Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Central Technology Solutions Partners with ID Agen...
Which Management Software Is Right for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Productivity Network Security Managed IT Services Software Outsourced IT Data Productivity IT Support Data Backup Business Mobile Devices Innovation Computer Tech Term Ransomware Microsoft Data Recovery Hardware Small Business Cloud Computing Google Backup Internet of Things Smartphone Managed Service Provider Business Continuity Efficiency Windows 10 Smartphones Android Disaster Recovery Remote Monitoring Paperless Office Social Media Data Management User Tips Business Management VoIP Upgrade IT Support Browser Artificial Intelligence Encryption Managed IT Communication Phishing Windows Collaboration Facebook BYOD Save Money Mobile Device Holiday App Mobile Device Management Windows 10 Workplace Tips Cybersecurity Risk Management Wi-Fi Applications Vendor Management Passwords Gmail Robot Government Unified Threat Management Document Management communications Network Firewall Server Managed IT Services Saving Money Recovery Bandwidth BDR Employer-Employee Relationship Bring Your Own Device Office 365 Apps Vulnerability Information Content Filtering Wireless Password Compliance SaaS Telephone Systems Big Data IT Management Chrome Tip of the week Healthcare Scam Automation Virtualization Antivirus Hosted Solution Project Management Website Money Data storage Infrastructure Going Green Customer Service Managed Service Data Security Data loss Files Virtual Reality Printing Router Two-factor Authentication Miscellaneous Analytics Politics Remote Computing Work/Life Balance Regulations Office IT Service Unified Communications Apple Computers Microsoft Office Blockchain Social Storage Quick Tips Training File Sharing Computing Tablet Help Desk Customer Relationship Management IT solutions Virtual Private Network Budget Network Management IoT Information Technology Business Technology Operating System Upgrades Assessment Server Management The Internet of Things Outlook Twitter Sports How To Software as a Service Private Cloud Mouse Employees Tech Support Smart Technology Company Culture Google Drive Uninterrupted Power Supply Maintenance Settings Digital Payment End of Support Health Business Growth Websites Identity Theft Licensing Monitors Users Word Electronic Medical Records Internet Exlporer Mobile Computing Alert Spam Redundancy YouTube WiFi HIPAA Hacker Access Control Downtime Management Wireless Technology Legal Mobile Security Remote Monitoring and Management How To Samsung Administration VPN Machine Learning Mobility Chromebook Education Patch Management Remote Workers Flexibility LiFi Avoiding Downtime Servers Fraud Data Breach Screen Reader Crowdsourcing Hacks Permission Meetings Black Market Mirgation Professional Services Hard Drive Typing Features Supercomputer Dark Web Motherboard Geography Bitcoin Authorization G Suite History Writing Emoji Downloads Augmented Reality Security Cameras Best Practice Tracking technology services provider Mobile Favorites Google Maps Network Congestion Disaster User Error Trending Language Fleet Tracking Procurement Taxes Cyber Monday Computer Repair Technology Laws Smart Tech Test Mail Merge Migration Virtual Assistant Cache Electronic Health Records IT Budget Touchscreen Data Warehousing Techology High-Speed Internet Windows 8 Save Time Cabling Retail Cortana Marketing VoIP Sponsor Operations Remote Worker Star Wars Monitoring Physical Security Consultation Lenovo Technology Assurance Group ’s 18 Identities Conferencing Display Gadgets Computing Infrastructure Asset Tracking 3D Printing Buisness Statistics Net Neutrality MSP RMM Point of Sale Processors Technology Tips Address Chatbots Wasting Time Recycling Cyberattacks Microsoft Excel Disaster Resistance Modem Development Zero-Day Threat Digital Multi-Factor Security Obstacle Wearable Technology ROI Utility Computing Consulting Google Wallet Office Tips Distributed Denial of Service Superfish Annual Convention Managing Stress Hard Drives Instant Messaging Sync Google Docs Update Printer Search Alerts OneNote Telephony Unsupported Software Virus Read Only Public Cloud Bluetooth Proactive Law Enforcement Tech Terms Humor Comparison Identity eWaste Proactive IT Cookies Cables Backup and Disaster Recovery Travel Backups Social Engineering USB Spyware Google Calendar Course Notes Managed Services Provider Botnet Drones Managed IT Service San Diego Enterprise Content Management Solid State Drive Finance Mobile Device Managment Software Tips Shortcut Cooperation Deep Learning Employee-Employer Relationship Mobile Data Automobile Computer Care Gadget Current Events Theft Firefox Specifications Personal Information Heating/Cooling Permissions IT Consulting Nanotechnology Wires Human Error Safety Legislation IT Technicians PowerPoint Cost Management Alt Codes E-Commerce Dark Data Time Management Break Fix Networking Social Networking Vulnerabilities Cryptocurrency Authentication WannaCry SharePoint Staff Connectivity GPS Enterprise Resource Planning Bookmarks Virtual Desktop Unified Threat Management Hacking Hotspot WPA3 Financial Notifications Black Friday Roanoke — Central Technology Solutions CrashOverride Relocation Regulation Webcam IT Consultant Error Cybercrime Web Server Hard Disk Drive Printers Cameras Motion Sickness Administrator CCTV Emergency