CPU Usage

Language: JP EN DE FR
2010-09-08
New Items
users online
Forum » Everything Else » Tech Support » CPU usage
CPU usage
 Diabolos.Chupacabra
Offline
Server: Diabolos
Game: FFXI
user: Caesar
Posts: 931
By Diabolos.Chupacabra 2010-09-15 15:48:23
Link | Quote | Reply
 
Hmm. 50-80% seems livable... but that still seems a bit high. Are you running with all graphic options maxed? and at a high resolution?


Also, yes, the 2793mhz was what we wanted :) means your CPU is running ok.


Edit: In heavily populated areas, it's normal to get near 100% CPU usage on a P4. My sister had a Celeron (same series CPU) and it would max out at 100% in whitegate and jueno. It would even run high in certain outdoor areas like Bhaflau and Sea.
 Odin.Godofgods
Offline
Server: Odin
Game: FFXI
Posts: 4013
By Odin.Godofgods 2010-09-15 15:52:27
Link | Quote | Reply
 
its jumping all over now.. 30 40 50 60 70 80 90 99, ever droped to 0 and 1% for a second... 0.o

Graphic options max, ill admite.. i have no clue.

My game resolution is probably a bit off from others. Bad eyesight, cant handle the small text i see in most screenshots form other ppl. Game resolution is overlay-640x480 and background-512x512
 Diabolos.Chupacabra
Offline
Server: Diabolos
Game: FFXI
user: Caesar
Posts: 931
By Diabolos.Chupacabra 2010-09-15 15:55:47
Link | Quote | Reply
 
Ok, hmmm... You've pretty much stumped me. 640x480 should be playable on any system with minimal resources :\

30-80% should be your norm though. Not sure why it's jumping around so much. I could see if it was total CPU usage and not just pol.exe usage... but I dunno :(
 Odin.Godofgods
Offline
Server: Odin
Game: FFXI
Posts: 4013
By Odin.Godofgods 2010-09-15 15:58:24
Link | Quote | Reply
 
yea, now your where im at lol

tho i will say right now my game appears to be running a bit more smoothly... tho it might jsut be wishfull thinking.. well see in time
 Fenrir.Schutz
Offline
Server: Fenrir
Game: FFXI
user: Schutz
Posts: 3122
By Fenrir.Schutz 2010-09-15 15:59:04
Link | Quote | Reply
 
Just to apend to the earlier remark, Trend Micro (the ones that make HJT) also make an app called "RUBotted" which detects, in real time, if your computer is being used as part of a botnet, I think by checking the packet formats you are sending out (and you can turn off the app, naturally, if you like.)

Again, if you can't get the usage to behave like you are expecting, you can always DL these just for the peace-of-mind.
 Odin.Godofgods
Offline
Server: Odin
Game: FFXI
Posts: 4013
By Odin.Godofgods 2010-09-15 16:02:00
Link | Quote | Reply
 
ok how about this then... (jsut what u want to hear :D)

when i bring up the task manager to check cpu usage, for jsut a split second its showing pol.exe at ~50% then immiditly jumps to 90+ (like its trying to hide something form me) ... tried it a few times, doing that every single one
 Fenrir.Schutz
Offline
Server: Fenrir
Game: FFXI
user: Schutz
Posts: 3122
By Fenrir.Schutz 2010-09-15 16:05:17
Link | Quote | Reply
 
Have you defragged recently? XP has the option for both FAT and NTFS, if I remember correctly? Maybe defragging might help things out. (Hope so.)
 Odin.Godofgods
Offline
Server: Odin
Game: FFXI
Posts: 4013
By Odin.Godofgods 2010-09-15 16:07:00
Link | Quote | Reply
 
Fenrir.Schutz said:
Have you defragged recently? XP has the option for both FAT and NTFS, if I remember correctly? Maybe defragging might help things out. (Hope so.)

yea, do in a somewhat regular basis.. and i did again last night
 Fenrir.Schutz
Offline
Server: Fenrir
Game: FFXI
user: Schutz
Posts: 3122
By Fenrir.Schutz 2010-09-15 16:35:56
Link | Quote | Reply
 
If you are feeling ambitious, here's that link to Trend Micro's HijackThis:

http://download.cnet.com/Trend-Micro-Hijac...4-10227353.html

Because so many malware programs imbed themselves in registry operations that occur *before* your operating system starts up, they are able to place themselves in areas that your spyware scanners and AV programs can't identify or remove them because they load after the OS starts. That's why rootkit removal programs operate in a "OS shell" environment to work independently, and why you typically need to know in advance that you *need* the rootkit and have the malware pre-identified.

With HijackThis, you receive an analysis of not ony your registry but all operations (visible and hidden, not just the ones shown on Window's "Taskmanager") going at the time of the scan (which takes seconds to do.) Which looks something like this (from the CNET screenshot of an older version as a sample):



The coding is a bit intimidating at first, because as I mentioned before, the program wasn't intended for the "casual/layperson" type of user. Essentially each operation listed can be corrected or terminated and any associated coding would be removed from the registry by clicking on the checkboxes and choosing an action. Because of the sheer power of the application (to clean things manually that other malware scanners cannot, but also to do severe damage to your computer by eliminating key operations to Windows) it was intended to be used by those with some working knowledge of computers.

The good news, though, is that the learning curve is very shallow and the average computer user can become an expert very quickly using online resources to look up the individual operation codes, thanks in large part to anti-malware communities like the late CastleCops, so there are user-databases that can identify all codes just by doing cut-and-paste and using their search functions:

http://www.systemlookup.com/lists.php

The other good news is that nowadays, makers of "bonafide" computer operations (Microsoft, Lavasoft, Real, Roxio, Soundblaster, Adobe, etc. ...I'd include "Apple" but iTunes itself is an insidious virus in my opinon LOL) :p actually put identifier tags on their registry operations, so it is much easier to identify those fake installed-operations that pretend to be Microsoft, Norton AV, etc. In fact, in the Vista and later OS versions of Taskmanager, a lot of these official tags show up to differentiate the processes.

So essentially you run the program, generate the report (similar to above), look at the various sections (O2, O3, O4, etc.) then look for things that stand out that you cannot recognise. For these you use the reference link and copy-and-paste that {code-code-code} into the reference and see what comes up for the questionable items.

Just go slowly and don't delete anything unless you know for sure what it is (or what it isn't) supposed to be, or post your report log on one of those online forums for an expert to help analyse your processes.
Log in to post.