Solved

cpu spiking on toshiba tecra 8100

Posted on 2003-11-26
5
289 Views
Last Modified: 2010-04-14
Hi!
I have a toshiba tecra 8100, 800 mhz, 256 mb ram.
The cpu usage for the process "System" jumps up to around 20 percent every 2 seconds. This may not seem like such a big problem but it's actually impossible to play mp3:s and similar things because they stop playing when System uses up the cpu. I've tried reinstalling windows but that doesn't help. I've also tried stopping all services that can be stopped but that didn't help either. The problem does not appear in safe mode however.

Does anyone have any ideas?
0
Comment
Question by:thela
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 

Author Comment

by:thela
ID: 9823788
nevermind, disabling the infrared port seemed to solve the problem
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9824065
Jumping to 20 percent should not pose you a big problem..

But if it is doing that without you opening any application , check for spywares or virus that might be acting in that back

*********
Spyware/Adware removal tools:
------------------------------

What is spyware : http://www.spychecker.com/spyware.html

SpyBot-S&D : http://www.webattack.com/download/dlspybot.shtml 

Ad-aware : http://www.webattack.com/download/dladaware.shtml 

Trojan Remover :http://www.simplysup.com/

HijackThis : http://www.webattack.com/download/dlhijackthis.shtml 

KL-Detector  :http://www.webattack.com/download/dlkldetector.shtml

X-Cleaner Free  :http://www.webattack.com/download/dlxcleaner.shtml

SpywareBlaster  :http://www.webattack.com/download/dlspywareblaster.shtml

SpywareGuard :http://www.webattack.com/download/dlspywareguard.shtml

SpySites  :http://www.webattack.com/download/dlspysites.shtml

Keylogger Hunter :http://www.webattack.com/download/dlklhunter.shtml

Spycop: http://www.spycop.com/

BHODemon : http://www.spywareinfo.com/downloads/bhod/

Browser Hijack Blaster : http://www.wilderssecurity.net/bhblaster.html

Goodbye Spy http://www.topshareware.com/GoodBye-Spy-download-2012.htm

Other spyware removal instructions: http://www.pchell.com/support/click2findnow.shtml


online virus scanner:
---------------------

http://housecall.trendmicro.com/ 

http://security.symantec.com/

http://www.pandasoftware.com/activescan/com/activescan_principal.htm

http://www.pcpitstop.com/antivirus/default.asp 

DOS based : http://www.f-prot.com/download/download_fpdos.html

****************

Sunray
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9824070
If your issue is solved by disabling infra red port, just post a 0 pt in the CS and request Mods to close the question

Sunray
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 9842507
PAQed, with points refunded (125)

Computer101
E-E Admin
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Changing a few Outlook Options can help keep you organized!
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question