253.777.0763    Get SUPPORT

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

What Safe Mode Does
Chances are that your business’ computers have a lot of extra drivers and features on them that make things a little more difficult for your organization. When you boot up a device in Safe Mode, you make it much easier to diagnose problems since you’re booting it up in its bare minimum state. If the issue persists even in Safe Mode, for example, you know that it’s a problem with the core functions of your PC, whereas the opposite means that it’s a more specific issue with something you’ve installed.

There are two major ways that you can access Safe Mode on your PC. The first is the one that we just outlined. The other can include your network drivers and devices, but this sometimes isn’t what you are looking to do.

Follow these directions to implement Safe Mode on startup.

From the Start Menu:

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen:

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

Have you found this tip helpful? Subscribe to our blog for more great technology tips and tricks.

5G is Still Going to Take A While
Cryptomining is Inspiring Cybercrime
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Leadership Managed Service Provider Tech Term Quick Tips Innovation Data Management Outlook Outsourced IT Artificial Intelligence Wireless Charging Email Supercomputer Business Mangement Managed IT Services Tools Health Business Computing Practices Chrome Company Culture Machine Learning Specifications Spam Hiring/Firing User Tips Social Media Internet of Things Browser Word Gadgets Smart Office Productivity Update Solid State Drive Content Management Amazon Social Engineering Thought Leadership Windows Google Accountants Cybercrime BYOD Title II Technology Managed IT Blockchain Files Smartphones Redundancy Wire Comparison Hardware Advertising Millennials Network Security Nanotechnology Save Money Saving Money Holiday Access Control Operating System Government Electronic Medical Records Cloud Computing Settings Fraud Hosted Solutions Computer IT Management Entertainment Keyboard Remote Monitoring Phishing Password Manager Mobile Device Management Downtime Password Communication Internet Staff How To YouTube Data loss Private Cloud IT Consultant Smartphone Identity Theft Human Resources Cloud Data Recovery Managed IT Services Data Security Evernote Twitter Business Continuity Collaboration Mobile Devices Virtualization Employer-Employee Relationship Data Storage Telephone Systems Computers Networking Server Business Software HIPAA Backup Ransomware Microsoft Office HBO Facebook Privacy Wi-Fi Infrastructure Google Docs Start Menu Legal Online Emergency Applications VPN Website Efficiency Flash IT Services Addiction Windows 10 Business Management Data Protection Malware CES User Error Upgrade IBM Microsoft Internet Exlporer Security Computer Care Office 365 Bring Your Own Device Emails Password Management Passwords Communications Money Sync Cortana Hackers Law Enforcement Avoiding Downtime OneNote Enterprise Content Management VoIP Productivity Safety Network Android Samsung Google Drive Sports IT Plan Windows 7 Authentication Unsupported Software Voice over Internet Protocol Apps Automation Data Multi-Factor Security Best Practices Connectivity IT Support Cybersecurity Alert Two-factor Authentication Router Data Backup Windows 10 Data Breach Vulnerability App Office Spam Blocking Virtual Assistant Business Intelligence Audit Credit Cards Paperless Office Tip of the Week USB Bandwidth Screen Mirroring Criminal BDR The Internet of Things Telephone System Small Business Public Cloud

Newsletter Sign Up