Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays the
tasks or processes currently running on your computer. To
open Task Manager, press Ctrl+Alt+Del. The Applcations tab
lists the applications currently running on your computer.
A single application may actually consist of several running
processes, and many programs that run in the background are
not listed (you can see icons for some of these programs in
the System Tray).

Note: With Windows 98 and Windows Me, Ctrl+Alt+Del will
open Program Manager, which allows you only to close
aplications. However, you can download one of the many Task
Manager utilities from the Web.

The Processes tab displays a comprehensive list of all the
processes currently running on your computer. This can be
very useful for monitoring your system. The process tab
displays information about the processor useage and memory
usage of each process. The problem is, how to identify a
process. Below is a list of some processes you may see in
Task Managers Processes list.

"System Idle Process"
"System" The Windows System Process
"SMSS.EXE" Session Manager Subsystem
"CSRSS.EXE" Client Server Runtime Subsystem
"WinLOGON.EXE" The Windows Logon process
"SERVICES.EXE" Services Control Manager
"LSASS.EXE" Local Security Authentication Server Service
"svchost.exe" Service Host
"spoolsv.exe" The print spooler service
"explorer.exe" Windows Explorer
"TASKMGR.EXE" The Task Manager
"regsvc.exe" Remote Registry Service


"System Idle Process" is basically another name for the
time when Windows is doing nothing. There are hundreds of
thousands of processes that run on a computer, so you will
definitely find names of many other processess that are
not listed above. For a list of well known processes,
visit www.answersthatwork.com/tasklist_pages/tasklist.htm
You can also learn about almost any task by using it's
name as a search term in google.

Task Manager can also be used to tweak your system if it's
running slow. The Performance tab displays running graphs
of your computers CPU and memory usage. If the CPU usage
seems to be running over 80 percent most of the time, or if
the memory usage seems to be running higher than the total
physical memory, you may want to shut down some
applications or processes.

On the Process tab, you can identify processes that are
consuming a lot of processor time. Click twice on the CPU
column heading to sort the CPU column so the processes
hogging the most CPU time on top. You can sort the
"Mem Usage" column the same way.

On the Application tab, if you right click on the name of
an application and, in the popup menu that appears, choose
"Go To Process", Task Manager will open the Processes tab
and highlight the process that runs the application. On the
Processes tab, if you right-click on the name of a process,
you can choose "SetPriority" and promote the priority of
the process you need (or demote the priority of a different
process to free up some resources).

If you go to the Application tab and shut down an
application, you will shut down any processes related to
that application. Or, you might choose to shut down a
background process that you can identify. To shut down an
application or process, click on it's name in the list to
highlight it, then click on the End Task button.

On the Processes tab, if you right click on the name of a
process, you can choose "End Process Tree" to kill the
process and any sub-processes started by the process.

Task Manager can also be used for troubleshooting. If an
application freezes up, you can open Task Manager and shut
down the application. If the entire system freezes up, you
can use Task Manager to shut down a process that is hogging
all the CPU time or memory.

If you spend some time monitoring your computer with task
Manager, eventually you will become familiar with the
processes that commonly run. Then, when you see an
unfamiliar process, you can do a little investigation to
make sure it's not a virus. For example, if you see
msblast.exe in the process list, your computer is infected
with the Blaster virus. You might be able to detect and
eliminate a new virus before an antivirus update is available.

----------------------------------------------------------
Resource Box:
Copyright(C)2004 Bucaro TecHelp. To learn how to maintain
your computer and use it more effectively to design a Web
site and make money on the Web visit bucarotechelp.com
To subscribe to Bucaro TecHelp Newsletter Send a blank
email to www.answersthatwork.com/tasklist_pages/tasklist.htm
------------ ----------------------------------------------

----------------------------------------------------------
Permission is granted for the below article to forward,
reprint, distribute, use for ezine, newsletter, website,
offer as free bonus or part of a product for sale as long
as no changes are made and the byline, copyright, and the
resource box below is included.
----------------------------------------------------------

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit www.answersthatwork.com/tasklist_pages/tasklist.htm To subscribe to Bucaro TecHelp Newsletter Send a blank email to www.answersthatwork.com/tasklist_pages/tasklist.htm

Benton shuttle to Midway .. Lockport Chicago limo O’Hare
In The News:

