Solved

How do I remove a wireless card on a toshiba tecra M!

Posted on 2009-04-03
1
590 Views
Last Modified: 2013-11-09
Hello,

I am having issues that point to a defective wireless adapter. I want to remove the existing adapter to see it and get the part number so that I can look for a spare part to replace it.
I am familiar with the removal of the keyboard to get to the place where you can add memory, etc. But the wireless adapter appears to be in an area that does not seem as easy to get to, so I am looking for instructions for the removal of the wireless card.
Does anyone have a link with the instructions for this task?

Thank you.
0
Comment
Question by:Aguillon1949
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 7

Accepted Solution

by:
tplaya07 earned 500 total points
ID: 24064117
0

Featured Post

Defend Your Organization from The Greatest Threats

Looking to fill the gaps in your security? Bring together information from the network, endpoint and threat intelligence feeds to really see what's happening in your organization. Join the WatchGuardians in their adventures fighting cyber crime!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Deploying additional Sonicpoints 3 165
Network Upgrade 4 85
Multiple Wireless Networks, Same SSID 8 167
How to Create Separate Guest WiFi VLAN on Netgear R8000 19 143
This article describes how to perform a hard reset on your router. Usually this is most-useful on wireless routers, but the same concept applies to nearly all home/SOHO routers. This process will return the router to factory defaults, so record your…
This article is split into background info to start and actual review at bottom: Some time ago I wanted to sell a system with both wired and wireless capability but at minimum expense.  Having visited my trusted online auction I was pleasantly su…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question