Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays the
tasks or processes currently running on your computer. To
open Task Manager, press Ctrl+Alt+Del. The Applcations tab
lists the applications currently running on your computer.
A single application may actually consist of several running
processes, and many programs that run in the background are
not listed (you can see icons for some of these programs in
the System Tray).

Note: With Windows 98 and Windows Me, Ctrl+Alt+Del will
open Program Manager, which allows you only to close
aplications. However, you can download one of the many Task
Manager utilities from the Web.

The Processes tab displays a comprehensive list of all the
processes currently running on your computer. This can be
very useful for monitoring your system. The process tab
displays information about the processor useage and memory
usage of each process. The problem is, how to identify a
process. Below is a list of some processes you may see in
Task Managers Processes list.

"System Idle Process"
"System" The Windows System Process
"SMSS.EXE" Session Manager Subsystem
"CSRSS.EXE" Client Server Runtime Subsystem
"WinLOGON.EXE" The Windows Logon process
"SERVICES.EXE" Services Control Manager
"LSASS.EXE" Local Security Authentication Server Service
"svchost.exe" Service Host
"spoolsv.exe" The print spooler service
"explorer.exe" Windows Explorer
"TASKMGR.EXE" The Task Manager
"regsvc.exe" Remote Registry Service


"System Idle Process" is basically another name for the
time when Windows is doing nothing. There are hundreds of
thousands of processes that run on a computer, so you will
definitely find names of many other processess that are
not listed above. For a list of well known processes,
visit www.answersthatwork.com/tasklist_pages/tasklist.htm
You can also learn about almost any task by using it's
name as a search term in google.

Task Manager can also be used to tweak your system if it's
running slow. The Performance tab displays running graphs
of your computers CPU and memory usage. If the CPU usage
seems to be running over 80 percent most of the time, or if
the memory usage seems to be running higher than the total
physical memory, you may want to shut down some
applications or processes.

On the Process tab, you can identify processes that are
consuming a lot of processor time. Click twice on the CPU
column heading to sort the CPU column so the processes
hogging the most CPU time on top. You can sort the
"Mem Usage" column the same way.

On the Application tab, if you right click on the name of
an application and, in the popup menu that appears, choose
"Go To Process", Task Manager will open the Processes tab
and highlight the process that runs the application. On the
Processes tab, if you right-click on the name of a process,
you can choose "SetPriority" and promote the priority of
the process you need (or demote the priority of a different
process to free up some resources).

If you go to the Application tab and shut down an
application, you will shut down any processes related to
that application. Or, you might choose to shut down a
background process that you can identify. To shut down an
application or process, click on it's name in the list to
highlight it, then click on the End Task button.

On the Processes tab, if you right click on the name of a
process, you can choose "End Process Tree" to kill the
process and any sub-processes started by the process.

Task Manager can also be used for troubleshooting. If an
application freezes up, you can open Task Manager and shut
down the application. If the entire system freezes up, you
can use Task Manager to shut down a process that is hogging
all the CPU time or memory.

If you spend some time monitoring your computer with task
Manager, eventually you will become familiar with the
processes that commonly run. Then, when you see an
unfamiliar process, you can do a little investigation to
make sure it's not a virus. For example, if you see
msblast.exe in the process list, your computer is infected
with the Blaster virus. You might be able to detect and
eliminate a new virus before an antivirus update is available.

----------------------------------------------------------
Resource Box:
Copyright(C)2004 Bucaro TecHelp. To learn how to maintain
your computer and use it more effectively to design a Web
site and make money on the Web visit bucarotechelp.com
To subscribe to Bucaro TecHelp Newsletter Send a blank
email to www.answersthatwork.com/tasklist_pages/tasklist.htm
------------ ----------------------------------------------

----------------------------------------------------------
Permission is granted for the below article to forward,
reprint, distribute, use for ezine, newsletter, website,
offer as free bonus or part of a product for sale as long
as no changes are made and the byline, copyright, and the
resource box below is included.
----------------------------------------------------------

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit www.answersthatwork.com/tasklist_pages/tasklist.htm To subscribe to Bucaro TecHelp Newsletter Send a blank email to www.answersthatwork.com/tasklist_pages/tasklist.htm

bmw rental chicago Bath .. Lockport Chicago limo O’Hare
In The News:

