253.777.0763    Get SUPPORT

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

What Safe Mode Does
Chances are that your business’ computers have a lot of extra drivers and features on them that make things a little more difficult for your organization. When you boot up a device in Safe Mode, you make it much easier to diagnose problems since you’re booting it up in its bare minimum state. If the issue persists even in Safe Mode, for example, you know that it’s a problem with the core functions of your PC, whereas the opposite means that it’s a more specific issue with something you’ve installed.

There are two major ways that you can access Safe Mode on your PC. The first is the one that we just outlined. The other can include your network drivers and devices, but this sometimes isn’t what you are looking to do.

Follow these directions to implement Safe Mode on startup.

From the Start Menu:

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen:

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

Have you found this tip helpful? Subscribe to our blog for more great technology tips and tricks.

5G is Still Going to Take A While
Cryptomining is Inspiring Cybercrime
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Identity Theft Office 365 Cryptocurrency Privacy Sports Knowledge Online Conferencing VPN BDR Facebook Productivity Remote Worker Office BYOD Managed Service Excel Flash Windows 10 Managing Stress Government Password Manager Applications Cleaning Hackers Software Business Management Telephone System Money Networking Physical Security Password Hiring/Firing Saving Money Internet Exlporer User Tips FENG Browser Operating System Data Protection Search Engine Google Drive Comparison Word Settings Cloud Computing Keyboard Vulnerability Innovation Title II Encryption Credit Cards Tip of the Week Redundancy Workplace Tips Inventory Smart Tech Data Recovery Employer-Employee Relationship Server Google Docs Computer Virtualization Business Computing Ransomware Hybrid Cloud Emergency Network Security Relocation Wi-Fi HaaS Blockchain Frequently Asked Questions Servers Collaboration Criminal Efficiency Business Scam Managed IT Services Android Small Business Bing Network Apps Augmented Reality Internet of Things Windows 10 Computers Content Management Cybercrime Social Engineering IT Services Cybersecurity Business Mangement Hardware Gadgets Update Smartphones OneNote Document Management Wiring Information Cache Start Menu Remote Monitoring Passwords Specifications HIPAA Business Intelligence webinar Spam Blocking Data Backup Alert Private Cloud Spam Upgrade Apple Malware Avoiding Downtime Two-factor Authentication Human Resources Bandwidth Firewall Windows 7 Connectivity Virtual Assistant Microsoft Office Warranty Internet VoIP Mobile Devices Quick Tips Security Charger Entertainment Infrastructure Phishing Microsoft Data Paperless Office Backup Fraud Mobile Device Management Law Enforcement Data Storage Save Money Addiction Managed IT Tech Term Current Events IT Support Windows Hosted Solutions Router Netflix Disaster Recovery Automation Safe Mode Windows 10s Email Managed IT Services Chrome Social Media Business Continuity Outsourced IT Smartphone Holiday Health NIST Miscellaneous Artificial Intelligence Evernote Cloud Tools Bring Your Own Device Electronic Medical Records Data Security Meetings Telephone Systems Unsupported Software Website Google End of Support How To Data Breach Best Practices Voice over Internet Protocol Cast CES Communication App Root Cause Analysis Files Technology Hosted Computing Public Cloud IT Management Communications IT Plan

Newsletter Sign Up