A few things you don't know about the blocking process.

  
After the system starts, it will run a lot of processes. If you know the real face of the process, you can safely let them run the day after tomorrow. The following system home Xiaobian takes you to know what the blocking process is. Processes are a term that we often encounter in our daily operations. Everyone's system has a variety of processes, some are normal system processes, and some may be malicious processes. How do we discriminate and prevent them? Quickly judge the good and evil of the process of judging the good and evil, the easiest way is to search the web. In the task manager, right click on the process to select “Online Search”, or search for Baidu and Google by process name. It can also be done with a few tools, such as AnVir Task Manager (download address: http://www.anvir.com/download.htm) to quickly find malicious processes. After blocking the malicious process from the root to find out the malicious process, of course, it is necessary to stop it, but many stubborn processes are very secretive. It is usually bundled with our normal startup program, which makes everyone annoyed. For example, Thunder has an advertising process. After deleting the program file, it will always be automatically regenerated. For such stubborn processes, we can use an alternative method to intercept them. 1. Generate an instance of the same name file method: Block the Thunder advertising process to first shut down Thunder, then enter c:\\Program Files\\Thunder Network\\Thunder\\addins\\InMediaAddin, delete the ThunderMinisite.exe file. Then create a folder (note, not Files, files can often be replaced) Named ThunderMinisite.exe. 2. Interpretation of permission interception examples: Blocking IE pop-ups Generally, we are using third-party browser software, but many advertising websites are using IE pop-up windows, always popping up IE windows. For users who don't use IE, we can use the permission method to prevent it from starting, so we can block the IE popup (but it will not affect the browser using IE core). Open C:\\Program Files\\Internet Explorer, and then right-click “iexplorer.exe”Select “Properties →Security” tab, select the account name corresponding to the current user from the “Group or User Name” list box. And in the permission list box corresponding to the user account, set all users' access rights to the IE browser to "reject" (requires file ownership first), and finally click the "OK" button (Figure 1 ). Termination: Ending a malicious process For many stubborn processes, if it is started, it cannot be terminated by the Task Manager. At this point you can terminate it using other methods. Method 1: Command Line Forced Termination NTSD is an invincible process termination tool that forces all processes except System, SMSS.EXE, and CSRSS.EXE to be terminated. Therefore, if you find that the stubborn malicious process can not be terminated by the above method, you can try to start the command prompt, and then enter "lds;ntsd -cq -p process ID" (Note: NTSD is XP comes with system commands, Win7 users can go to http://Dwz.cn/cfan02 download, and then copy it to C:\\windows\\system32 to use) method to force termination. Method 2: Close multiple processes in batches If there are multiple malicious processes that need to be shut down together, you can use the taskill command that comes with the system, first open the task manager, click “ view → select the column & rdquo;, then open the window Check the PID (Figure 2). So if you find that more than one malicious process can't be terminated later, first open the task manager, switch to the "process" label, write down the PID name of these processes, start the command prompt as administrator, and enter the following command Batch termination: Taskkill /f /PID 1 /PID 2 /PID 3 can of course also be implemented by software tools, such as the AnVir Task Manager described above. Many Trojans often have two processes. After killing one process, another process immediately reactivates it. At this time, just hold down Ctrl in the above program window, then select both processes of the Trojan, and then click Kill process to close the batch, and then post-process it. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved