Viewing the Win7 Process Path Ensuring System Security

  
After each reinstallation of the system, various security guards and anti-virus software are essential protection tools, they can automatically intercept the process of some illegal programs to ensure the security of the computer working environment. However, many times we choose to bypass security software for installation, such as some exam software or game software. At this time, I am worried that these software will affect the system operation. In fact, we can monitor the software to see if there is a problem by checking the process to ensure the security of the system.


































There are two ways to "process", one is to call up the security item by the combination key "Ctrl+Alt+Del"; select the tab in the "Process Manager" option. The second method is to select the taskbar to call out the manager, right click on the blank taskbar, select “ start task manager & rdquo;, the method one is more popular, the second method is more convenient, the effect is the same.
In Figure 1, the "Process" option shows the default state, which has CPU and memory usage. This is very practical. They can know which programs are using too much memory, so it is judged to be Enough is a malicious plugin and so on. However, we will find it difficult to find the file path of the corresponding program under the management process, which brings trouble for further judgment. The next small series tells you how to change the status bar label.
Recalling More Status Options

First go to the "Process Manager" to find the "Process" option, then select “View —Select on the toolbar under the Process Features option Column & rdquo;.

Enter “Select Process Page Columns, we can see the choice of various items, because the purpose is to know the specific file path of the process, so you need to check the "mirror path name" “ Command line & rdquo; These two, after the selected single machine can be determined. The "mirror path name" is the detailed file path of the program process, and the second selected "command line" is to verify whether the program is a masquerading program, the specific method is "mirror path name" and "quo"; The display state of the command line & rdquo; needs to match.

In the task menu under the task manager, you will see the detailed usage and the specific path of the program.
Methods for verifying whether it is a suspicious program
When we see a program that occupies memory and CPU files too large in the process, we need to be vigilant, and write down the corresponding program name under "Image Name". Search on the Internet, because there are virus programs and Trojans specific information on the Internet, as well as information provided by netizens, it is easier to find out the loopholes. Once it is found to be an illegal program, you only need to open the file according to the corresponding path, and remove it. Its running permission or directly delete it, can achieve the effect of the bottom of the salary, so you can safely use the computer.
Because the Win7 system optimizes the task manager better, the customization is more open, so it is easier to implement the viewing process, while other systems cannot be viewed through the above methods. It is recommended that friends regularly monitor the process to protect computer security.

Copyright © Windows knowledge All Rights Reserved