Mavericks Blogs

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

What Safe Mode Does
Chances are that your business’ computers have a lot of extra drivers and features on them that make things a little more difficult for your organization. When you boot up a device in Safe Mode, you make it much easier to diagnose problems since you’re booting it up in its bare minimum state. If the issue persists even in Safe Mode, for example, you know that it’s a problem with the core functions of your PC, whereas the opposite means that it’s a more specific issue with something you’ve installed.

There are two major ways that you can access Safe Mode on your PC. The first is the one that we just outlined. The other can include your network drivers and devices, but this sometimes isn’t what you are looking to do.

Follow these directions to implement Safe Mode on startup.

From the Start Menu:

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen:

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

Have you found this tip helpful? Subscribe to our blog for more great technology tips and tricks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Tech Term Privacy Email Network Security Innovation Data recovery Cloud Internet Cloud Computing Internet of Things Data Business Computing Malware Applications Data Backup Artificial Intelligence Mobile Devices Saving Money Hardware Android Data Protection Network Smartphones IT Services Smartphone Hosted Solutions BDR Workplace Tips User Tips Backup Hackers Windows VoIp Small Business Outsourced IT Communications Google Connectivity CES Virtual Assistant Save Money Business Management Encryption Facebook Content Management Passwords Identity Theft Business Intelligence Browser VPN Money Microsoft Blockchain Infrastructure Gadgets Windows 10 Information Router Vulnerability Paperless Office Sports How To Managed Service Social Engineering Password Computers Communication IT Support Comparison Cybercrime Two-factor Authentication Miscellaneous Managed IT services Password Manager Update Charger Authentication Machine Learning Phishing Telephone Systems Remote Worker Specifications Word Legal business intelligence IT Management MSP Law Enforcement Password Management Workers Windows 7 Gmail Efficiency Workforce Devices HVAC Data Management Amazon Web Services Wireless Charging Ransomware Wiring Website Hosted Computing Office 365 Criminal organizations need Telecommuting File Sharing NIST Alert Server Cybersecurity USB Recycling Collaboration Cortana Human Resources Holiday Cache Telephone System Apps Chrome Bandwidth YouTube Credit Cards Firewall Software Inventory Document Management Remote Work Social Media Cryptocurrency Productivity Wire eWaste Disaster Recovery Systems Organizations today Thought Leadership Computer Google Apps IT Plan Online Shopping Big Data Data Security Nanotechnology HIPAA Bring Your Own Device Fraud Unified Threat Management Digital Signature Keyboard Mobile Device Accountants Augmented Reality Addiction Safe Mode OneNote Cleaning data-driven marketplace Automation Networking Business Staff Wireless Internet Business Mangement BYOD Work/Life Balance Microsoft Office Smart Tech Electronic Medical Records Settings PDF Disaster Recovery Access Control Entertainment Training Evernote Practices Smart Office top-line performance Managed IT Services Managed IT Enterprise Content Management Employer-Employee Relationship Virtualization Upgrade Mobile Device Management Millennials Servers Remote Monitoring Amazon Mobile Computing Thank You Compliance Quick Tips Congratulations Regulation Twitter Camera Company Culture Printers Managing Stress