253.777.0763    Get SUPPORT

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

What Safe Mode Does
Chances are that your business’ computers have a lot of extra drivers and features on them that make things a little more difficult for your organization. When you boot up a device in Safe Mode, you make it much easier to diagnose problems since you’re booting it up in its bare minimum state. If the issue persists even in Safe Mode, for example, you know that it’s a problem with the core functions of your PC, whereas the opposite means that it’s a more specific issue with something you’ve installed.

There are two major ways that you can access Safe Mode on your PC. The first is the one that we just outlined. The other can include your network drivers and devices, but this sometimes isn’t what you are looking to do.

Follow these directions to implement Safe Mode on startup.

From the Start Menu:

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen:

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

Have you found this tip helpful? Subscribe to our blog for more great technology tips and tricks.

5G is Still Going to Take A While
Cryptomining is Inspiring Cybercrime
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 26 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Computer Password Apple Managed IT Services Gmail Mobile Device Management Miscellaneous Sports Upgrade Automation Thought Leadership Audit Apps Networking Settings Efficiency Backup Files Two-factor Authentication IT Plan Botnet Social Media Facebook Remote Monitoring Network Skype Recycling How To History Data Breach Managed Service Enterprise Content Management Mobile Devices User Tips Hackers Mobile Computing Unsupported Software Blockchain MSP Smartphones Data Privacy Spam Blocking Smart Office Data Protection Emails Recovery Amazon Web Services Private Cloud Windows Server 2008 Digital Signature Phishing Innovation Hardware CES Information Data Recovery HaaS Public Cloud Cybercrime Workforce Managing Stress Training Collaboration Gadgets Business Malware Ransomware Cloud Computing Internet exploMicrosoft Router Solid State Drive Telephone System Redundancy Disaster Recovery Managed IT Services Screen Mirroring Encryption Flexibility Software Addiction Employer-Employee Relationship VoIP Computers Browser Company Culture Telecommuting Alert Sync End of Support PDF Smartphone Bandwidth Relocation Data loss Social Engineering Data Backup Money Trending Windows 10 Government Hosted Solutions Authentication Saving Money Cybersecurity Operating System Google Apps Word Internet of Things Wi-Fi Google Android Leadership IT Support Infrastructure Vulnerability Workplace Tips Net Neutrality Amazon Scam IT Consultant Comparison Virtualization iPhone Chrome Artificial Intelligence Email Business Continuity Virtual Assistant Network Security NIST Business Management Internet Internet Exlporer Managed IT Data Security Outsourced IT Windows 7 Telephony Small Business Tech Term IT Services Camera Law Enforcement Humor Website App Supercomputer Windows Big Data Avoiding Downtime Office 365 Computer Care Telephone Systems Spam Microsoft Office Connectivity Technology IT Management Productivity Samsung Update Windows 10 Bring Your Own Device Data Storage Nanotechnology VPN Communications Business Intelligence Server Multi-Factor Security HBO Mobile Device BYOD Identity Theft Content Management Passwords YouTube Business Computing Password Management Practices Workers File Sharing Paperless Office Cloud Save Money Tip of the Week Microsoft Security Online Shopping Hybrid Cloud BDR Twitter Tip of the week Remote Work Google Drive Communication Applications OneNote Best Practices

Newsletter Sign Up