.comcast.net/~nw_systems/vgnT.pdf
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Closing Comment

by:sdesoto
ID: 31467409
Thanks, much appreciated! You must have quite an inventory of such documents!

Stewart
0
 

Author Comment

by:sdesoto
ID: 21790354
I see why he is a wizard...
0
 
LVL 32

Expert Comment

by:Mark
ID: 21792384
Thank you for the comments.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question