ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Ways to Fix the Dreaded Blue Screen of Death

Tip of the Week: 4 Ways to Fix the Dreaded Blue Screen of Death

Microsoft’s Blue Screen of Death has haunted every version of Windows since Windows NT, way back in 1993. In recent times, despite the BSOD’s emoticon makeover in Windows 8 and Windows 10, the notification isn’t any less frustrating to encounter. When experiencing the dreaded BSOD, the question on every user’s mind is, “How do I fix it?”

Before you can resolve the BSOD, you’ll need to understand what’s causing it. Essentially, the BSOD results from Windows experiencing a system error that’s critical enough to require a reboot. This is a problem that’s more serious to encounter than an application error, which typically causes the application or PC to freeze without displaying the BSOD.

A typical BSOD scenario involves a problem with the PC’s hardware, like a driver that’s gone bad, or a software issue, like a virus infection. Upon encountering such a problem, Windows throws up a STOP Error and crashes. Subsequently, a complete reboot is in order, which will doom any data that’s unsaved.

Also, before you take action, be sure to look over the BSOD carefully and make sure that it’s not fake. One way to find this out is to look for a phone number. If you see any contact information, then it’s a giveaway that you’ve got a fake BSOD on your hands. It’s important to keep in mind that Microsoft doesn’t include contact information with their official errors--only an error code and reboot instructions.

Once you’ve determined that the BSOD is real, then resolving the issue is a fairly straightforward process. Try these troubleshooting tips:

Malware Issues: After rebooting your PC, you’ll then be able to perform a virus scan. This should reveal if the cause of the BSOD is malware or not, and depending on the antivirus software, you may be able to quickly remove the malware and resolve the issue that way.

Boot Up in Safe Mode: Safe mode is a way to boot up your PC with only the essential drivers running. This is a way to troubleshoot if the problem lies with a certain driver or not. While in safe mode, an experienced user or IT technician will be able to access event logs and other tools in order to determine where the problem lies.

Important Note: In the event that those two options haven't resolved your issue, we strongly suggest that you contact an IT professional before you consider the following two options.

System Restore: Performing a system restore is a way to troubleshoot the problem and determine if the issue lies with the software. A system restore involves restoring the software to a previous version; we should mention that this is a fairly complicated process that an IT technician should oversee, or else risk backtracking over something critical.

Reinstall Windows: Consider this your last-ditch option since it will completely replace your current operating system with a new installation of Windows. If you go through this process and still have the BSOD pop up, then you know that it’s a hardware issue, like a hard drive failure, memory error, etc. Also, if you reinstall Windows, you’ll have to reinstall all of your applications and adjust your settings before you can get back to using your PC like you’re used to. Remember, you’ll want to be extremely confident that your data is backed up or stored in a central location before reinstalling Windows.

If these suggestions do not resolve your BSOD, or if you need assistance implementing any of these tips, then reach out to ClearView IT at 866-326-7214 for assistance. While you’re on the phone, ask about our remote monitoring and maintenance solution; it’s a surefire way to prevent issues like BSOD from getting out of hand and happening in the first place.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Small Business Smartphones Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Remote Work Data Management Managed Service Provider Internet of Things Government Saving Money Operating System Gadgets Workplace Strategy Networking Windows Artificial Intelligence Managed IT services Bandwidth Information Remote Encryption Mobile Device Management App Virtualization Business Technology Spam Blockchain WiFi Server Employee/Employer Relationship Budget History Gmail Office Two-factor Authentication Apple Office 365 Information Technology Cybercrime Data Security Wi-Fi BDR Health Big Data Analytics Conferencing Access Control Save Money Patch Management Compliance Vendor Employer-Employee Relationship Remote Monitoring Help Desk Hacking Voice over Internet Protocol Cost Management IT Management Remote Computing Training Hacker Document Management Augmented Reality Word Applications Search... IBM Best Practice Project Management Website BYOD Vulnerabilities Retail Alert Computing Vendor Management Mobile Office Hard Drive Hiring/Firing Outlook Managed Services Password Data loss Legal Money Data storage Customer Service Unified Threat Management Firewall Travel Virtual Reality Data Breach Marketing iPhone Social Engineering Cryptocurrency Paperless Office Cortana Running Cable Education Antivirus Black Market Content Filtering Cleaning Maintenance Storage Robot Windows 11 Router Monitoring Healthcare Websites The Internet of Things Remote Workers YouTube Meetings Mobility User Windows 7 Free Resource Twitter Google Maps Laptop Scam Law Enforcement How To End of Support Chrome Printer VPN Social Update Sports DDoS SaaS Mobile Computing Taxes Avoiding Downtime Bluetooth IT Consultant Disaster Distributed Denial of Service Office Tips Holidays Customer Relationship Management Private Cloud Processor Memory Co-Managed IT Lithium-ion battery Entertainment Cooperation Physical Security Video Conferencing Politics Virtual Machines Processors Machine Learning Settings Computer Repair Multi-factor Authentication Start Menu Professional Services Computer Care Solid State Drive Downloads Vulnerability Saving Time HIPAA Chromebook Software as a Service Drones Managed Services Provider Data Protection Computers Bitcoin Wireless Technology Automobile Virtual Private Network eWaste Telephone Current Events How To Microchip Downtime Safety Flexibility Excel Solutions Integration Tech Terms Images 101 Virtual Desktop Identity Theft Display PowerPoint Experience Hack Notifications Managed IT Administration Unified Communications Virtual Assistant Digital Presentation Employees Google Docs Specifications Phone System Videos Access Database Surveillance Time Management Music Public Cloud Managing Costs Health IT Equifax SSID Hard Drive Disposal Employer/Employee Relationships Audit Media Spyware Tactics Development Username File Sharing Virtual Machine Recovery Competition Botnet Rental Service Redundancy Reviews Micrsooft Startup Optimization Freedom of Information Smart Technology Computer Accessories email scam Teamwork Entrepreneur Navigation 2FA Flash Cache Addiction LiFi Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor Documents Application Business Intelligence User Tip Shopping Legislation News Medical IT CCTV SQL Server Printing Evernote Paperless Network Management Banking Touchscreen PCI DSS Google Wallet Licensing Securty Messenger Emergency Proxy Server Gig Economy Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Domains Computing Infrastructure Azure Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Troubleshooting Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Society Business Cards Tech Human Resources Language Business Mangement Going Green Net Neutrality Error Financial Data Tablets Public Speaking Reading Bookmark Risk Management Monitors IT Streaming Media Visible Light Communication Scams Windows 8 Supercomputer Piracy Keyboard Google Calendar Term Google Apps Download Virus Telework HTML Business Owner Hard Drives intranet Relocation Browsers Smartwatch Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Tech Support Software License Wireless Shortcut Comparison Google Play Work/Life Balance Google Drive Upload Procurement Environment Social Network FinTech Heating/Cooling Social Networking Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Windows XP Point of Sale Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value In Internet of Things Television Security Cameras Hacks Customer Resource management Organization Network Congestion Cabling Devices Cyber security Inbound Marketing Shortcuts G Suite Tip of the week Reliable Computing Fileless Malware Writing Tablet Smart Devices VoIP Gamification Remote Working Tracking Company Culture Mouse Telephone System AI Regulations Trend Micro Be Proactive Web Server Transportation Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Electronic Payment Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Staffing Administrator SharePoint Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies IP Address

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?