5 3D Printing Mistakes Every Beginner Will Want To Avoid






An FDM 3D printer is no joke. It’s a robot that flings around a print head, melting plastic at 400 degrees Celsius (over 750 degrees Fahrenheit), using motors powerful enough to rapidly dismantle itself and anything else in its path. Beginner mistakes in 3D printing can therefore range anywhere from wasted filament to raging house fires. Fortunately, modern 3D printers have you covered for the latter category by making the process genuinely beginner friendly. This hobby is nevertheless rife with a number of gotchas that can leave a novice seething in frustration.

There are a dozen different ways to ruin a print, ranging from failing to perform cold pulls between filament changes, to something as insignificant as letting the filament retract into the spool for even a split second. As someone new to the hobby, you might be tempted to get started with generic filament profiles, but long-term success only comes with learning how to run calibration prints to figure out the optimal nozzle/bed temperature, or dialing in the nozzle offset for proper bed adhesion. Worse yet, failing to sufficiently dry materials such as PETG, TPU, or PA will ruin prints. And that’s even if you get everything else right.

While you will learn best practices like these over the course of your 3D printing journey, here are some beginner mistakes that aren’t commonly discussed in the FDM printing discourse. However, knowing them beforehand will give you that much needed push to thrive in this challenging hobby.

Using PLA for the wrong applications

PLA is widely considered the training wheels of 3D printing. It’s simple enough to help beginners learn 3D printing concepts while retaining most of their hair. PLA can be printed a good 50 to 80 degrees Celsius (122 to 176 degrees Fahrenheit) lower than engineering filaments such as ABS and PA (nylon), which also makes it resistant to warping. While engineering materials struggle with complex 3D model geometries that require extensive bridging and supports, PLA does that with ease while also sporting higher tensile strength, so why do serious engineering applications rarely use the seemingly wonderous filament?

That’s because the material tends to creep under pressure. In layman’s terms, PLA spontaneously deforms at room temperature when subjected to any degree of load. Print a VESA monitor mount using PLA and you’ll eventually wake up to a loud crash and a materials science lesson worth several hundred dollars. The unfortunate tendency of the polymer to deform under pressure also renders it unsuitable for any application that requires fasteners. That practically includes all serious engineering endeavors.

PLA is also useless for outdoor usage, thanks to its low glass transition temperature of 50 degrees Celsius and poor UV resistance. The former is the temperature at which the material begins to soften, whereas the latter causes it to disintegrate when exposed to sunlight. No PLA parts allowed on the patio, or inside your car. Learn more about the material in our comprehensive guide.

Meanwhile, engineering materials such as ABS, ASA, Nylon, and polycarbonate don’t exhibit these shortcomings. But these materials aren’t beginner friendly because they require expensive 3D printers equipped with enclosed and heated print chambers.

Choosing the wrong printer for your needs

If you plan on printing exclusively with PLA, you don’t need a fancy CoreXY printer with an enclosed build chamber like the Prusa Core One+ or Bambu Lab X1C. In fact, filaments like PETG are perfect for light engineering use cases where PLA would otherwise fail. The material doesn’t creep like PLA, has good strength and toughness, and it can also sustain a sufficient degree of heat exposure for indoor use. And it can also be printed effortlessly on a cheap bed-slinger without the need for an enclosure.

TPU, which is one of the toughest, most indestructible materials in consumer 3D printing, is another filament that plays well with bed-slingers equipped with a direct drive extruder, like the Prusa MK4S or the Bambu Labs A1 Mini. Investing in an expensive CoreXY printer with heated chamber is an exercise in futility for an FPV drone hobbyist who prints nothing but TPU.

On the flip side, none of the aforementioned bed-slingers are truly capable of printing engineering filaments like ABS, ASA, PC, and PA. These filaments need an enclosed chamber and high temperature nozzles at the bare minimum, whereas larger PC and PA parts absolutely require actively heated print chambers to avoid serious warping and cracking issues.

Want to 3D print a lightweight RC model aircraft? You’re going to need a printer like the Bambu Lab P1S to handle the foaming LW-ASA filament ideal for that purpose. Print the same airframe in PLA or PETG, and it won’t last the drive to your flying club on a hot summer afternoon. The same goes for any 3D printed component that will have to withstand impact, pressure, fasteners, UV exposure, or a significant amount of ambient heat common with automotive and robotics projects. If you are in the market for a new 3D printer, it pays to familiarize yourself with these tips.

Not spending enough time and effort on first layer adhesion

Beginners who start off printing PLA on cheap bed slingers like the Ender series of printers from Creality, often learn an expensive lesson in compatibility between the filament and build plate material. PLA prints effortlessly on any build plate, including cheap printers with glass beds, but things go horribly wrong when you naturally progress to printing PETG on the same build plate. Turns out, PETG parts adhere so well to glass that they end up ripping chunks right off the build plate.

This can be remedied by using a painter’s tape, or PVA glue stick as a release agent. Or, better yet, by swapping the glass build plate out for the more appropriate textured PEI variety. In fact, engineering materials like ABS, ASA, and PC print well on smooth PEI build plates. Other filaments like PA call for special materials like G10 (also known as FR4 or Garolite) to achieve optimal print adhesion. Graduating from PLA to any serious 3D printing filament should be preceded by replacing incompatible stock build plates with an appropriate material.

Remember, how glue stick has been described as a release agent, and not an aid for bed adhesion? Using PVA glue as a band-aid for existing issues with bed levelling and nozzle offsets is another rookie mistake. There’s no need to rely on glue if you calibrate your first layer adhesion, dial in the correct nozzle offset, and use sensor aided bed mesh algorithms to compensate for printer beds with warping and/or any other geometrical imperfections.

Jumping on the printer upgrade bandwagon

At first, 3D printer upgrades sound fantastic. Why spend $1,100 on a Prusa MK4S, when you can purchase a Creality Ender-3 for well under $200 and throw in a few hundred dollars on top to match the former’s feature set? To answer the rhetorical question, that’s because improving existing 3D printer designs is far too complicated to DIY at home.

Most beginners discover this the hard way when they upgrade the stock Bowden hotend with a fancy direct drive upgrade. Print quality ironically suffers because the dual drive gear design causes inconsistent extrusion, which ruins surface quality. On the other hand, the single drive gear configuration of the stock Ender-3 hotend works with the forgiving nature of the Bowden tube to deliver cleaner prints. Worse yet, the added weight of the stepper motor on direct drive extruders also causes conspicuous ringing artefacts on prints.

Upgrading the stock V-slot roller-based motion system with fancy linear rails is another popular 3D printer upgrade that negatively affects print quality. The stock rollers are fashioned out of relatively soft polymers, which absorb vibrations and tiny geometric imperfections to deliver clean 3D prints. Linear rails are too precise, which ironically serves to exaggerate these issues plaguing budget 3D printers like the Ender-3.

The key takeaway here is that 3D printers are engineered to work optimally as a sum of their parts. While such upgrades improve reliability, longevity, and time between service intervals, they also upset the tenuous balance governing print quality.

Overlooking the dangers of 3D printing

How dangerous is 3D printing? Well, we know that 3D printers emit copious amounts of microplastics and volatile organic compounds, or VOCs. We also know that both of these pollutants are known to cause cancer. But, as anyone who has encountered California’s Proposition 65 warnings knows, practically everything can be carcinogenic to some degree. Even your kitchen countertop.

That still doesn’t change the fact that everything from talcum powder and Teflon to asbestos and tobacco were once considered safe, and for several decades at that! Consumer 3D printers, on the other hand, have only been accessible to the masses for little more than a decade. While the EPA continues to study microplastics and VOCs emitted by 3D printers, don’t be surprised if the status quo changes for the worse in the future. However, there is one way to quantify the risk of 3D printing emissions: The distinct new car smell, which is an insidious byproduct of VOCs off-gassed by the dashboard plastics.

Scientists are concerned about exposure to VOCs off-gassed from vehicle trim on a warm sunny day during an average commute. 3D printers, however, melt plastics at around 260 degrees Celsius (500 Fahrenheit) for the entire duration of a print. Worse yet, 3D printing with materials such as ABS and ASA is known to release copious amounts of VOCs. This includes styrene, which is a suspected carcinogen affecting the central nervous system. Believe it or not, that’s nothing compared to resin printing, which is significantly more toxic. That’s why we recommend keeping your 3D printer out of the bedroom and living spaces. Ensure sufficient ventilation and wear correct PPE (respirators and gloves) while handling toxic materials like 3D printing resins.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


gettyimages-2237093321

Moor Studio/Getty Images

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Spyware can track you, record calls, and steal phone data.
  • Watch for odd behavior, data spikes, unknown apps, and battery drain.
  • Use antivirus software, update regularly, and avoid untrusted app sources.

Spyware is one of the biggest threats to your mobile security and can severely impact your phone’s performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phishing links, emails, and messages.

While appearing to be a legitimate software package or useful utility, spyware will operate quietly in the background to monitor your movements, spy on your activities, and may also record your conversations, whether they are phone calls or social media threads. You may find your actions screenshotted, your call records logged, and even your physical location tracked via GPS. 

Also: 7 ways to lock down your phone’s security – before it’s too late

This information is then sent to a remote server and into the hands of someone else without your permission.

Similarly, a remote monitoring app promoted for parental use or work purposes could be abused and become a privacy invader rather than a legitimate service. 

Let’s explore the different types of spyware you might encounter, the warning signs of infection, and how to quickly remove it from your smartphone.

Spyware explained

It’s helpful to know the basic differences among types of spyware before you tackle infections on your handset.

Nuisanceware is bundled with mobile apps. It interrupts your web browsing with pop-ups, changes your homepage or search engine settings, may try to force you to watch videos, and may collect your browsing data to sell to ad agencies and networks. Although considered malvertising, it is generally not dangerous, as it focuses on generating illicit revenue by forcing ad views or clicks.

Also: As ransomware recedes, a new more dangerous digital parasite rises

There’s also generic mobile spyware. It steals operating system data, clipboard data, and anything of value, such as cryptocurrency wallet data or account credentials. Spyware isn’t always targeted and may be used in spray-and-pray phishing attacks.

Spyware may land on your device through phishing, malicious email attachments, social media links, fraudulent SMS messages, or physical device tampering.

Advanced spyware, sometimes also classified as stalkerware, is a step up from basic spyware. This malware is unethical and dangerous. It is sometimes found on desktop systems but is now more commonly installed on handsets. Stalkerware is typically used to spy on an individual and monitor what they do, say, and where they go, and is often linked to cases of domestic abuse.

Spyware and stalkerware may be used to:

  • Monitor emails, SMS, MMS messages, and other forms of communication sent and received, including Facebook and WhatsApp.
  • Intercept live cellular calls or Voice over IP (VoIP) applications.
  • Hijack camera functions to take photos and videos.
  • Screenshot mobile device screens and send them to a controller.
  • Track victims via GPS.
  • Conduct keylogging, account compromise, and data theft.

Finally, there’s government-grade commercial spyware, with Pegasus among the best-known variants. Unless you’re part of a group of specific interest to ethically challenged governments, it’s unlikely that it will impact you due to the expense of targeting victims.

Spyware warning signs

There aren’t always indicators of an infection attempt in real time, but the following scenarios could be warning signs that you are being targeted:

  • Receiving odd or unusual SMS messages, social media messages, or emails.
  • Strange permission, download, or software installation requests appear on your handset.
  • If your phone goes missing or is out of your possession for a period of time and then reappears with settings or changes you do not recognize, this may indicate that your device has been tampered with.
  • When it comes to stalkerware, initial infection messages may be more personal and tailored to the victim. Physical access to a handset may be necessary.

Also: I clicked on four sneaky online scams on purpose – to show you how they work

There are also signs you can watch for that may indicate your phone has been compromised. The most common are:

  • Power: You may experience unexpected handset battery drain, overheating, or sluggish performance.
  • Behavior: Strange behavior, such as GPS or camera functions turning themselves on and off without your input, or random reboots and unexplained crashes.
  • Pop-ups: If you are being bombarded with pop-ups, it’s likely that some form of adware is hidden on your handset. You may also find that your preferred search engine has been changed.
  • Increased cellular data usage: Information exfiltrated from your smartphone or hidden, active remote connections will use data.
  • Distortion: You may hear unusual noises or distortion during phone calls. Although this could simply be due to poor reception, it may also be a sign of interception.
  • On and off: You may also have trouble completely turning off your device, as more advanced spyware might prevent you from doing so.
  • Financial transactions: If spyware has obtained sufficient permissions, it may have signed you up for services or premium SMS plans you didn’t ask for.

Android

One telltale sign on an Android device is a setting that allows apps to be downloaded and installed outside of the official Google Play Store. If this setting is enabled, it may indicate tampering or jailbreaking without your consent. Not every form of spyware and stalkerware requires a jailbroken device, however.

Also: Your Android phone’s most powerful security feature is off by default and hidden – turn it on now

This setting is found in most modern Android builds in Settings > Security > Allow unknown sources. (This varies depending on the device and vendor.) You can also check Apps > Menu > Special Access > Install unknown apps to see if anything is unfamiliar.

Some forms of spyware also use generic names and icons to avoid detection. For example, they may appear to be useful utility apps such as calendars, calculators, utilities, or currency converters.

iOS

iOS devices that aren’t jailbroken are generally harder to infect with malware than Android handsets, unless a spyware developer is exploiting an unpatched vulnerability.

Also: How to lock down your iPhone to the extreme – so even the FBI can’t get in

However, the same principles apply. With the right tool, exploit, or software, your device could be compromised either with physical access or remotely. You may be more susceptible to infection if you have not updated your iPhone’s firmware to the latest version and you do not run frequent antivirus scans.

How to remove spyware from your smartphone

Spyware is often hard to detect and can be difficult to remove. It is not impossible in most cases, but it may take some drastic steps on your part.

When spyware, especially stalkerware, is removed, operators may receive an alert indicating that the victim’s device has been cleaned. Should the flow of your information suddenly stop, this would be another clear sign to the attacker that the malicious software has been removed. Do not tamper with your device if doing so would risk your physical safety.

Also: How to turn ChatGPT into a scam detector using the new Malwarebytes integration – for free

Instead, reach out to law enforcement and supporting agencies. Otherwise, here are some removal options:

  • Run a malware scan: There are mobile antivirus solutions available that can detect and remove spyware. This is the easiest solution available, but it may not be effective in every case. Cybersecurity vendors, including Malwarebytes.
  • Use a dedicated spyware removal tool: You can also use software specifically designed to detect and remove spyware. However, be careful to download tools only from reputable firms and official sources, as one of the most common ways to distribute malware is to disguise it as antivirus software. Check out the spyware removal apps offered by Bitdefender, Avast, and Malwarebytes.
  • Delete suspicious apps: Examine the list of installed apps on your handset and remove any you don’t recognize.
  • Check device administration controls: In advanced security settings, you can see if any suspicious apps have admin permissions. If so, you can try removing them, although this may require restoring your handset to factory settings.
  • Reboot in Safe mode: Restarting your smartphone in Safe mode prevents third-party software from running. On Android handsets, you can usually do this by long-pressing the power-off button and selecting Safe mode. This can allow you to safely uninstall apps — but it is not a failsafe solution against advanced spyware variants.
  • Update your operating system: It may seem obvious, but when an operating system releases a new version, which often includes security patches and upgrades, it can — if you’re lucky — cause conflicts and problems with spyware. Keep it updated.

Also: Rebooting your phone daily is your best defense against zero-click attacks – here’s why

If you have found suspicious software on your handset, consider changing your passwords and enabling biometrics.

If you suspect account compromise, change the passwords for every important account you have. Many of us have one or two central “hub” accounts, such as an email address linked to all of our other services. Remove access to any such hub services you use from a compromised device. 

For added security, consider changing your account passwords on a PC, forcing a logout on other devices, and enabling biometric authentication to prevent physical handset tampering.

An important point to mention is that sometimes spyware or other forms of malicious software might end up on your device via an initially benign app. There have been cases of developers releasing a genuine, useful app in official repositories, such as a currency converter or weather app, and then, after a large user base has been gathered, the developers twist the app’s functions into a Trojan through a software update.

If you recently downloaded a mobile app and now your phone is displaying odd behavior, consider removing it and running a malware scan.

