Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays the
tasks or processes currently running on your computer. To
open Task Manager, press Ctrl+Alt+Del. The Applcations tab
lists the applications currently running on your computer.
A single application may actually consist of several running
processes, and many programs that run in the background are
not listed (you can see icons for some of these programs in
the System Tray).

Note: With Windows 98 and Windows Me, Ctrl+Alt+Del will
open Program Manager, which allows you only to close
aplications. However, you can download one of the many Task
Manager utilities from the Web.

The Processes tab displays a comprehensive list of all the
processes currently running on your computer. This can be
very useful for monitoring your system. The process tab
displays information about the processor useage and memory
usage of each process. The problem is, how to identify a
process. Below is a list of some processes you may see in
Task Managers Processes list.

"System Idle Process"
"System" The Windows System Process
"SMSS.EXE" Session Manager Subsystem
"CSRSS.EXE" Client Server Runtime Subsystem
"WinLOGON.EXE" The Windows Logon process
"SERVICES.EXE" Services Control Manager
"LSASS.EXE" Local Security Authentication Server Service
"svchost.exe" Service Host
"spoolsv.exe" The print spooler service
"explorer.exe" Windows Explorer
"TASKMGR.EXE" The Task Manager
"regsvc.exe" Remote Registry Service


"System Idle Process" is basically another name for the
time when Windows is doing nothing. There are hundreds of
thousands of processes that run on a computer, so you will
definitely find names of many other processess that are
not listed above. For a list of well known processes,
visit www.answersthatwork.com/tasklist_pages/tasklist.htm
You can also learn about almost any task by using it's
name as a search term in google.

Task Manager can also be used to tweak your system if it's
running slow. The Performance tab displays running graphs
of your computers CPU and memory usage. If the CPU usage
seems to be running over 80 percent most of the time, or if
the memory usage seems to be running higher than the total
physical memory, you may want to shut down some
applications or processes.

On the Process tab, you can identify processes that are
consuming a lot of processor time. Click twice on the CPU
column heading to sort the CPU column so the processes
hogging the most CPU time on top. You can sort the
"Mem Usage" column the same way.

On the Application tab, if you right click on the name of
an application and, in the popup menu that appears, choose
"Go To Process", Task Manager will open the Processes tab
and highlight the process that runs the application. On the
Processes tab, if you right-click on the name of a process,
you can choose "SetPriority" and promote the priority of
the process you need (or demote the priority of a different
process to free up some resources).

If you go to the Application tab and shut down an
application, you will shut down any processes related to
that application. Or, you might choose to shut down a
background process that you can identify. To shut down an
application or process, click on it's name in the list to
highlight it, then click on the End Task button.

On the Processes tab, if you right click on the name of a
process, you can choose "End Process Tree" to kill the
process and any sub-processes started by the process.

Task Manager can also be used for troubleshooting. If an
application freezes up, you can open Task Manager and shut
down the application. If the entire system freezes up, you
can use Task Manager to shut down a process that is hogging
all the CPU time or memory.

If you spend some time monitoring your computer with task
Manager, eventually you will become familiar with the
processes that commonly run. Then, when you see an
unfamiliar process, you can do a little investigation to
make sure it's not a virus. For example, if you see
msblast.exe in the process list, your computer is infected
with the Blaster virus. You might be able to detect and
eliminate a new virus before an antivirus update is available.

----------------------------------------------------------
Resource Box:
Copyright(C)2004 Bucaro TecHelp. To learn how to maintain
your computer and use it more effectively to design a Web
site and make money on the Web visit bucarotechelp.com
To subscribe to Bucaro TecHelp Newsletter Send a blank
email to www.answersthatwork.com/tasklist_pages/tasklist.htm
------------ ----------------------------------------------

----------------------------------------------------------
Permission is granted for the below article to forward,
reprint, distribute, use for ezine, newsletter, website,
offer as free bonus or part of a product for sale as long
as no changes are made and the byline, copyright, and the
resource box below is included.
----------------------------------------------------------

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit www.answersthatwork.com/tasklist_pages/tasklist.htm To subscribe to Bucaro TecHelp Newsletter Send a blank email to www.answersthatwork.com/tasklist_pages/tasklist.htm

recurring maid service Wilmette ..
In The News:

Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.
Holiday scams spike during Black Friday and Cyber Monday as criminals exploit your leaked personal data. Learn how to protect yourself from fake stores and phishing.
Commerce Department proposes TP-Link router ban over Chinese security risks. Learn how this potential prohibition could affect your home network and devices.
Hyundai AutoEver America suffered a data breach affecting 2,000 current and former employees, exposing names, Social Security numbers and driver's license information.
Washington court rules automated license plate reader images are public records, even when stored by vendors like Flock Safety, setting precedent for transparency.
Fake airline texts claiming flight cancellations are targeting travelers with convincing scams. Learn how cybercriminals steal personal data and credit card info.
Discover how iOS 26's new Adaptive Power feature automatically extends iPhone battery life by learning your usage patterns and adjusting performance intelligently.
New TikTok malware campaign tricks users into running PowerShell commands that download Aura Stealer, which steals credentials and authentication tokens.
Gaia Family offers fixed upfront pricing for IVF cycles with unlimited embryo transfers and financial protection, partnering with over 100 U.S. fertility clinics.
The Jetsons Act aims to position Pennsylvania as a leader in advanced air mobility by establishing regulations for hybrid ground-air vehicles.
Fake Geek Squad invoice emails are targeting users with convincing charges and urgent phone numbers to steal personal information and money.
Fox News Digital's artificial intelligence newsletter digs into a robot in Russia that faceplanted, George Clooney's alarm and OpenAI's rivalry with the New York Times.

Microsoft CRM Customization ? Programming Closed Email Activity

Microsoft CRM is CRM answer from Microsoft and attempt to... Read More

Microsoft Great Plains customization ? Freight Forwarding/Transportation industry example

Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More

Computer Phones ? Facts and Fallacies

The stakes are high when considering security, privacy, and savings,... Read More

C++ Tutorial 2, Input and Variables

This is the tutorial where we really get into programming.... Read More

Microsoft Great Plains Furniture & Fixtures ? Implementation & Customization Highlights

Microsoft Great Plains, former Great Plains Software Dynamics / eEnterprise... Read More

ERP Software Financing: the Future? ? Overview for Company Owner

In our case ? we serve Microsoft Business Solutions ERP... Read More

Is Your Small Business Ready For A CRM Software Solution?

I have yet to see a business that, sometimes in... Read More

Microsoft CRM Integration with IBM Lotus Notes Domino ? Machinery Dealership Example

IBM Lotus Notes with Domino email server is traditional document... Read More

Reporting for Microsoft Great Plains/Dynamics/eEnterprise: RW ? ReportWriter ? Tips for Developer

Microsoft Business Solutions Great Plains is written in Great Plains... Read More

What is Fleet Maintenance Software?

Simply put, fleet maintenance allows companies to monitor and maintain... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More

Know-how in Microsoft Publisher

For those who still don't know, Microsoft Publisher helps computer... Read More

Huddle Up; Groupware on Three

It could just be me, but my experiences with document... Read More

Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free?

Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More

Microsoft Great Plains Customization Tools ? Overview

Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More

Best Practices In Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More

Microsoft Great Plains Integrations ? Retail Management Sample

Microsoft Business Solutions is emerging as very attractive vendor for... Read More

Microsoft Navision Customization and Reporting ? Tips For Programmer/IT Specialist

C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More

Adware and Spyware

What is 'adware'?Adware is basically software or scripts that are... Read More

Groupware: Answers the 5 Questions of Document Collaboration

Every organization which creates collaborative documents, whether they are budgets,... Read More

Microsoft Business Solutions Customization Options - Overview for Programmer

Several years ago Microsoft purchased Great Plains Software, then Navision... Read More

Linux for Home Users

Hey Guys! Don't raise your eyebrows or fear by hearing... Read More

C++ Tutorials: 3, Program Flow (If, Else, While, For)

Program Flow is what you think it is. How the... Read More

Outlook... Not Just for Email! Using Your Outlook Calendar

Microsoft Outlook is one of the most widely used software... Read More

New Web-Based HR Tool is Max From NAS, Hannibal, and InfoLink

Three highly respected names in Human Resources have joined forces... Read More

last minute cleaning help Highland Park ..