crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

What Does Safe Mode Do?
In its most basic form, Safe Mode lets you boot up your PC in a limited fashion. Only critical drivers and files will be activated, allowing for only a barebones boot that can help you isolate and diagnose issues with your computer. For example, the issue becomes apparent outside of Safe Mode, but it doesn’t happen during Safe Mode. This means that it’s likely not a critical driver and is something additional that you’ve installed.

There are two different ways to access Safe Mode. The first is the one that we just outlined. The other is one that includes other network drivers and devices, which depending on the situation might not be what your goal is.

Follow the below instructions to implement Safe Mode on startup.

From the Start Menu...

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen…

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

For more great tech tips and tricks, subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hackers Backup Hosted Solutions Malware Email Mobile Devices Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade VoIP Google Computer Windows Business Continuity Mobile Device Management Virtualization Efficiency Microsoft Office Disaster Recovery Innovation Mobile Office Vendor Management Miscellaneous Gadgets Social Media Holiday Outsourced IT BYOD Android Smartphone Data Backup User Tips Quick Tips Passwords Mobile Computing Tech Term Windows 10 Internet of Things Managed IT services Browser Network Security WiFi Bring Your Own Device Best Practice The Internet of Things Remote Monitoring Ransomware Spam Remote Computing Data Recovery Alert Users Data Management Trending Wireless Technology Operating System Apple Going Green Artificial Intelligence History Gmail Firewall Save Money Content Filtering Information Technology Current Events Managed IT Big Data App Office Analytics Customer Relationship Management IT Solutions Unified Threat Management Lithium-ion Battery Facebook IT Consultant Encryption Printer Tech Support Paperless Office Saving Time Applications Avoiding Downtime Employer-Employee Relationship Maintenance Hard Drives Two-factor Authentication Windows 8 Router Antivirus Document Management Cloud Computing Humor IT service Digital Payment Mobile Device Chrome Business Growth VPN Risk Management Apps Application Virus Customer Service Productivity Website Hacking Computers Fax Server Managed IT Services Phone System Outlook Health Collaboration Compliance Marketing Automation Cybersecurity Excel Office Tips Retail Phishing Bandwidth Licensing File Sharing PowerPoint Wi-Fi Social Networking Unified Communications Training Tablet Infrastructure Office 365 Password iPhone User Error Co-Managed IT Administration Government Presentation Augmented Reality Project Management Budget Proactive IT Computer Repair Regulations Inbound Marketing Mouse Recovery Money Data Security Net Neutrality Running Cable Social Tip of the week Settings Flexibility Hosted Solution IBM Cost Management Wireless Data storage Cybercrime Save Time Wearable Technology Robot Hiring/Firing Display Alerts Printing End of Support LiFi Computing Statistics IT Support Help Desk Vulnerability Intranet Competition Business Intelligence Blockchain HIPAA Network Congestion Recycling eWaste Downtime Data loss Redundancy BDR Search Piracy Virtual Desktop USB Business Owner Internet Exlporer Files Sports Smart Technology Hacker Mobile Security Scam User Point of Sale Programming Company Culture Analyitcs Twitter IoT Mobility Education Safety Specifications Language Geography Digital Signature Techology Identity Public Cloud Google Calendar Bitcoin Memory Utility Computing Software Tips Break Fix Server Management Computing Infrastructure Laptop communications High-Speed Internet Sync Legislation Hacks Documents Conferencing Healthcare Dark Web Cooperation Halloween Disaster Resistance Entrepreneur Development Motherboard Macro PC Care Mobile Device Managment Undo 5G PDF Value People Hard Drive Data Warehousing eBay Patch Management Staff Scary Stories Virtual Reality IT Consulting Cables Remote Support Modem Leadership Software as a Service Monitors Skype Streaming Media Cache New Additions Microsoft Excel Text Messaging Operations SaaS Data Breach Deep Learning Print Server Wires Gaming Console Work Station Cookies G Suite Technology Tips Domains Google Wallet Fun Writing LinkedIn Management Congratulations Video Surveillance Virtual Private Network Chromebook Technology Laws Word Law Firm IT Windows 8.1 Update Nanotechnology Travel Comparison Public Speaking Drones Cortana Social Engineering Best Available Buisness Enterprise Resource Planning Permissions IT Technicians Unified Threat Management Identities Screen Reader Black Friday Backups Knowledge Environment CIO Mobile Adminstration Assessment Fraud 3D Mirgation Telephony Access Control Solid State Drive Bluetooth Online Currency Samsung Smart Tech Identity Theft Cyber Monday Legal Experience Troubleshooting Debate Managing Stress IT Management Computer Accessories Business Technology Storage SharePoint Heating/Cooling Alt Codes Consumers Crowdfunding Connectivity Network Management YouTube Enterprise Content Management Networking Migration Machine Learning Downloads Typing Google Drive Scheduling Distributed Denial of Service IP Address Windows 10 Hotspot How To Vulnerabilities Touchscreen Chatbots Private Cloud Multi-Factor Security Refrigeration Cryptocurrency Disaster Google Docs Star Wars Managed IT Service

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...