pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Motherboard Heatsinks

It’s important to fit your CPU with some form of processor cooling device. In the case of a conventional heat sink and fan assembly, be aware that just because a fan says it’s suitable for a given CPU form factor, it’s no guarantee that it’ll fit your particular motherboard.

Heatsink

If the thermal pad that comes with the heat sink is too large for the processor chip it’s being attached to – as is the case here – it’s best to remove it.

This is easily done by scraping it off and then cleaning off the residue with an appropriate solvent.

Use the same solvent to clean up your CPU. It’s safe to do this with the processor already fit in the motherboard, so long as you take care. All you’ll need is a dab of solvent on your lint-free cloth to do this.

Thermal

You’ll now need to use an appropriate compound in place of the removed heat sink thermal pad.

Place a dab of this in the centre of the processor chip.

Heatsink

Then carefully position the heatsink on top of the CPU, lining up the heel end of the heatsink clip with the CPU socket tab.

 

Using a screwdriver press down the opposite heatsink clip, lifting it over the other CPU socket tab so that the entire assembly is securely clamped into place.

Fan

Locate the motherboard CPU fan pin header and connect the fan power connector. This should be keyed to ensure correct orientation.

  • Motherboard Upgrade Reasons
  • Motherboard Removal
  • Motherboard CPU
  • Motherboard Heatsinks
  • Motherboard Memory Identification
  • Motherboard Memory Installation
  • Motherboard Fit
  • Motherboard Power
  • Motherboard Panel
  • Motherboard Fan
  • Motherboard USB Ports
  • Motherboard FireWire Ports
  • Motherboard Audio
  • Motherboard Testing
  • Motherboard Floppy Connections
  • Motherboard IDE Connections
  • BIOS Settings
  • Motherboards and Win98
  • Motherboards and WinXP

Filed Under: How to Upgrade Your Motherboard

Latest Articles

ADSL Implimentation

In the UK, BT (British Telecom) commenced pilot trials of its ADSL technology - in north and west London - in late 1998. Early the following year, the company announced that it planned to spend £250m upgrading 400 local exchanges - out of … [Read More...]

Technical guide to the Intel Penryn Core 2 Processor

The Penryn CPU is another in Intel's line of Core 2 processors and the first fabricated using its 45nm die technology. The processors replace the 'Merom' range of processors, the and dual- and quad-core versions catering for the differing requirements of consumer machines. The Penryn is … [Read More...]

When To Move To A Dedicated Server

The right time to move to a dedicated server often isn't that obvious. Essentially, when a shared environment is no longer providing the performance the services, or the options that your website needs, you're going to start looking for alternatives. The option of a dedicated server is at … [Read More...]

AI-Driven Software Improves Trading Strategies for Investors

Artificial intelligence technology is changing the state of modern finance. A growing number of investors are utilizing AI to improve the … [Read More...]

What You Need to Know When Choosing the Best VPN for an iPhones

Today millions of people have smartphones; most use them to access the Internet. Research shows that more than 50% of Internet users access it with … [Read More...]

Must-Have Software and Apps Every Remote Worker Should Have on Their PC in 2023?

In the last few years, the future of work has changed permanently. In a survey conducted near the end of 2020, 72% of people were fully remote, with … [Read More...]

Cloud Technology Changes the Calculus of Risk Management in a Global Economy

Cloud technology has changed the state of the global economy in previously unimaginable ways. Ninety-four percent of enterprises utilize some form of … [Read More...]

Risk Management Considerations in an Artificial Intelligence Environment

Risk management is about identifying, assessing, evaluating, and prioritizing risk. Although risk management has been practiced in some ways since … [Read More...]

New Software and GPS Tools Help Parents Monitor their Children

More parents are using technology to keep their children safe. One survey from Pew Research in 2016 showed that 30% of parents use technology to block … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

What is a Computer Virus?

If you've never had to deal with a computer virus yet, consider yourself lucky. But mark these words: If you don't have sufficient protection on … [Read More...]

Blu-ray Region Codes

Blu-ray Region codes: DVD region codes were introduced to try to give movie studios some control over global distribution for their movie releases. … [Read More...]

Browser Hijacker– Sweet Page

Classified as adware, Sweet Page is also popularly known as the browser hijacker. This adware is bundled with free programs that can be availed by the … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors