The 1993 action game Doom? Yeah, it can manage *nix processes.

Initially started by a University of New Mexico student in 1999 and improved a year later, psDoom is a novelty source port that doubles as a process manager. Monsters tied to processes on the system are spawned in a secret area of E1M1 (or MAP01), with their process details printed on top of them. Wounding these “pid monsters” adjusts their priority, while killing them… kills the process. To make things a little less self-destructive, processes can’t damage each other with infighting.

From the author’s website:

I will not assume any liability for damage caused from running this code. Especially if you are running it as root. In fact, we both know that this will cause damage to the system, and that’s why you want to try it. You have been warned.

Thanks to suicunedude for reminding me of this!

A newly discovered vulnerability in the Bash command-line interpreter poses a critical security risk to Unix and Linux systems – and, thanks to their ubiquity, the internet in general. The vulnerability is present in Bash through version 4.3, and was discovered by Stephane Chazelas. It puts Apache web servers, in particular, at risk of compromise via CGI scripts that use or invoke Bash in any way – including any child processes spawned by the scripts. OpenSSH is also affected on machines that use Bash. Ubuntu and other Debian-derived systems using Dash are not affected. "Holy cow. There are a lot of .mil and .gov sites that are going to get owned," security expert Kenn White said today in reaction to the flaw.