Spambots, data thieves, and other bad actors run rampant online — more so now than ever before. Here's what to do if one gets ahold of you.
Tech expert Kurt “CyberGuy" Knutsson says the Super Bowl's huge audience makes it a prime target for many types of cybersecurity scams.
It's not just about freeing up space on your computer, Kurt “CyberGuy" Knutsson says. It's about protecting your digital memories and important documents.
From proofreading and research to brainstorming and data analysis, you can use generative AI as a sidekick for just about any task you can dream of.
Tech expert Kurt “CyberGuy" Knutsson says Super Bowl 2025 ads promise star power and laughs, featuring Beckham's twin reveal.
First driverless semi delivers 100 loads in Texas, transforming logistics with AI. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
A new scam using Elon Musk's name is making the rounds, promoting "energy-saving" devices and falsely linking the Tesla and SpaceX leader to the products.
China recently unveiled a new bullet train prototype with a test speed of 280 mph that is poised to break records and set new standards.
Hackers sometimes find ways to exploit iPhones, and Apple recently discovered a vulnerability in iOS that may have been exploited for over a year.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Lynx the robot dog from China is pushing boundaries of what autonomous mobile robots can achieve with a groundbreaking design and unique mobility.
A startup claims to have developed the world's first entirely artificial intelligence-designed and 3D-printed shoe, the brainchild of a 25-year-old.
Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.

A Case Study on Selecting Contract Management Software

Professional services firm cuts costs and improves productivity with integrated... Read More

Spyware Definitions List

The adware and spyware definitions list is very long. But... Read More

Constructionalist Parsing - Deciphering Natural Language

The research in the field of Natural Language Processing usually... Read More

Microsoft Update - 5 Reasons to Update Service Pack 2

Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More

Instant Messenger Clients

If you have been using the Internet for any amount... Read More

Microsoft CRM Custom Design & Development: SDK, C#, SQL, Exchange, Integration, Crystal Reports

Microsoft CRM is new player on the CRM software... Read More

7 Things to Consider Before Buying Small Business Accounting Software

The world of small business accounting software can be a... Read More

eConnect: eCommerce Development for Microsoft Great Plains

Microsoft Business Solutions Great Plains has several options to enable... Read More

Internet Security Threats: Who Can Read Your Email?

Before being able to choose a secure Internet communication system,... Read More

Editing Your Photos Using Microsoft Picture It Publishing Platinum 2002 - A Great Dinosaur

I started using PIP (Picture It Publishing) Platinum 2002 right... Read More

Microsoft Great Plains international implementation ? USA / Mexico ? overview for consultant

Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More

Windows Screensavers Explained

In this article you will find some background information about... Read More

ERP Consulting: Microsoft Great Plains Partner Future Directions

In the Clinton era the status quo was simple: you... Read More

Groupware and Online Collaboration: Collaboration Series #4

This article is the fourth of a series of articles... Read More

Best Practices In Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More

5 Easy File Management Tips in Microsoft Word

How many steps does it take you to locate and... Read More

Selecting Corporate ERP: Microsoft Business Solutions Great Plains ? Estimation Parameters

As we could imagine, if you are reading this article... Read More

Microsoft Great Plains: Government & Non-Profit Organization ? Workflow Implementation

Usually workflow & messaging is realized in CRM and then... Read More

SQL: Querying Microsoft Great Plains ? Overview for Database Administrator/Developer

Looks like Microsoft Great Plains becomes more... Read More

Anti-Virus Software

Anti-virus software is used to find, remove or fix files... Read More

Microsoft Great Plains Implementation: Collection Management ? Overview For Consultant

Microsoft Business Solutions Great Plains is very good fit for... Read More

ERP System of the Future: Database, Business Logic and Interface

We will base our prognosis on our Microsoft Business Solutions... Read More

Falling in Love With More Than One Screensaver: The Fun Part

Having from five to ten and more favorite screensavers is... Read More

The Truth: Netzero 3G

We've all seen the ads on TV for Netzero 3G.... Read More

Microsoft Moves to Small Business Accounting/Retail Market ? Stakes and Thoughts

In this small article we will be looking at the... Read More

limousine service Ava ..