XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

What Safe Mode Does
Chances are that your business’ computers have a lot of extra drivers and features on them that make things a little more difficult for your organization. When you boot up a device in Safe Mode, you make it much easier to diagnose problems since you’re booting it up in its bare minimum state. If the issue persists even in Safe Mode, for example, you know that it’s a problem with the core functions of your PC, whereas the opposite means that it’s a more specific issue with something you’ve installed.

There are two major ways that you can access Safe Mode on your PC. The first is the one that we just outlined. The other can include your network drivers and devices, but this sometimes isn’t what you are looking to do.

Follow these directions to implement Safe Mode on startup.

From the Start Menu:

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen:

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

Have you found this tip helpful? Subscribe to our blog for more great technology tips and tricks.

5G is Still Going to Take A While
Cryptomining is Inspiring Cybercrime


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Small Business Hosted Solutions Data Google Productivity Hardware Mobile Devices Mobile Office VoIP Email Gadgets Quick Tips Malware Network IT Support Efficiency Network Security Innovation Social Media Business Management IT Services Miscellaneous Business Continuity Server Smartphones Virtualization Upgrade Business Windows Disaster Recovery Communication Managed IT Services Microsoft Office Communications Users Computer Passwords Data Backup User Tips Mobile Device Management Android Save Money Smartphone Browser Marketing Holiday WiFi Alert Mobile Computing Tech Term Ransomware Data Recovery Vendor Management Operating System Outsourced IT Remote Monitoring Windows 10 Internet of Things Cybercrime BDR Avoiding Downtime Cloud Computing Bring Your Own Device Apple Computers BYOD Information Technology The Internet of Things Current Events VPN Artificial Intelligence Telephone Systems Best Practice History Router Big Data Going Green Firewall Chrome Remote Computing IT Solutions Automation Social Engineering Trending Health Employer-Employee Relationship Cybersecurity Phone System Wireless Technology Spam Application IT Consultant Collaboration Facebook Hacking Managed IT Services Office Lithium-ion Battery Excel Budget Money Proactive IT App Printer Bandwidth Networking Fax Server iPhone Maintenance Windows 8 How To Two-factor Authentication Mobility Applications Content Filtering Recovery Business Intelligence Unified Threat Management Business Managament Virus Data Protection Gmail Private Cloud Customer Relationship Management Sports Training Value Redundancy Hard Drives Law Enforcement Mouse Data Security Office 365 Antivirus Windows 10 User Error Phishing Apps Humor Outlook Analytics PowerPoint Tutorials Managed IT Website Analysis File Sharing Memory Compliance Conferencing Flexibility Blockchain Entertainment Connectivity Word Settings Search Data Management Retail Tablet Inbound Marketing Tech Support Twitter Document Management Identity Theft Encryption Productivity Streaming Media Risk Management Network Congestion Administration IT Management Mobile Device Digital Payment Saving Time Social Networking Save Time Computer Repair Google Drive IT Support Downtime Vulnerability Office Tips Piracy Internet Exlporer IBM Data Storage eWaste Content Management Unsupported Software PDF Leadership Best Available Infrastructure Administrator Webinar Bluetooth HaaS End of Support Managed Service Safety Wi-Fi Work/Life Balance Paperless Office Data Breach Update Government Computer Accessories YouTube People Workers Instant Messaging Samsung Meetings Comparison Environment DDoS Virtual Assistant Human Resources Online Currency Windows 7 Social Recycling Solid State Drive Data loss Biometrics Point of Sale IT service Education Black Market Scam Statistics Touchscreen Spam Blocking Hacker Cleaning Credit Cards Password Wireless Physical Security Programming Public Cloud Access Control Skype SaaS Smart Tech Servers Video Surveillance USB Augmented Reality Intranet Robot Running Cable CES Wearable Technology IT Plan OneNote Data storage Machine Learning Information Hosted Solution Safe Mode Hiring/Firing Windows 8.1 Update Tip of the week Amazon Legal Storage Computer Care Windows Media Player Virtual Desktop Software as a Service Relocation Keyboard HVAC Display Telecommuting Nanotechnology Remote Worker Cost Management Tools Monitor Debate PC Care Practices Audit Upgrades Analyitcs Sync Cables 3D Accountants Business Technology Netflix Windows Server 2008 Amazon Web Services Scheduling Help Desk Addiction Customer Service Enterprise Content Management Consultant Software Tips Remote Work Wiring Root Cause Analysis Reputation Password Manager eBay Internet exploMicrosoft Alerts Hosted Computing Proactive Computer Fan Telephony Unified Communications Students Supercomputer Google Docs Staff NarrowBand Online Shopping Cache Cameras Password Management Licensing Uninterrupted Power Supply Devices GDPR Botnet Customers Business Mangement Text Messaging WIndows 7 IT Security Data Warehousing Specifications Advertising Work Station Inventory Remote Monitoring and Maintenance FENG Virtual Reality Start Menu Theft Gaming Console Healthcare Knowledge Distributed Denial of Service Voice over Internet Protocol Files Digital Signature Macro IoT Patch Management Telephone System Regulations Chromecast Evernote Wireless Internet Printer Server Shortcut Print Server Co-managed IT 360 NIST Emails User Remote Support HBO Thought Leadership E-Commerce Screen Mirroring Worker Commute nternet Crowdfunding Travel Criminal Managing Stress Domains Notifications Millennials Electronic Medical Records Line of Business Bloatware Mobile Cortana Electronic Health Records Law Firm IT Multi-Factor Security Colocation Strategy Windows 10s Science Company Culture Laptop Wireless Charging Business Owner Wire Cryptocurrency Frequently Asked Questions Shadow IT Fraud Content Filter Charger Cast SharePoint Workforce Hybrid Cloud Authentication Hiring/Firing MSP Entrepreneur LinkedIn Professional Services Google Apps HIPAA IaaS Lifestyle Computing Infrastructure Insurance Tablets Net Neutrality Flash Touchpad Fiber-Optic Webcam Smart Office IT solutions Printers Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Thank You Two Factor Authentication Battery Content Emergency Video Games Music Congratulations Worker Audiobook Scalability Assessment Rootkit Politics Transportation Regulation How to Television Troubleshooting Webinar Techology Camera Benefits Automobile Public Computer

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *