Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays the
tasks or processes currently running on your computer. To
open Task Manager, press Ctrl+Alt+Del. The Applcations tab
lists the applications currently running on your computer.
A single application may actually consist of several running
processes, and many programs that run in the background are
not listed (you can see icons for some of these programs in
the System Tray).

Note: With Windows 98 and Windows Me, Ctrl+Alt+Del will
open Program Manager, which allows you only to close
aplications. However, you can download one of the many Task
Manager utilities from the Web.

The Processes tab displays a comprehensive list of all the
processes currently running on your computer. This can be
very useful for monitoring your system. The process tab
displays information about the processor useage and memory
usage of each process. The problem is, how to identify a
process. Below is a list of some processes you may see in
Task Managers Processes list.

"System Idle Process"
"System" The Windows System Process
"SMSS.EXE" Session Manager Subsystem
"CSRSS.EXE" Client Server Runtime Subsystem
"WinLOGON.EXE" The Windows Logon process
"SERVICES.EXE" Services Control Manager
"LSASS.EXE" Local Security Authentication Server Service
"svchost.exe" Service Host
"spoolsv.exe" The print spooler service
"explorer.exe" Windows Explorer
"TASKMGR.EXE" The Task Manager
"regsvc.exe" Remote Registry Service


"System Idle Process" is basically another name for the
time when Windows is doing nothing. There are hundreds of
thousands of processes that run on a computer, so you will
definitely find names of many other processess that are
not listed above. For a list of well known processes,
visit www.answersthatwork.com/tasklist_pages/tasklist.htm
You can also learn about almost any task by using it's
name as a search term in google.

Task Manager can also be used to tweak your system if it's
running slow. The Performance tab displays running graphs
of your computers CPU and memory usage. If the CPU usage
seems to be running over 80 percent most of the time, or if
the memory usage seems to be running higher than the total
physical memory, you may want to shut down some
applications or processes.

On the Process tab, you can identify processes that are
consuming a lot of processor time. Click twice on the CPU
column heading to sort the CPU column so the processes
hogging the most CPU time on top. You can sort the
"Mem Usage" column the same way.

On the Application tab, if you right click on the name of
an application and, in the popup menu that appears, choose
"Go To Process", Task Manager will open the Processes tab
and highlight the process that runs the application. On the
Processes tab, if you right-click on the name of a process,
you can choose "SetPriority" and promote the priority of
the process you need (or demote the priority of a different
process to free up some resources).

If you go to the Application tab and shut down an
application, you will shut down any processes related to
that application. Or, you might choose to shut down a
background process that you can identify. To shut down an
application or process, click on it's name in the list to
highlight it, then click on the End Task button.

On the Processes tab, if you right click on the name of a
process, you can choose "End Process Tree" to kill the
process and any sub-processes started by the process.

Task Manager can also be used for troubleshooting. If an
application freezes up, you can open Task Manager and shut
down the application. If the entire system freezes up, you
can use Task Manager to shut down a process that is hogging
all the CPU time or memory.

If you spend some time monitoring your computer with task
Manager, eventually you will become familiar with the
processes that commonly run. Then, when you see an
unfamiliar process, you can do a little investigation to
make sure it's not a virus. For example, if you see
msblast.exe in the process list, your computer is infected
with the Blaster virus. You might be able to detect and
eliminate a new virus before an antivirus update is available.

----------------------------------------------------------
Resource Box:
Copyright(C)2004 Bucaro TecHelp. To learn how to maintain
your computer and use it more effectively to design a Web
site and make money on the Web visit bucarotechelp.com
To subscribe to Bucaro TecHelp Newsletter Send a blank
email to www.answersthatwork.com/tasklist_pages/tasklist.htm
------------ ----------------------------------------------

----------------------------------------------------------
Permission is granted for the below article to forward,
reprint, distribute, use for ezine, newsletter, website,
offer as free bonus or part of a product for sale as long
as no changes are made and the byline, copyright, and the
resource box below is included.
----------------------------------------------------------

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit www.answersthatwork.com/tasklist_pages/tasklist.htm To subscribe to Bucaro TecHelp Newsletter Send a blank email to www.answersthatwork.com/tasklist_pages/tasklist.htm

same day cleaning service Des Plaines ..
In The News:

New Android banking trojan Sturnus steals credentials, reads encrypted messages and controls devices.
Denmark's 3D-printed student village proves automation builds 36 apartments faster than traditional methods. Skovsporet project shows housing future.
Discover Android's new Sound Notifications feature that alerts you to smoke alarms, doorbells, and baby cries even when wearing headphones.
New SantaStealer malware reportedly threatens holiday shoppers with password theft. This Christmas-themed info-stealer targets browsers and crypto wallets.
The Christmas season brings a surge in Netflix phishing scams targeting shoppers with fake emails. Stacey P received convincing scam but verified account first.
San Francisco Giants invite Jamie Grohsong to throw ceremonial first pitch at Oracle Park after he learned to play baseball with a bionic hand following an injury.
FBI warns cybercriminals are stealing family photos from social media to create fake proof of life images in virtual kidnapping scams targeting victims.
Instagram's new 'Your Algorithm' tool lets you control your Reels feed in real time. The app now gives you power to customize what videos you see.
Major Marquis fintech breach exposes 400,000-plus Americans' data through unpatched SonicWall vulnerability, with Texas hardest hit at 354,000 affected.
Free up iPhone storage fast by clearing large photos and videos from Messages app. Simple steps for iOS users to delete attachments without losing chats.
Scammers are flooding inboxes with fake tracking alerts that mimic real carriers, exploiting the holiday rush to steal logins and personal data.
The Fox News AI Newsletter brings you the latest news on AI technology advancements and the challenges and opportunities AI presents now and for the future.
Texas family reunites with missing 11-year-old cat Grayson after 103 days using Petco Love Lost's AI photo matching technology and community help.
Tired of AI customer service loops? These insider tricks help you escape "frustration AI" and get real human help when you need it most for urgent issues.
Unlock richer audio from your streaming apps with simple tweaks to volume normalization, equalizer settings, and quality preferences for cleaner sound.
Scammers are sending fake Facebook settlement payout emails that mimic legitimate notices from the privacy settlement administrator to deceive users.
Holiday shopping scams surge as fake refund emails target distracted consumers during Black Friday and holiday seasons, costing Americans billions annually.
The AI-powered IRMO M1 exoskeleton features four modes, including turbo, eco, training and rest for hiking, running, cycling and sports with eight-hour battery life.
OpenAI announced upgrades for its ChatGPT Images platform on Tuesday, saying the program can now make more precise edits and produce images more quickly.
Chrome for Android now turns web articles into AI-powered podcast conversations. Get hands-free browsing with Google Gemini's natural audio summaries.
LastPass faces $1.6 million fine from U.K. regulators after 2022 data breach exposed 1.6 million users. Password manager failed proper security controls.
Petco disclosed a data breach exposing customer Social Security numbers, financial account details, and driver's license information due to a software error.
Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.

How To Choose A Fire Wall Software Program

In the real world a "fire wall" is a fireproof... Read More

Great Plains Dexterity Customization Options ? Overview For Developers

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft Great Plains Subcontracting ? Overview for Microsoft Business Solutions Partner

Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More

10 Steps To Secure And Manage Your Passwords

Passwords protect your most sensitive personal, financial and business information.... Read More

Lotus Domino Implementation and Development: Infrastructure ? Present and Future

Domino server is a buffer between the operation system and... Read More

History of Java

The java programming language is becoming more and more popular... Read More

Business Plan Software Review: Ultimate Business Planner?

One of the main reasons business owners and entrepreneurs use... Read More

What is Spyware? Are You Being Watched?

Find out why Spyware Removal from computers is important and... Read More

IT Strategy for Large Corporation: ERP/MRP/CRM, Unix/Linux/Windows, Microsoft/Java

Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business... Read More

C++ Tutorials: 3, Program Flow (If, Else, While, For)

Program Flow is what you think it is. How the... Read More

Crystal Reports For Microsoft RMS ? Overview For Developer/Report Designer

If you are software developer or database administrator - we... Read More

Document Templates Give You The Perfect Framework For Your Documents

When it comes to running an office, the SOHO entrepreneur... Read More

Industry Experts Answer the One Million-dollar Question - Why Genie Backup Manager?

Many reasons made GBM a unanimous choice for experts, one... Read More

Microsoft Great Plains Integration with Legacy Systems ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft RMS Customization ? PO Items Receiving in Great Plains

Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More

OS 101: Suggestions for Choosing an Operating System

An operating system (abbreviated OS) is essentially the path through... Read More

Software Piracy

SOFTWARE PIRACY We regularly hear reports... Read More

Great Plains Dexterity Development: FAQ

Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More

Editing Your Photos Using Microsoft Picture It Publishing Platinum 2002 - A Great Dinosaur

I started using PIP (Picture It Publishing) Platinum 2002 right... Read More

The Top 5 Wrong Reasons For Not Hiring Testers

Considering whether or not your software company should hire a... Read More

Microsoft CRM Customization

Microsoft CRM customization techniques are very diversified and based on... Read More

Free Software: How Not To Get More Than You Bargained For!

I completed an experiment recently. I wanted to find out... Read More

Corporate ERP Selection: Microsoft Great Plains

In our opinion, traditional approach when you select ERP/MRP system... Read More

7 Things to Consider Before Buying Small Business Accounting Software

The world of small business accounting software can be a... Read More

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

home cleaning services Mundelein ..