Solved

SO MANY IEXPLORE.EXE's running in Task List!

Posted on 2011-03-25
2
411 Views
Last Modified: 2013-12-24
I'm running IE8 v8.0.6001.18702 and when I ended my sessions.  I STILL HAD iexplore.exe running in my task list!  Two of them!  Why?
How can I stop this?
0
Comment
Question by:brothertruffle880
2 Comments
 
LVL 14

Expert Comment

by:svgmuc
ID: 35217450
There might be processes using iexplore.exe to get data from the web.
Also, it might be a sign for a virus infection of the computer.
0
 
LVL 10

Accepted Solution

by:
Nancy McCullough earned 500 total points
ID: 35299796
explore.exe is part of the Windows OS. iexplore.exe IS NOT.


Kill Multiple Processes From the Command Line

The first thing you’ll need to do is open up a command prompt, and then use the taskkill command with the following syntax:

    taskkill /F /IM <processname.exe> /T

These parameters will forcibly kill any process matching the name of the executable that you specify. For instance, to kill all iexplore.exe processes, we’d use:

    taskkill /F /IM iexplore.exe


(http://www.howtogeek.com/howto/windows-vista/how-do-i-kill-all-the-iexploreexe-processes-at-once/)
0

Featured Post

Don't miss ATEN at NAB Show April 24-27!

Visit ATEN at NAB Show to learn how our "Seamlessly Entertaining" solutions deliver fast, precise video streaming without delays for the broadcasting and media environment. ATEN will showcase its 16x16 Modular Matrix Switch (VM1600) and KVM Over IP Solution (KE6900 series).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
parent control advice for app searches 4 32
Can't access router with user and pass 10 74
HP 2530 switch and routing 4 54
Secure log in 'box' 4 8
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
How to create a custom search shortcut to site-search Experts Exchange using Google in the Firefox browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch your Bookmark Menu: Press 'Ctrl +…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question