Just two months into 2025 there have been numerous Mac malware threats targeting Apple laptops, ranging from infostealers to malicious software.
A self-driving electric bus powered by artificial intelligence has an electric powertrain for zero-emission operation and an automated drive system.
SpaceX is slated to launch its Starship for the eighth time from Boca Chica, Texas, Friday, though plans could be thwarted if the FAA fails to give the green light.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt the CyberGuy offers tips on how you can protect your devices against infostealer malware, which was used to infect 4.3 million machines last year.
Motional is developing autonomous vehicles capable of handling a wide range of real-world scenarios. Its high-speed robotaxi testing reached speeds of 75 mph.
Kurt "CyberGuy" Knutsson explores whether there is artificial intelligence bias involved with the iPhone's voice-to-text conversion in the message app.
Apple's iPhone voice-to-text periodically flashes "Trump" when a user speaks the word "racist." Fox News Digital reached out to Apple about the flaw but did not hear back.
Tech expert Kurt “CyberGuy" Knutsson presents five secret shortcuts: Adjust sound/vibration, share YouTube moments, fix tabs and tweak brightness.
VR transforms senior care: Kurt “CyberGuy" Knutsson says immersive tech helps older adults explore and connect via virtual experiences.
Tech expert Kurt “CyberGuy" Knutsson says DNA tests pose privacy risks like shared genetic information, inaccuracies and hard data deletion.
Tech expert Kurt “CyberGuy" Knutsson says this enormous airship revolutionizes cargo transport by flying to remote areas.
Understanding the language of the internet can help you protect your personal information from bad actors. Kurt "CyberGuy" Knutsson explains.
Woven City is Toyota's experimental city that is a fully functional environment for people to live, work and play while doing research.
The line between spam and scams is thin. Kurt "CyberGuy" Knutsson details his tips for identifying and avoiding phone scams, robocalls and unwanted solicitations.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Kurt the CyberGuy takes you through the steps to easily set your preferred web browser whether you're using a Mac, Windows PC, iPhone or Android.
Google, Instagram, Facebook and weather apps can track your location and use that data to serve you ads; here's what you can do to protect your privacy.
A new debate has emerged about whether airlines should charge passengers based on their weight to help reduce fuel consumption and lower emissions.
Tech expert Kurt “CyberGuy" Knutsson says Hipshipper, which is used by eBay, Shopify and Amazon sellers, exposed millions of shipping labels.
Boxabl’s Baby Box is a 120-square-foot foldable home that can be set up in 60 minutes and has off-grid features. Kurt “CyberGuy" Knutsson says it's designed to maximize functionality.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Major IoT data breach: Mars Hydro database with 2.7 billion records exposed. Kurt “CyberGuy" Knutsson says the breach is a reminder of the risks that come with using IoT devices.
Unitree H1 robots dance at gala, blending AI and tradition. Tech expert Kurt “CyberGuy" Knutsson examines the convergence of cutting-edge technology and traditional culture.
For the first time ever, SpaceX launched a rocket into space from Florida and landed the booster the Bahamas, allowing for future polar-orbit spaceflight missions.

Think Of This

Think of this, first we had the HAM Radio, then... Read More

Integrating Microsoft Great Plains Accounting/ERP: RMS, CRM, eCommerce, Lotus Domino ? overview

Microsoft Business Solutions Great Plains has substantial market share among... Read More

Why do Manufacturers Invest in Business Management Software?

With many manufacturing shops heading over seas in favor of... Read More

Spyware Definitions List

The adware and spyware definitions list is very long. But... Read More

It?s Back!! WordPerfect?s Amazing Comeback

Have you noticed WordPerfect is gearing up for a comeback... Read More

A Guide To Purchasing Professional XP Icons Online And Enhancing Your Applications

Icons are used everywhere; right from software applications, to internet... Read More

Microsoft Great Plains RW: Report Writer

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

Databases ? How We Love to Hate Them!

You've finally created databases that you can actually use to... Read More

Implementing Microsoft CRM: setup and configuration ? notes for IT specialist

Microsoft Business Solutions CRM is web-based CRM application, deploying all... Read More

Microsoft eCommerce Web-development: Great Plains eConnect .Net ? Highlights for Programmer

In our small article we'll consider Microsoft Business Solutions Great... Read More

The Opera Alternative

Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More

Four Desktop Tools To Drastically Increase Your Productivity

Sticky Noteshttp://www.deprice.com/stickynote.htmWith StickyNote 9.0, you can create beautiful 3D notes... Read More

These Items Are A Must Before Making The Decision To Purchase Any Off-The-Shelf Software

1. What determines the software price? Is it Per Seat... Read More

Mozilla Vs. Firefox

For those who are unclear on the differences between the... Read More

How to Upgrade Dexterity Customization ? Tips for IT Manager

If you have Microsoft Great Plains and support it... Read More

The Importance of Timely Timesheets

Whether you are a small consultancy firm, a medium sized... Read More

Microsoft CRM for Corporate Business ? Working Offline

If your company has regional and worldwide operations, you might... Read More

Spyware, What is it?

Spyware, what it is and what it does. Basically, spyware... Read More

Review on QuarkXpress 6.0

After almost two decades of existence, Quark has become the... Read More

How to Get The Best Accounting Software For Your Small Business

Buying accounting software is a major investment. It's an important... Read More

A Symons Mark II Function Point Counting Example

I provide, here clear explanations and a count of function... Read More

ERP Software Financing: the Future? ? Overview for Company Owner

In our case ? we serve Microsoft Business Solutions ERP... Read More

Microsoft Great Plains Dynamics on Pervasive SQL.2000 Data Repair ? Overview For DBAs

Some introduction into Great Plains Software products, now Microsoft Business... Read More

Downloading Spyware Removers: Think Before, not After

Just imagine: you are walking, say, towards your car, and... Read More

Who?s Watching What You Type?

If someone entered your home, uninvited and installed numerous cameras... Read More

limousine Chicago airport Arthur ..