Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC, to close crashed programs and processes, and to check performance. You probably avoid a few processes whose names mean nothing to you, but they're essential to Windows. svchost.exe sure likes to appear all the time and multiple times at that. What's taskmgr.exe? Oh yeah, it's the window you're looking at right now. ctfmon? Is he related to Pokemon? navapsvc.exe? Navy? Napa Valley? Navel? NOTA (none of the above).

This is not a comprehensive list as that would take days. It has the standard processes as well as process names from popular applications. If you want to know about a process, the best place to go is? ProcessLibrary.com. Just like adware and spyware, there are bad processes that come to life thanks to the bad guys like Trojans and viruses. The site has a list of the top five security threats, so watch out for those processes.

Also, beware the bad guys like to use legitimate names of processes. For example, rundll.exe is a system process that should not be terminated. However, recent reports have stated, "It can also be the LOXOSCAM virus depending on Operating System and file path; this is always a virus on Windows XP and 2000 operating systems however."

You can download software that provide more information about the process. Task Manager, as you know, says nothing except the name of the process and how much CPU it's using. One example is Process Explorer, a standalone application that also has the option of replacing the built in Task Manager for windows. It shows you information about which handles and DLLs processes have opened or loaded. http://www.sysinternals.com/ntw2k/freeware/procexp.shtml

acrotray.exe
Acrobat Assistant that is used when printing documents to a PDF. The process should not be removed while converting documents to PDF.

ADService.exe
Active Disk Service is a component of the Iomega zip drive.

AppServices.exe
Also for the Iomega zip drive.

ccEvtMrg.exe
Associated with Symantec's Internet Security Suite. Keep it and protect your PC.

ccSetMgr.exe
Also associated with Symantec's Internet Security Suite. Keep it and protect your PC.

csrss.exe
System process that is the main executable for the Microsoft Client / Server Runtim Server Subsystem. It should not be shut down.

ctfmon.exe
Non-essential system process. If you're using only English as the language, then it is not needed. However, it's recommended to leave it alone.

explorer.exe
This must always be running in the background. It's a user interface process that runs the windows graphical shell for the desktop, task bar, and Start menu.

iexplore.exe
Internet Explorer browser. But why are you using it unless it's for a site that doesn't work in any other browser? Use Firefox instead.

lsass.exe
Local Security Authority Service is a Windows security-related system process for handling local security and login policies.

Navapsvc.exe, nvsrvc32.exe, and navapw32.exe
These are Symantec's North AnvtiVirus processes. They or whatever virus program you use should run all the time.

realsched.exe
RealNetworks Scheduler is not an essential process. It checks for updates for RealNetworks products. It can be safely disabled.

rundll32.exe
A system process that executes DLLs and loads their libraries.

savscan.exe
Nortons AntiVirus process. Keep it.

services.exe
An essential process that manages the starting and stopping of services including the those in boot up and shut down. Do not terminate it.

smss.exe
Session Manager SubSystem is a system process that is a central part of the Windows operating system. If you try to kill it, it will be difficult? hence, the importance of leaving it be.

spoolsv.exe
Microsoft printer spooler service handles local printer processes. It's a system file.

svchost.exe x 6
You may have more than six appearances of this process or less. It's there multiple times to handle processes executed from DLLs. Leave it there.

System
This is a file that stores information related to local hardware settings in the registry under 'HKEY_LOCAL_MACHINE'. Kill it and kiss your PC's stability bye bye.

System Idele Process
Calculates the amount of CPU currently in use by applications. This won't go away no matter how hard you try. Don't try it, OK?

taskmgr.exe
Appears when you press Ctrl+Alt+Del.

wdfmgr.exe
Windows Driver Foundation Manager is part of Windows media player 10 and newer. Better not to stop the process.

winlogon.exe
Handles the login and logout processes. It's essential.

winword.exe
The great Carnac says, "You're running Microsoft Word."

Don't panic if you see something you have on the "bad guy" list. svchost.exe is important, but some are good guys and some are bad guys. Do your research before deleting anything. For instance, I have admin.exe, which has been reported as a bad guy. However, it is the admin process for one of my programs. When I closed the program, admin.exe also went away.

Meryl K. Evans, Content Maven, is Editor-in-Chief of eNewsletter Journal and The Remediator Security Digest. She's a slave to a MarketingProfs weekly column and a Web design reference guide at InformIT. She is the author of the popular e-report, How to Start a Business Blog and Build Traffic. Visit her site at http://www.meryl.net/blog/ for free newsletters, articles, and tips.

