Search Results

Search found 13165 results on 527 pages for 'hyper v tools'.

Page 234/527 | < Previous Page | 230 231 232 233 234 235 236 237 238 239 240 241  | Next Page >

  • How to find the process(es) which are hogging the machine

    - by Aaron Digulla
    Scenario: All of a sudden, my computer feels sluggish. Mouse moves but windows take ages to open, etc. uptime says the load is 7.69 and raising. What is the fastest way to find out which process(es) are the cause of the load? Now, "top" and similar tools isn't the answer because they either show CPU or memory usage but not both at the same time. What I need is the single command which I might be able to type as it happens - something that will figure out any of System is trying to swap 8GB of RAM to disk because process X ... or process X seeks all over the disk or process X uses 400% CPU" So what I'm looking for is iostat, htop/atop and similar tools run into one with an output like this: 1235 cp - Disk trashing 87 chrome - Uses 2&nbsp;GB of RAM 137 nfs_bench - Uses 95% of the network bandwidth I don't want a tool that gives me some numbers which I can analyze but a tool that tells me exactly which process causes the current load. Assume that the user in front of the keyboard barely knows how to write "process", but the user is quickly overwhelmed when it comes to "resident size", "virtual memory" or "process life cycle". My argument goes like this: A user notices a problem. There can be thousands of reasons ... well, almost :-) The user wants to know the source of the problem. The current solutions give me lots of numbers, and I need to know what these numbers mean. What I'm looking for is a meta tool. 99% of the data is irrelevant to the problem. So what the tool should do is look for processes which hog some resource and list only those along with "this process needs a lot of CPU, this produces many IRQs, this process allocates a lot of RAM (and it's still growing)". This will be a relatively short list. It will be much more simple for someone new to this to locate the culprit from this list than from the output of, say, htop which gives me about 5000 numbers but requires me to fold multi-threaded processes myself (I have 50 lines which say VIRT 2750M but only 16 GB of RAM - the machine ought to swap itself to death but of course, this is a misinterpretation of the data that can happen quickly).

    Read the article

  • How can I change my default Outlook account ?

    - by user596509
    I am trying to remove my current email account from outlook and add another one I clicked on toolsaccount settings then removed my current account(gmail account) from the list of emails Then I clicked on new and add my new account (hotmail account), but no messages loads from my new account and my old messages from the old email still there under personal folders! Then I click on tools account settings data files and found personal folder as a defult file I tryed to remove it but I cant then I tried to set my new account as default but it didnt work

    Read the article

  • Is there an alternative to /dev/urandom?

    - by altCognito
    Is there some faster way than /dev/[u]random? Sometimes, I need to do things like cat /dev/urandom /dev/sdb The random devices are "too" secure und unfortunately too slow for that. I know that there are wipe and similar tools for secure deletion, but I suppose there are also some on-board means to that in Linux.

    Read the article

  • How to filter RSOP to show only modified policies?

    - by guest
    Is it possible to view only those elements of GPO that are actually modified/specified? For example, when looking at RSOP for an OU, I have loads of options which are mostly not specified - can I automatically filter it to show only e.g. that it doesn't allow to use control panel or install software, instead of looking through all options? I am using Win2003 and I have only the default tools. Thanks in advance!

    Read the article

  • Resource Pools and VMTools Best Practices

    - by LucD
    Are there any published (or non-published) best practices with using Resource Pools in a View environment? Using Shares/Limits etc...Also, when installing the VMTools on a desktop, are there any best practice configurations with running the tools within a desktop?Resource Pools and VMTools Best Practices

    Read the article

  • An device with an unknown MAC address is connected to my router

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • Is there a Linux distro specific for running as a host OS for Virtualization?

    - by harmh
    Hi, as I understand running VMware or other virtualizations requires a "host os". Normally this is one of your main os-es, that you really use. What I would like is a mini-linux and virtualization software pre-wrapped into a specialized bootalble, installable mini-os. So the linux would not have a webserver, nor X, just the minimum to run as a host OS and of course optimized for that, like some partitioning tools and such.

    Read the article

  • How do you monitor and react when some scheduled job fails? - general question

    - by Dzida
    Hi, In many projects my team faced problems with 'silent fails' of some important components. There are lot of tasks executed behind the scenes and if somethings fails (either by errors in logic or hardware problems) in most cases responsible person is not notified (or not notified instantly). I know about heavy-weight monitoring tools that could solve some of that problems but there over-complicated and too expensive for our team. I am interested what are your solutions for such problems.

    Read the article

  • Mac Remote Shell

    - by Jamza
    I am trying to create a remote shell on OS X with NC. I tried nc -l 1337 -e /bin/bash but it seems that the Mac version of NC does not support the -e option. Does anyone know how I can achieve a remote shell on OS X preferably only using the built in tools? Thank you.

    Read the article

  • Cron is not available, what can be used instead?

    - by alemani
    Hello, Several server accounts where I run some scripts to extract data from databases have very limited tools available and on some of them you are not allowed (even by formal request) to use cron, than been said, can you recommend any tool(s) I can use to schedule the execution of the scripts (just like cron does)? Thanks ins advance :)

    Read the article

  • An unknown Mac is connected to my router?

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • Websites that introduce new stuff [closed]

    - by user33929
    Are there any blogs/websites that introduce new funny/fancy websites or new tech (software/hardware)? I am talking about sites that may introduce digg.com, superuser.com, mint.com or delicious.com when these site first come out. I am also looking for sites that introduce new handy/useful 3rd party applications/tools. Thanks.

    Read the article

  • easiest Way to attach screenshot to Gmail

    - by csmba
    I use winSnap or any other desktop app that lets me use shortcut to quickly crop and take a screen-shot of my screen. using outlook, I can just CTR-V it into my email. Easy! What is the best combination of tools/pluging/websites to make it as easy to get the same result using gmail?

    Read the article

  • In Linux, is there a way to get a warning if I forget to unplug my pendrive?

    - by missingno
    I forgot my pendrive plugged in when leaving the computer lab yesterday, and I would have lost it if it wasn't for a kind soul finding and returning it. I want to avoid this in the future and apparently there are some tools you can use in windows that warn you if you are leaving a pendrive behind when logging off or shutting down the computer. Is there anything similar that works on Linux? I need this to work on Fedora 17 (GNOME 3 shell), and preferably without requiring administrator privileges.

    Read the article

  • emacs for sys admins

    - by mbac32768
    Are you a sys admin that uses emacs? What tools/plugins do you find essential? In my organization the programmers tend to use emacs whereas the sys admins gravitate towards vim. Since we have 4:1 programmers:sys admins, the global emacs config has a lot more goodness but it doesn't fit nicely into my workflow since I'm used to starting/stopping vim on remote hosts 1000 times a day Does emacs have a place in your sys admin workflow?

    Read the article

  • How to reduce the Windows 7 menu expansion delay?

    - by ChrisA
    Ok, so you hover over the items pinned to the Win 7 menu, and wait all month for it to pop out the sub menu containing recent items opened with the selected app. Is there a registry hack to speed this up? I want the sub menus quicker. Same applies to the delay before things Control Panel and Administrative Tools pop out their sub menus too. It just takes too long, so how to reduce that delay?

    Read the article

  • Gzip not working in browser

    - by Cathal
    According to whatsmyip.org none of my browsers (Firefox, Chrome etc) on W7 are gzip enabled, it's saying 'NO, your browser is not requesting compressed content' which agrees with Chrome developer tools as I was testing a site and it was complaining that the page and css etc weren't compressed. I've searched for an answer but cannot find anything for this. I've tested from another pc connected to the router and that works fine, something on this pc is broke.... Any help tia

    Read the article

  • Mac on My Router?

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

< Previous Page | 230 231 232 233 234 235 236 237 238 239 240 241  | Next Page >