crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips Hosted Solutions IT Services Hackers Backup Email Malware Business Software Data Mobile Devices IT Support Network Hardware Small Business Communication Server Smartphones VoIP Computer Business Continuity Upgrade Innovation Google Windows Efficiency Disaster Recovery Mobile Device Management Data Backup Microsoft Office Virtualization Outsourced IT Tech Term Miscellaneous Mobile Office Vendor Management Network Security Holiday Gadgets Social Media Passwords BYOD Productivity User Tips Quick Tips Mobile Computing Browser Android Smartphone Managed IT services WiFi Bring Your Own Device Windows 10 Internet of Things Data Recovery The Internet of Things Remote Monitoring Ransomware Spam Best Practice Users Trending Operating System Wireless Technology Apple Remote Computing Artificial Intelligence Alert Collaboration Data Management Save Money Encryption Content Filtering Going Green History Gmail Firewall Office Customer Relationship Management Unified Threat Management Facebook IT Consultant Router Printer Tech Support Information Technology Current Events Cloud Computing Managed IT Maintenance App Big Data IT Support Analytics IT Solutions Lithium-ion Battery Managed IT Services Windows 8 Applications Antivirus Phishing Bandwidth Document Management Humor Mobile Device Saving Time Paperless Office Wi-Fi Avoiding Downtime Employer-Employee Relationship Website Customer Service Hard Drives Two-factor Authentication Compliance Automation Marketing Excel Office Tips Retail Project Management Cybersecurity IT service Digital Payment Chrome Business Growth VPN Risk Management Apps Application Virus Hacking Computers Fax Server Phone System Outlook Health Government Vulnerability Healthcare Budget Proactive IT Computer Repair BDR Regulations Point of Sale Inbound Marketing Mouse Files Recovery Money Net Neutrality Running Cable Social Managed Service Licensing Wireless File Sharing PowerPoint Social Networking Unified Communications Training Tablet Help Desk Office 365 Password iPhone User Error Infrastructure Co-Managed IT Data Security Administration Presentation Augmented Reality Search USB Piracy Virtual Desktop Business Owner Data loss Sports Hacker Scam User Programming Redundancy Remote Workers Company Culture Analyitcs Twitter Education Information Machine Learning Safety Blockchain Specifications IBM Settings Flexibility HIPAA Hosted Solution Cost Management Data storage Mobility Cybercrime communications Save Time Wearable Technology Robot Conferencing Windows 10 Hiring/Firing Printing Display Alerts End of Support Internet Exlporer Tip of the week Remote Monitoring and Management Storage LiFi Computing Smart Technology Mobile Security Statistics IoT Intranet Competition Business Intelligence Network Congestion Recycling eWaste Downtime High-Speed Internet Knowledge Computing Infrastructure Environment CIO Techology Adminstration Legislation Bluetooth 3D OneNote Politics Cyberattacks Solid State Drive Human Error Legal Dark Web Online Currency Samsung Meetings Development Experience Cooperation Troubleshooting Disaster Resistance Debate Computer Accessories Virtual Private Network Employee-Employer Relationship Telephony Motherboard Read Only Heating/Cooling Alt Codes Hard Drive Permission Data Warehousing Consumers Crowdfunding How To Cables Staff YouTube IT Consulting Software as a Service Modem Bookmarks Typing Cache Test IP Address Google Drive Microsoft Excel Scheduling Identity Theft Assessment Wires How To Operations Data Breach Technology Tips Disaster Touchscreen Cookies Favorites Refrigeration Cryptocurrency Management Google Docs IT Management Technology Laws Comparison Digital Signature Business Technology Monitoring Private Cloud Nanotechnology Instant Messaging Bitcoin Enterprise Resource Planning Permissions Memory Network Management MSP Laptop IT Technicians Unified Threat Management Black Friday Public Cloud Screen Reader Finance Hacks Mobile Fraud Documents Proactive Halloween Mirgation Consulting Entrepreneur Access Control Undo Cyber Monday Macro PC Care Sync Smart Tech Authentication Software Tips Managing Stress 5G PDF Value People eBay Scary Stories Virtual Reality Managed Services Provider SharePoint Authorization Remote Support Leadership Mobile Device Managment Connectivity New Additions Enterprise Content Management Monitors Skype Streaming Media Print Server Gaming Console Text Messaging Server Management WPA3 SaaS Migration E-Commerce Deep Learning Downloads Employees Domains Google Wallet Distributed Denial of Service Work Station Congratulations Vulnerabilities Fun Writing Hotspot LinkedIn Networking Multi-Factor Security Law Firm IT Video Surveillance Fleet Tracking Chromebook Chatbots Features Word Star Wars Zero-Day Threat Public Speaking Drones Managed IT Service Windows 8.1 Update G Suite Geography Cortana Social Engineering Language Best Available Buisness Google Calendar Patch Management Asset Tracking Identity Electronic Health Records Identities Utility Computing Backup and Disaster Recovery Backups Break Fix Travel

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code