Barrington South Lincoln Stretch rentals .. Lockport Chicago limo O’Hare
In The News:

A newly discovered security flaw with your iPhone or iPad could leave your personal information vulnerable to hackers. Kurt the CyberGuy explains.
Modeled after a traditional bell-shaped skirt worn by women in Kosovo, a theater's roof is draped entirely by solar panels to generate renewable energy on-site.
Kurt the CyberGuy explains how to protect yourself from malicious Chrome extensions that can steal sensitive information like password managers, crypto wallets and banking apps.
Stellantis' innovative STLA AutoDrive 1.0 system allows drivers to safely take their eyes off the road and their hands off the steering wheel.
Here are some travel hacks to save money on your next vacation including setting up price alerts, remaining flexible and checking for 24-hour price drops.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
One report claims at least 25 million people were targeted by infostealer malware between the beginning of 2023 and the end of 2024, capturing bank card details and passwords.
The LaserWeeder G2 uses lasers, artificial intelligence and advanced robotics to offer an alternative to chemicals traditionally used in farming.
Tech expert Kurt “CyberGuy" Knutsson says a malware app called SpyLend is posing as a financial tool, hitting 100,000-plus downloads.
Tech expert Kurt “CyberGuy" Knutsson says Clone Robotics’ Protoclone mimics humans with 1,000 muscles – too human for comfort.
Tech expert Kurt “CyberGuy" Knutsson urges you to use Apple’s App Privacy Report to see what your apps are really up to.
Tech expert Kurt “CyberGuy" Knutsson talks about how to smoothly transfer your data from an old laptop to a new one using cloud storage or external drives.
Kurt the CyberGuy offers tips to safeguard your personal information as scammers become more sophisticated with scam texts and other methods.
WeRide's unmanned electric delivery van, the Robovan W5, has 194 cubic feet of cargo space and can carry payloads up to about 2,205 pounds
Kurt the CyberGuy recommends deleting 16 browser extensions immediately in response to a report saying more than 3.2 million web users were affected by a security breach.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A robotics firm in China claims a robot has performed the world's first humanoid robot front flip, which is significantly more difficult than a backflip.
A digital ID may be even more secure than a physical ID. Storing your driver's license in your Apple Wallet is an ideal solution for commuters.
A cybersecurity firm has shed some light on just how common tax scams have become. Kurt the CyberGuy offers his advice for how to protect your refund.
Lifesize Plans offers immersive walk-throughs that allow customers the opportunity to tour a home's design before construction actually begins.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A man invested $4 million in bitcoin and lost it all with a single click when he was targeted by a vishing scam, which uses phone calls to trick people.
Expandable's Touchdown is a designer trailer that promises a luxury off-grid living experience and unfolds into a home in about 15 minutes.
Major employee screening company data breach affects 3.3 million people. Tech expert Kurt “CyberGuy" Knutsson explains what happened and gives five ways to protect your data.
Kurt “CyberGuy" Knutsson reveals mind-blowing tech that gives you sunlight on demand.

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

SmartCar Memory Stick for LapTop Transfer Data

With the new technology used to transfer information to from... Read More

Tips For Finding Great Deals On Computer Accessories & Supplies

Tip #1. Do a Google search. Don't be to general... Read More

How To Remove One Operating System from a Dual Boot Windows XP Computer

In Windows Xp, you can install two operating systems on... Read More

What?s the Difference Between Plasma TVs and LCD TVs?

Plasma and LCD TVs are the latest trend in home... Read More

A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

COOKIES - What Are They!!

Cookies, not the kind that Mom makes, but the computer... Read More

Toshiba Wins Hollywood Support for the HD DVD format

What led them to this choice, as all four studios... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

Windows PDA Medical Software Benefits

PDA Medical BenefitsIf you are concerned about your medical history,... Read More

Home Electronics: The Facts About Plasma TV

Not so many years ago, homes across the country watched... Read More

Advantages and Guidelines of Automated Testing

"Automated Testing" is automating the manual testing process currently in... Read More

10 Tips to Stay Safe and Secure Online

The Internet can be a dangerous place.While you're enjoying the... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

5 Steps to Removing PC Clutter

It's hard enough as it is these days to get... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Buying a Home Theater Receiver

Buying a receiver is one of the most important decisions... Read More

How To Buy An MP3 Player

Are you looking for an MP3 player but am not... Read More

Digital Cameras + Photo Printers = Quality Instant Photographs

In the 1950's and 1960's Polaroid's instant cameras were all... Read More

Favorite Things To Do With Home Technology

Save money. Save 10-15% on utility bills per month. Work... Read More

Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix... Read More

How Does a Palm Pilot Work?

Just The Facts, Ma'mPalm pilots are all the rage now.... Read More

Downers Grove limo Chicago ..