473,411 Members | 1,998 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,411 software developers and data experts.

Win32: Detecting when system is locked or sleeping

I have written an application which works perfectly when the machine is
operating under normal conditions, however when the screen becomes
locked it imediately starts to fill up several hundred MB's of memory.

Is there a way to detect when the system is locked?

Best,

rod

May 22 '06 #1
4 2485

rod> I have written an application which works perfectly when the
rod> machine is operating under normal conditions, however when the
rod> screen becomes locked it imediately starts to fill up several
rod> hundred MB's of memory.

What do you mean by "locked"? Unresponsive to mouse or keyboard activity?
Blue screen? What is your application doing while it's filling up memory?
Which memory, disk or RAM?

rod> Is there a way to detect when the system is locked?

Perhaps Nagios can help: <http://www.nagios.org/>. In general, I don't
think a system can be relied upon to detect its own demise, as the recent
PC/Mac commercial about restarting illustrates:
<http://www.apple.com/getamac/ads/>.

Skip
May 22 '06 #2
sk**@pobox.com wrote:

rod> I have written an application which works perfectly when the
rod> machine is operating under normal conditions, however when the
rod> screen becomes locked it imediately starts to fill up several
rod> hundred MB's of memory.

What do you mean by "locked"? Unresponsive to mouse or keyboard activity?
Blue screen? What is your application doing while it's filling up memory?
Which memory, disk or RAM?


I think he means locked by the user for security.

Keyboard/mouse lock. As in ctrl-alt-del -> [Lock Computer]

Not the blue-screen, hung, rogered type of lock which is not voluntary and
rather more frequent.
--
Dale Strickland-Clark
Riverhall Systems www.riverhall.co.uk
We're recruiting. See the web site for details.

May 22 '06 #3
Yes, I mean just a good old fashioned screen lock (for security)
initiated by the user. 'Sadly' there has been nothing as exciting as a
blue-screen of death as yet, not even when the app swells to 400MB.

Best,

rod

May 22 '06 #4
Further to my last post, I will try some of the tips presented above.
Also the app writes to the screen display (or Active Desktop). As
someone suggested, that could be where the problem is.

Best.

rod

May 23 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Francois De Serres | last post by:
Hiho, could somebody please enlighten me about the mechanics of C callbacks to Python? My domain is more specifically callbacks from the win32 API, but I'm not sure that's where the problem...
3
by: rbt | last post by:
How can I safely append a crontab entry to a crontab file progammatically with Python? I need to handle crontabs that currently have entries and crontabs that are empty. Also, I'd like this to...
2
by: rbt | last post by:
I have a win32 service written in Python. It works well. It sends a report of the status of the machine via email periodically. The one problem I have is this... while trying to send an email, the...
15
by: Bryan | last post by:
I have a multi-threaded C# console application that uses WMI (System.Management namespace) to make RPC calls to several servers (600+ ) and returns ScheduledJobs. The section of my code that...
3
by: Sagaert Johan | last post by:
I have a program that uses the filesystemwatcher. Problem is that i have to wait until the file is closed before i can do someting with it in the changed event. How can i detect if the...
5
by: Jim Slade | last post by:
I've been doing some research on security and it seems like hashing/salting passwords is a good idea - but still not really all that secure against dictionary attacks (the salt just makes the...
0
by: troutbum | last post by:
I am experiencing problems when one user has a document open through a share pointing to the web site. I use the dsolefile to read the contents of a particular directory and then display them in a...
2
by: Eduard Witteveen | last post by:
Dear list, In the corporation, we want to know who is using which computer, and do some phone routing based upon this information. When a user log's uses it's account to login, the phone on the...
2
by: Frank Moyles | last post by:
Hi, I want to use SciPy library. I am using W2k, and ActiveState Python 2.5. I have succesfully numpy, but when I run the scipy-0.6.0.win32-py2.5.exe (from the downloads section on the SciPy...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.