Keeping spyware and stalkerware off your device

Unfortunately, no mobile device is completely protected against the scourge of spyware. However, we have provided some tips below to mitigate the risk of future infections:

  • Protect your device physically: Your first line of defense is to maintain adequate physical controls. Modern smartphones let you set PIN codes and patterns or use biometrics such as fingerprints or retina scans to prevent your handset from being physically tampered with.
  • Update your operating system: Install OS updates as soon as they are available. They contain security fixes and patches and are one of the most important lines of defense against malware.
  • Use antivirus software: Mobile antivirus solutions can detect and remove spyware. Running frequent scans will help protect your handset.
  • Only download apps from official sources: Most spyware and malware are found outside Google Play and the App Store, so be cautious about installing apps from third-party websites. Sometimes, malicious apps still slip through the net, so check reviews and app descriptions before installing anything new.
  • Enable app security: Enable built-in scanners that check any new app installs. On Android, you can find this setting in Security and privacy > App security.
  • Check permissions: You should monitor what permissions have been issued to which apps and when. If you haven’t used an app with extensive permissions for a while, consider deleting it. If any apps appear more intrusive than necessary, remove them and refuse to provide permissions on install.
  • Watch out for malicious links: Mobile malware is often spread through phishing and malicious links. These links may urge you to download apps from outside Google Play or the App Store and may be disguised as everything from antivirus software to streaming services.
  • Do not jailbreak your device: Jailbreaking not only voids your warranty but can also allow malicious apps and software to gain a deep foothold in your operating system, making removal extremely difficult.
  • Enable multi-factor authentication (MFA): When account activity and logins require further consent from a mobile device, this can also help protect individual accounts. (However, spyware may intercept the codes sent during 2FA protocols.)

If all else fails: Factory reset

Performing a factory reset and clean install on the device you believe is compromised may help eradicate some forms of persistent spyware. Make sure to back up important content first, as this process can’t be reversed. 

  • On Android platforms, the reset option is usually found under Settings > General Management > Reset > Factory Data Reset. 
  • On iOS, go to Settings > General > Transfer or Reset Phone.

Google’s guide to factory resetting your device can be found here, and Apple has also provided instructions on its support website.

Unfortunately, some malware may survive factory resets. Failing that, consider restoring to factory settings and then disposing of your device.

Parental control or employee monitoring apps: spyware?

There are cyberthreats around every corner, and while children often want a smartphone and to be on social media at a young age, parents want to monitor what they are viewing and who they are interacting with online in order to protect them.

This is a responsible position to take, but at their core, parental control apps are designed for surveillance — as are many “employee productivity” apps.

The main issue is the potential for abuse, turning what may have been a product developed with good intentions into invasive software used for purposes beyond protecting a minor or ensuring employee time is used wisely.

Also: The best employee monitoring software of 2026: Expert tested

A balance between a right to privacy and protection has to be maintained. With this in mind, both Apple and Google have introduced parental controls for their devices. These features focus on restricting screen time, locking and unlocking devices, managing permissions lists, restricting web content and app downloads, and approving purchases.

Regarding employee monitoring apps, don’t install them on your personal handset. If your employer insists on using them, then it should issue you a work laptop and phone.

Most common consumer monitoring apps

As we mentioned earlier, many apps may be advertised as parental control monitors or simple trackers, but their use can be unethical. Other app developers freely market their products for full device control and surveillance. 

Also: 5 ways to avoid spyware disguised as legit apps – before it’s too late

Apps often use the phrases ‘spy,’ ‘monitor,’ or ‘parental control,’ but they may also disguise themselves on a device as a utility, a game, or otherwise as an innocent piece of software.

Are Google and Apple protecting devices from spyware?

Google and Apple are generally quick to remove malicious apps that manage to evade the privacy and security protections in their respective official app stores. When individuals are considered particularly at risk, you can enroll in Google’s Advanced Protection Program, which provides additional security for your Android device.

Google has also banned spyware and stalkerware ads, and the firm’s Threat Analysis Group is constantly publishing research on new commercial spyware strains and their potential targets.

Apple has cracked down on parental control apps, citing privacy-invading functions as the reason for removal. The company offers its own parental device control service called Screen Time for parents who want to limit their child’s device usage.

Furthermore, the company does not allow sideloading — that is, installing third-party apps from sources other than Apple’s App Store — and is quick to remove any iOS apps that exhibit privacy-eroding functionality.

Apple also provides Lockdown Mode, an optional setting you can enable on your iOS device for extreme security. However, unless you don’t mind a heavily restricted smartphone, you should only consider this option if you are worried about commercial-grade spyware.


Consider checking out ways to remove yourself from the internet and ZDNET’s recommended data brokers of 2026.





Source link