Using Win7 Task Manager to ensure system security

  

After reinstalling the system, various security guards and anti-virus software are necessary protective tools, they can automatically intercept the process of some illegal programs to ensure the computer The safety of the work environment. However, many times we choose to bypass security software for installation, such as some exam software or game software. At this time, I am worried that these software will affect the system operation. In fact, we can monitor the software to see if there is a problem by checking the process to ensure the security of the system.

Recalling the Process Viewer

“Process” is a function under the Windows
Task Manager, which we can use to completely shut down the program. , check the memory and CPU usage, etc., there are two ways to start the "process", one is to call out the security item through the key combination "Ctrl+Alt+Del"; in the selection "process manager" ; Select the tab to do it. The second method is to call the manager by selecting the task bar, right click on the blank task bar, select “ start task manager & rdquo;, method one is more popular, method 2 is more convenient, the effect is the same.

In Figure 1, the "Process" option displays the default state, which has CPU and memory usage. This is very useful. They can know which programs are using too much memory. Therefore, it is judged to be a malicious plug-in and so on. However, we will find it difficult to find the file path of the corresponding program under the management process, which brings trouble for further judgment. The next small series tells you how to change the status bar label.

Recalling More Status Options

First go to the "Process Manager" and find the "Process" option, then select on the toolbar under the Process Options. “View —select column”.

Enter "Select process page column", we can see the choice of various items, because the purpose is to know the specific file path of the process, so you need to check the "mirror path name" ” and “command line” these two, after the selected single machine can be determined. The "mirror path name" is the detailed file path of the program process, and the second selected "command line" is to verify whether the program is a masquerading program, the specific method is "mirror path name" and "quo"; The display state of the command line & rdquo; needs to match.

In the task menu under Task Manager, you will see the detailed usage and the specific path of the program.

Methods for verifying whether it is a suspicious program

When we see a program that occupies memory and CPU files too large in the process, we need to be vigilant, and write down the image name” Under the corresponding program name, search on the Internet, because there are virus programs and Trojans specific information database, as well as information provided by netizens, it is easier to find loopholes. Once it is found to be an illegal program, it only needs to be based on the corresponding Path, open the file, remove its running permissions or delete it directly, you can achieve the effect of the bottom of the salary, so you can safely use the computer
.

Because the Win7 system optimizes the task manager better, the customization is more open, so it is easier to implement the viewing process, while other systems cannot be viewed through the above methods. It is recommended that friends regularly monitor the process to protect computer security

Copyright © Windows knowledge All Rights Reserved