Network Synergy Blog

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

Do You Know All the Things an MSP Can Do?
Which Management Software Is Right for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Consumers Business Computing Upgrade Streaming Media Cables Experience Internet Exlporer Language Innovation Laptop Data Backup Recovery Word Flexibility Remote Monitoring and Management Gmail Value Telephony Statistics Social Media Workplace Tips Chrome IT Services IoT Lenovo Specifications Processors Enterprise Content Management Big Data Business Continuity Data Warehousing Google Drive Backups Leadership Phone System Save Time Electronic Health Records eBay Piracy 3D Chatbots Disaster Resistance Mobile Data Lithium-ion Battery Router Botnet How To Mirgation IT Solutions Data Recovery Scam Digital Computer Repair IT Support Hosted Solutions Employees Employer-Employee Relationship Google Maps Writing Consultation Cabling Identities Windows 8.1 Update Business Artificial Intelligence Display Managed IT Services Crowdfunding Staffing Environment Remote Support Technology Drones IT Consulting Secruity Productivity History Hacking Black Friday Cleaning IBM Human Error Applications IP Address Windows 10 Business Technology PDF Uninterrupted Power Supply Mail Merge Tech Support End of Support Humor Privacy Geography Training Mobile Security Disaster Patch Management Print Server Legal Social Engineering Storage Food Modem Telephone Systems Hard Drive Mobile Device Managed Services Provider Technology Laws Private Cloud Managed Service IT Support Apple Education 3D Printing Cost Management Internet Tablet Fax Server Domains Server Management Data storage Point of Sale Migration Servers Blockchain Battery Cyberattacks Company Culture Software Scary Stories Managed IT Application Wireless Technology iPhone Licensing Dark Web Compliance Tracking Alert Shortcut Crowdsourcing Enterprise Resource Planning Infrastructure Inbound Marketing Software Tips Content Filtering GPS Miscellaneous Undo Windows Email Taxes Internet of Things Physical Security Project Management Online Currency Macro Mobile Computing Law Enforcement Best Practice Hardware Unified Communications Zero-Day Threat Money Consulting Website Unsupported Software Distributed Denial of Service Co-managed IT IT Technicians Meetings Spam Network Congestion Work Station Debate Troubleshooting VPN People Ransomware Service-based Business Windows 8 Outsourced IT Spyware Help Desk Excel Printers Techology Nanotechnology Holiday Mobility Cache Smartphone Smart Technology Business Owner Regulation Charger Quick Tips Trainging Malware Google Time Management Unified Threat Management IT service Work/Life Balance Disaster Recovery Bandwidth Browser Customer Relationship Management Networking Managed IT Service Mobile Technology Data Breach Gaming Console USB Social Networking Law Firm IT Network Management Computer Solid State Drive Thank You Running Cable Star Wars Logs IT Management Mouse Wearable Technology Data Management Regulations Small Business Congratulations Save Money Sync Mobile Efficiency Maintenance Settings Printer MSP Hosted Solution Firewall Office Tips Multi-Factor Security Cryptocurrency Files Machine Learning Search SharePoint Fun Office Employee-Employer Relationship Document Management OneNote Cloud Error Operating System Deep Learning YouTube Safety Supercomputer Break Fix Hard Drives VoIP Augmented Reality Software as a Service Net Neutrality Smartphones Cameras Authorization Administration Cortana Trending G Suite Managed Service Provider Remote Monitoring Public Cloud User Error Personal Information Security Politics Network Security Identity Theft SaaS Upgrades Cloud Computing Bookmarks Recycling Technology Tips Cybercrime Best Practices Downtime WPA3 Virtualization Password Twitter Hacks Proactive IT Retail Cybersecurity Google Calendar Knowledge Assessment Microsoft Office Travel Microsoft Excel Administrator Intranet Healthcare Paperless Office Google Wallet Mobile Office Health Virtual Reality Mobile Device Management Microsoft Backup and Disaster Recovery Gadget Virtual Desktop Webinar Vulnerability Legislation Emoji Customer Service Motherboard Conferencing Favorites Alerts Bluetooth LiFi Data Security Computers Tip of the Week Antivirus Wi-Fi Heating/Cooling Electronic Medical Records Budget Comparison Webcam Best Available Touchscreen 5G Avoiding Downtime Black Market Automation Phishing Finance Current Events Instant Messaging App Websites Authentication Permission Start Menu Managed IT services Hackers Risk Management Passwords WiFi Competition Office 365 Address Collaboration Buisness Monitors Digital Signature Development Wireless Encryption Public Speaking Hiring/Firing Relocation Video Surveillance Saving Money Social Communication Hotspot Google Docs Saving Time Redundancy LinkedIn Fleet Tracking Text Messaging IT Consultant Vendor Management Cyber Monday Smart Tech Refrigeration Documents Motion sickness Superfish Computing Marketing Government Alt Codes Outlook Programming Productivity Unified Threat Management Staff Web Server Tutorials Utility Computing CrashOverride Printing CCTV Corporate Profile eWaste Computer Accessories Vulnerabilities Network IT budget Business Growth Asset Tracking Tip of the week Chromebook Mobile Devices Cookies Backup Robot Analyitcs BYOD communications E-Commerce Skype PC Care User CIO Tech Term Managing Stress Scheduling BDR Business Management Users Notifications Server Identity Typing Samsung Information Technology HIPAA The Internet of Things Android Access Control Cooperation Computer Care Remote Workers How To Monitoring Operations Halloween Entrepreneur Sports Computing Infrastructure Google Analytics Firefox Permissions Presentation Management Tip of the Work Going Green Screen Reader Bitcoin Hard Disk Drive Remote Computing Features Connectivity Fraud Automobile File Sharing Windows 10 Read Only Hacker Data Loss Two-factor Authentication Facebook Digital Payment Wires High-Speed Internet Business Intelligence PowerPoint User Tips Virtual Private Network Information Gadgets Downloads Bring Your Own Device Proactive Apps Test Data Virus Memory

      Latest Blogs

      Data backup can be the difference between a business that fails and a business that succeeds. After all, if an organization suffers from a data loss incident so bad that it has to ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube