Get Started Today!  321-259-5500

croom new

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17 2018
If you'd like to register, please fill in the username, password and name fields.

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Privacy Malware Hackers Business Computing Business Internet Email Hosted Solutions Productivity Backup IT Services Computer Mobile Devices Microsoft Software Network Security Managed Service Provider Windows 10 Ransomware Smartphone Hardware Google User Tips Data Android Business Continuity Workplace Tips Tech Term Efficiency IT Support Data Management Disaster Recovery Innovation Social Media Managed IT Services Server Small Business App Encryption Browser Smartphones Communication BYOD Big Data Productivity Gmail Windows Artificial Intelligence Internet of Things Network Office 365 Business Management Facebook Data Recovery Cloud Computing Office Hosted Solution WiFi Paperless Office Apps Phishing Employer-Employee Relationship Recovery Government Risk Management Passwords Firewall Upgrade Office Tips Robot Data Backup Outsourced IT Wireless Technology Miscellaneous Vendor Management Mobile Device Management Spam Alert Save Money Remote Monitoring Cybersecurity Vulnerability Microsoft Office Wireless Money Password Content Filtering Word Infrastructure Wi-Fi Virtualization Tip of the week Two-factor Authentication Work/Life Balance Chrome Budget Saving Money How To IT Support IT solutions Holiday Hacker Avoiding Downtime Virtual Reality Data storage VPN Social Document Management SaaS Windows 10 Customer Service Legal Tech Support Remote Computing Unified Threat Management Applications IT service Apple VoIP Going Green IT Management Twitter Website Managed IT Services Bandwidth Cybercrime Antivirus Computing Education Hard Drives Analytics Settings Automation The Internet of Things Safety Scam Business Intelligence Network Management Patch Management Computers IBM Downtime Running Cable Data loss communications Cortana Outlook Cost Management Customer Relationship Management Collaboration YouTube Mobile Device Data Security Unified Communications Identity Theft Virtual Private Network File Sharing G Suite Physical Security Mouse Router Automobile Blockchain LiFi Chromebook Storage Sports Taxes Virtual Desktop Compliance HIPAA Business Owner Server Management Competition Presentation Regulations User Augmented Reality Best Practice Mobile Security Tablet eWaste End of Support Politics Heating/Cooling Computer Care Health Bring Your Own Device BDR Upgrades Printing Business Technology Websites Training Solid State Drive Maintenance Botnet User Error Search Google Drive Telephone Systems Monitors Lithium-ion battery Machine Learning Administration Hacking Samsung Cameras Mobile Data Users Google Wallet Comparison WannaCry Relocation Title II Tracking Hiring/Firing Star Wars Development Cryptocurrency Licensing Notifications Laptop Administrator Writing CCTV Drones Social Networking Networking Specifications Private Cloud Online Touchscreen Assessment Cables Bitcoin Cooperation Cabling Crowdsourcing Halloween Retail Motherboard Black Friday Digital Error Microsoft Excel Update Humor Internet Exlporer Wires Windows 8 Staff Scary Stories Social Engineering Analyitcs Law Techology Cyber Monday Spyware Supercomputer Knowledge Undo Hard Drive Hacks Wearable Technology Mail Merge Disaster Travel 5G Marketing Save Time Modem Unified Threat Management Smart Technology Permissions Servers IT Budget Emoji Experience Dark Data Cache Address Uninterrupted Power Supply Law Enforcement Motion Sickness How To IT Consultant Personal Information Backups Cookies Printer Distributed Denial of Service Recycling Fraud Deep Learning Entrepreneur Digital Payment Current Events Hard Disk Drive Gadget Buisness Managed IT Service Firefox Co-managed IT Cleaning Computer Repair Nanotechnology Access Control Management Statistics Black Market Meetings IT Technicians Downloads Trending Break Fix Fun Application Screen Reader SharePoint Company Culture Hotspot Bluetooth Identities Environment Network Congestion Webcam Mirgation Multi-Factor Security CIO Dark Web Quick Tips Electronic Medical Records Operating System Smart Tech Managing Stress Business Growth Language Google Maps Processors Mobile Computing Display iPhone Point of Sale 3D Printing IP Address Chatbots Lenovo Google Calendar Net Neutrality VoIP Staffing Managed IT Connectivity Enterprise Content Management Alt Codes Computing Infrastructure Troubleshooting Public Speaking Web Server Unsupported Software Mobile Office Gadgets Information Technology Identity Superfish Legislation Corporate Profile FCC Time Management GPS Google Docs Refrigeration IoT Vulnerabilities Typing Alerts Shortcut Flexibility CrashOverride USB Emergency Domains Help Desk

      Latest Blog Entry

      Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuf...

      Account Login