What's the side effects of constantly ending processes through ctrl + alt + del? [closed] - taskmanager

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I always feel guilty when I end a process in the task manager, thinking to myself that if there was a microsoft developer behind me he'd probably say 'if you only knew what you're doing..' . So, is it that bad to kill processes or actually it's something that don't have relevant collateral damages at all? Thanks!

It depends on what you're killing, really.
If that process has created some temp files, they aren't going to get cleaned up. If the process was in the middle of writing to a file, the file will be incomplete.
I wouldn't worry about the side effects from killing a frozen notepad.exe. But if it is something like VMWare Workstation, then yes, I would worry because my VM might be corrupted.

I'd have to second the answer of 'it depends'. A large percentage of programs out there won't cost you much more than whatever you were doing at the time of the kill. With that said, there are other programs that could suffer significant damage depending on when you kill it. It all depends on what the application is doing, what kind of temp/state/etc files/data it's using at the time, etc.
With all that said, I wouldn't think 'death by task manager' would be all that common of an activity. Sure there are programs that go south off and on, but I'm rarely pushed to having to kill a process of with that kind of force...

Related

Monitor going black for no reason [closed]

Closed. This question is not about programming or software development. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 5 months ago.
Improve this question
Ok so, my monitor is going black on random occasions. Mostly it is when i watch a video. It doesn't matter if it is on youtube, facebook, udemy or whatever other site.
I checked my cables they are all good. I also turned off the screen saver.
Any ideas what it could be?
there could be many reasons for this - bad drivers, bad cables, bad screen, GPU overheating and melting solder connections (I've experienced this).
the easiest thing to check is to see if the issue is in the computer itself. to do that, connect to a different monitor (using a different cable).
to check if it's a software issue, you could try running a LiveCD of a different OS on your computer (for example, Fedora or Ubuntu).
if the issue still happens even with a different OS, then it's likely a GPU problem - you'll need to either get that replaced, replace the mainboard (if GPU is integrated), or replace the computer...

Can a ransomware in a VMware break out? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 5 years ago.
Improve this question
I want to test some Ransomware. Therefore I wanna use VMware and create a virtual machine, where I can execute this software. I already deleted the Network device, so that no connection is possible between my computer and the VM. Do I need to know something more about it. Could it be possible that the virus breaks out and affects my PC?
Make sure that you are not playing around with Cerber 6 Ransomware because it has Anti-VM features that can easily bluff you when you are on the test. I just got to know the same from this post:http://ransomwares.net/cerber-6-ransomware/. I request you to read this post to know more about Cerber's new Anti-VM & Anti-Sandboxing features which makes it dangerous than never before!
Be sure to disable all shared folders. Also disable any CPU virtualisation acceleration, then you should be fine.

How to know what BIOS version to learn? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I've read that every manufacturer can produce his own BIOS ,
where to find a specific BIOS interrupts list , and how to know my PC's BIOS version?
there's a lot ( IBM , AT&T , ..)
And it's really strange that the only reference is RBIL !
where to read "ALL" interrupts of specific version ?
Most BIOS vendors are compatible with the original IBM PC BIOS source, but that is a convention, not a rule. Many BIOS vendors will offer their own extended/undocumented BIOS calls.
If you are simply trying to boot, read disk sectors, print characters on the screen, etc, you should be able to manage that without having to know which specific BIOS you are running on. After all, they must be similar enough for DOS to boot!
If you really want to know what specific BIOS you have, you can look in the BIOS POST or setup screens. Look for a version or ID string. Otherwise, you can boot Windows and run the System Information tool, which can tell you. Otherwise, you can dump the F000 segment to a file and run the "strings" utility on it. Again, you probably do not need to know this, because it is irrelevant for 99% of the basic PC operations.
My favorite reference for BIOS and DOS interrupts is the Programmer's PC Sourcebook (Second Edition). It's long out of print, but I think you can still find used copies on Amazon. There are other books out there, but this is the one on my bookshelf that I have used for the last 10+ years.
If you are adverse to spending money, the Ralf Brown Interrupt List (RBIL), seems pretty comprehensive, but I have never used it personally.

Backup Exec freezing on inventory and clean jobs [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 4 years ago.
Improve this question
Overall, I need to be able to run backup jobs which are already in place, but are failing whenever run, see my last thread: http://www.reddit.com/r/techsupport/comments/1edqsx/ive_been_asked_to_backup_windows_servers_using/[1]
Today, I've been trying to clean the tape drive using a cleaning cartridge which we bought. I inserted the tape, imported it, and marked it as the cleaning slot within backup exec.
Now, however, I'm running into new problems I haven't encountered. First of all, when I try to perform a clean job within Backup Exec, the job starts and makes it to 17%, at which point it returns to 10 percent . It just does this cycle over and over again, never getting above 17%.
Next, I tried inventorying the tape library. I run the job and it begins, but always freezes indefinitely at 30%.
Does anybody have an idea what might be happening, and what I might do to get it working properly?
Verify that the firmware on the hardware is up to date. Also be sure that you are using Symantec drivers on the tape drives. You can do this by running the Tapeinst.exe command.
Edit... Also posted on your Redit thread

What are the dangers of a hacked Apache Tomcat server? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 8 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
If a Tomcat7 (on Ubuntu 12.x) gets hacked (caused by weak username/password) what is the hacker able to do? Of course he can deploy .war archives.
But:
Can he get access on the complete file system?
Can he change tomcat/FTP/ubuntu admin passwords?
Or are there no limits at all?
If you are talking about a weak password for the tomcat manager application (that you can use to deploy new webapplications): Well - can you imagine a web application called "remote file explorer"? or "remote shell"? Basically, if you can upload code to servers that gets executed, there's almost no limit.
Well, the limit is set by your admins: Java (and with it Tomcat) can run in a sandbox/security manager. I actually know not many installations that do this. Also, quite a lot of tomcat installations run as the root user - if you lose control over such an instance, you're toast.
So the question you're asking is: "Is it dangerous when attackers can run arbitrary code on my server?" I hate to reveal this, but the answer is "yes".
As of tomcat, I feel that the manager application is nice for debugging, but not something you want to deploy on a production system, visible to the world. But that's only a very small part of the hardening process.
Oh, and even though it might not exactly fit in this context, but you might want to look at Java/Tomcat hacked, I just found this scrolling by - a nice alternative vulnerability to a weak password.