Starter allows system process management to "three swords one"

  

In the event of system failure, infection, we are most concerned about the "three major pieces" - self-starting programs, current active processes and services. The built-in tools of the system do not manage them particularly well, and several programs have to be executed, which is not convenient to operate. Starter combines "three big pieces" into one interface, and powerful features make it easier for you to identify problems in the event of a system failure.

Beyond MSConfig's Self-Boot Management

Trojans and viruses often use self-starting to compromise computers, so when you suspect that you are infected with a virus, you usually have to find all the self-starting locations of the system one by one. However, there are many places in the system's self-starting position. Manual search is not convenient, but MSConfig can only be disabled and cannot be deleted. For example, the "Super Password Killer (I-Worm/Supkp.z)" has added a self-starting key value in 9 locations such as [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] and [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionunServices]. After starting the Starter, click "Start Project". In the list on the left, you can clearly see all the self-starting projects of the virus, and the different startup items are arranged according to the user and the starting position. Now hold down the Ctrl key to select the 9 self-starting key values ​​in turn, then right-click and select "Delete" to clean up the self-starting key values ​​(see figure). In addition, right-click any self-starting program to select "File Properties", you can see the details of the startup process, including the path, version, etc., to make it easier to determine whether the file is safe. At the same time, select "Browse Branch Key" to quickly open the "Registry Editor" and locate the corresponding key value, unlike MSConfig just look at it.

Terminating all suspicious processes with one click

Trojans are becoming more and more embarrassing. They often monitor each other through multiple processes. For example, "Falling Star" Trojan uses "internet.exe". And "systemtray.exe" dual process protection mode. After the system's own "task manager" terminates one of the processes, another monitoring process will immediately regenerate it. Starter can end multiple malicious processes in batches. Now click the "current process" tab of the program window, and also use the Ctrl key to select the above two processes, and then terminate all malicious processes by "terminate" in the right-click menu.

Service management in one step

There are also many malicious programs disguised as system services. For example, gray pigeons will add the "Gray_Pigeon_Server" service in the registry [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices]. Registry service key values ​​and system searches to complete virus killing. Now just click the "Services" tab in the Starter window, right-click "Gray_Pigeon_Server" in the service list and select "Browse File Directory". You can directly open the directory where the executable file is located to quickly find the Trojan file, and select "Browse Service Registration Key". You can quickly locate the service key-value repair system by directly locating the service registry key. In addition, you can also select "Search on the Internet" to enable the search engine to search the description of the service on the Internet. For common viruses, you can find a solution by searching.

Copyright © Windows knowledge All Rights Reserved