XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Safe Mode

Know Your Tech: Safe Mode

If you are trying to identify a specific issue with your PC, it can be difficult to do so due to the fact that there are so many moving parts in an operating system. Still, you want a secure way to find the problem and diagnose it. Thankfully, Safe Mode allows you to take a look at your computer in its most basic form to see what the root of the issue is.

What Safe Mode Does
Chances are that your business’ computers have a lot of extra drivers and features on them that make things a little more difficult for your organization. When you boot up a device in Safe Mode, you make it much easier to diagnose problems since you’re booting it up in its bare minimum state. If the issue persists even in Safe Mode, for example, you know that it’s a problem with the core functions of your PC, whereas the opposite means that it’s a more specific issue with something you’ve installed.

There are two major ways that you can access Safe Mode on your PC. The first is the one that we just outlined. The other can include your network drivers and devices, but this sometimes isn’t what you are looking to do.

Follow these directions to implement Safe Mode on startup.

From the Start Menu:

  • Select the Start button in the bottom-left corner of the screen.
  • Select Settings (the gear icon)
  • Click on Update & Security
  • Go to Recover in the left-hand column
  • Go to Advanced Startup and select Restart Now
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

From the Sign-in Screen:

  • Restart your PC. Hold down the Shift key while you’re selecting Restart.
  • When the device restarts, select Troubleshoot > Advanced Options > Startup > Settings > Restart
  • Upon startup, hit F4 or the number 4 for Safe Mode. Hit F5 or the number 5 for Safe Mode with Networking

Have you found this tip helpful? Subscribe to our blog for more great technology tips and tricks.

5G is Still Going to Take A While
Cryptomining is Inspiring Cybercrime


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, March 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Hosted Solutions Managed Service Provider Data Hackers Small Business Google Mobile Devices Hardware VoIP Productivity Mobile Office Email Malware Network Security Gadgets Quick Tips Efficiency Business Management Network Innovation IT Services IT Support Business Social Media Business Continuity Server Smartphones Miscellaneous Upgrade Virtualization Communication Windows User Tips Communications Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Data Recovery Users Smartphone Mobile Device Management Passwords Browser Android Internet of Things Holiday WiFi Save Money Marketing Tech Term Alert Outsourced IT Productivity Ransomware Vendor Management Cybercrime Cloud Computing Artificial Intelligence Mobile Computing BDR Operating System Remote Monitoring Windows 10 Router Chrome Information Technology Automation Cybersecurity Avoiding Downtime Remote Computing Bring Your Own Device Apple BYOD Computers Spam Telephone Systems Current Events Big Data Health VPN Best Practice IT Solutions History The Internet of Things Firewall Going Green Managed IT Services Collaboration Proactive IT Hacking Social Engineering Employer-Employee Relationship Trending Phone System Windows 10 Wireless Technology IT Consultant Printer Application Facebook Bandwidth Encryption Office Excel Lithium-ion Battery Budget App Mobility IT Support Mobile Device Money Business Managament Unified Threat Management Business Intelligence Private Cloud Fax Server How To Networking Maintenance Office 365 iPhone Windows 8 Applications Training Mouse Phishing Two-factor Authentication Content Filtering Recovery Save Time Tutorials Data Security Virus PowerPoint Website Antivirus Redundancy Law Enforcement Access Control Analytics Gmail Customer Relationship Management Hard Drives File Sharing Settings Information Google Drive Value Data Protection Sports User Error Blockchain Managed IT Apps Word Humor Outlook Wi-Fi Identity Theft Office Tips Meetings Saving Time Data Management Administrator Voice over Internet Protocol Augmented Reality Compliance Flexibility IT Management Servers Entertainment Downtime Tech Support Memory Social Retail Machine Learning Inbound Marketing Human Resources Conferencing Scam Software as a Service Analysis Managed Service Network Congestion Hacker Tablet Paperless Office Administration Search Twitter Vulnerability Business Technology Document Management Connectivity Social Networking Digital Payment Computer Repair Streaming Media Risk Management USB Windows 7 HaaS End of Support Robot Google Docs Statistics Safety Virtual Assistant Work/Life Balance Data Breach Government Botnet YouTube Workers IBM Skype Healthcare Piracy Programming Webinar Leadership Telephone System Credit Cards Intranet DDoS Running Cable Help Desk Solid State Drive Data loss Computer Accessories Wearable Technology Net Neutrality Black Market Smart Tech Fraud Spam Blocking Instant Messaging CES Cryptocurrency Wireless Physical Security Environment Best Available Cleaning Password IT Plan Display Manufacturing Public Cloud Bluetooth SaaS Biometrics Content Management People Infrastructure Samsung Touchscreen IT service Unsupported Software OneNote Data storage Online Currency Virtual Private Network Update Recycling eWaste Point of Sale Internet Exlporer Data Storage Keyboard Telephony PDF Video Surveillance Comparison Education Database Online Shopping Cache Project Management Audit Print Server Staff Remote Support Devices GDPR Netflix Webcam Entrepreneur nternet Business Mangement Crowdfunding Password Management File Versioning Inventory Remote Monitoring and Maintenance Tablets Start Menu Theft Shortcuts Root Cause Analysis Smartwatch Data Warehousing Specifications Reputation Supercomputer Hiring/Firing Distribution Regulations Evernote Company Culture Internet exploMicrosoft Wireless Internet Warranty Computer Fan Windows Media Player Virtual Desktop Law Firm IT Digital Signature IoT Multiple Versions HBO Thought Leadership E-Commerce Cost Management Travel Criminal NarrowBand NIST PC Care Line of Business Scheduling Upgrades Analyitcs Mobile Cortana LinkedIn Uninterrupted Power Supply Electronic Health Records eCommerce 3D Employee Millennials Customers Knowledge Logistics Wireless Charging Advertising Wire Microchip FENG eBay Customer Service Multi-Factor Security Strategy Restore Data Frequently Asked Questions Windows 8.1 Update Distributed Denial of Service Files Content Filter Camera Patch Management Chromecast Alerts Consultant Authentication MSP 360 Emails Professional Services Google Apps Vendor Screen Mirroring Digital Signage Workforce Insurance Flash Fiber-Optic Notifications Smart Office Electronic Medical Records Text Messaging Cameras Lifestyle Debate Backup and Disaster Recovery Tip of the week Amazon Colocation Macro Storage Windows 10s Gaming Console Laptop Safe Mode Business Owner Licensing Work Station SharePoint Co-managed IT Nanotechnology Remote Worker Virtual Reality Tools Shadow IT HVAC Security Cameras Charger Cast WIndows 7 Google Search Telecommuting Practices HIPAA Sync Cables Hybrid Cloud Search Engine Hiring/Firing Printer Server Shortcut User Cryptomining Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Worker Commute Touchpad Accountants Software Tips Remote Work Relocation Wiring Hosted Solution Bloatware Password Manager Legal Enterprise Content Management Employee/Employer Relationship Computer Care Managing Stress Domains ISP Hosted Computing Proactive Science Unified Communications Students Bing IT Security Monitor Smart Technology Books Loyalty Experience Content Two Factor Authentication Battery Emergency Video Games Music Thank You Worker Audiobook Regulation Scalability Assessment Congratulations Rootkit Politics Utility Computing Printers Transportation How to Television Troubleshooting Webinar Techology Biometric Security Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *