Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC, to close crashed programs and processes, and to check performance. You probably avoid a few processes whose names mean nothing to you, but they're essential to Windows. svchost.exe sure likes to appear all the time and multiple times at that. What's taskmgr.exe? Oh yeah, it's the window you're looking at right now. ctfmon? Is he related to Pokemon? navapsvc.exe? Navy? Napa Valley? Navel? NOTA (none of the above).

This is not a comprehensive list as that would take days. It has the standard processes as well as process names from popular applications. If you want to know about a process, the best place to go is? ProcessLibrary.com. Just like adware and spyware, there are bad processes that come to life thanks to the bad guys like Trojans and viruses. The site has a list of the top five security threats, so watch out for those processes.

Also, beware the bad guys like to use legitimate names of processes. For example, rundll.exe is a system process that should not be terminated. However, recent reports have stated, "It can also be the LOXOSCAM virus depending on Operating System and file path; this is always a virus on Windows XP and 2000 operating systems however."

You can download software that provide more information about the process. Task Manager, as you know, says nothing except the name of the process and how much CPU it's using. One example is Process Explorer, a standalone application that also has the option of replacing the built in Task Manager for windows. It shows you information about which handles and DLLs processes have opened or loaded. http://www.sysinternals.com/ntw2k/freeware/procexp.shtml

acrotray.exe
Acrobat Assistant that is used when printing documents to a PDF. The process should not be removed while converting documents to PDF.

ADService.exe
Active Disk Service is a component of the Iomega zip drive.

AppServices.exe
Also for the Iomega zip drive.

ccEvtMrg.exe
Associated with Symantec's Internet Security Suite. Keep it and protect your PC.

ccSetMgr.exe
Also associated with Symantec's Internet Security Suite. Keep it and protect your PC.

csrss.exe
System process that is the main executable for the Microsoft Client / Server Runtim Server Subsystem. It should not be shut down.

ctfmon.exe
Non-essential system process. If you're using only English as the language, then it is not needed. However, it's recommended to leave it alone.

explorer.exe
This must always be running in the background. It's a user interface process that runs the windows graphical shell for the desktop, task bar, and Start menu.

iexplore.exe
Internet Explorer browser. But why are you using it unless it's for a site that doesn't work in any other browser? Use Firefox instead.

lsass.exe
Local Security Authority Service is a Windows security-related system process for handling local security and login policies.

Navapsvc.exe, nvsrvc32.exe, and navapw32.exe
These are Symantec's North AnvtiVirus processes. They or whatever virus program you use should run all the time.

realsched.exe
RealNetworks Scheduler is not an essential process. It checks for updates for RealNetworks products. It can be safely disabled.

rundll32.exe
A system process that executes DLLs and loads their libraries.

savscan.exe
Nortons AntiVirus process. Keep it.

services.exe
An essential process that manages the starting and stopping of services including the those in boot up and shut down. Do not terminate it.

smss.exe
Session Manager SubSystem is a system process that is a central part of the Windows operating system. If you try to kill it, it will be difficult? hence, the importance of leaving it be.

spoolsv.exe
Microsoft printer spooler service handles local printer processes. It's a system file.

svchost.exe x 6
You may have more than six appearances of this process or less. It's there multiple times to handle processes executed from DLLs. Leave it there.

System
This is a file that stores information related to local hardware settings in the registry under 'HKEY_LOCAL_MACHINE'. Kill it and kiss your PC's stability bye bye.

System Idele Process
Calculates the amount of CPU currently in use by applications. This won't go away no matter how hard you try. Don't try it, OK?

taskmgr.exe
Appears when you press Ctrl+Alt+Del.

wdfmgr.exe
Windows Driver Foundation Manager is part of Windows media player 10 and newer. Better not to stop the process.

winlogon.exe
Handles the login and logout processes. It's essential.

winword.exe
The great Carnac says, "You're running Microsoft Word."

Don't panic if you see something you have on the "bad guy" list. svchost.exe is important, but some are good guys and some are bad guys. Do your research before deleting anything. For instance, I have admin.exe, which has been reported as a bad guy. However, it is the admin process for one of my programs. When I closed the program, admin.exe also went away.

Meryl K. Evans, Content Maven, is Editor-in-Chief of eNewsletter Journal and The Remediator Security Digest. She's a slave to a MarketingProfs weekly column and a Web design reference guide at InformIT. She is the author of the popular e-report, How to Start a Business Blog and Build Traffic. Visit her site at http://www.meryl.net/blog/ for free newsletters, articles, and tips.

Wood Dale Chicago prom limo .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Internet browsers are useful, but they can be dangerous. Clicking on malicious links can direct you to dangerous websites that steal information or infect your device.
Apple's latest iOS update introduces advanced artificial intelligence capabilities, which may be capturing and analyzing sensitive information.
Breach site confirmed 56,904,909 Hot Topic users' data leaked online. Tech expert Kurt “CyberGuy" Knutsson says the company's silence makes matters even worse.
Tech expert Kurt “CyberGuy" Knutsson discusses how an innovative Easy-Way kit turns standard strollers electric, simplifying navigation for parents.
Tech expert Kurt “CyberGuy" Knutsson talks about T-Mobile being hacked in broad cyberattack on global phone and internet companies.
Tech expert Kurt “CyberGuy" Knutsson shows you how to add, customize and manage widgets for quick access to apps and info from your iPhone home screen.
Wrong Google searches can not only compromise your device and personal data. They can also bring law enforcement to your doorstep. Hackers are targeting Google searches.
China's Shanghai Kepler Robotics has developed a new humanoid robot that can carry up to 35 pounds per hand for commercial applications across various industries
Checking your hearing has gotten easier with the new hearing test feature in AirPods Pro 2. You can take reliable hearing tests using your iPhone or iPad.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how a VPN — virtual private network — works and how running it can slow down the operation of your device.
The WalkON Suit F1, an exoskeleton developed to help people with disabilities, can actually walk over to a person in a wheelchair, solving a major problem.
ClickFix, a new scam targeting computer users, is on the rise in the U.S. The scam prompts its targets to click on a link to fix a problem.
Skydweller is the world's largest unmanned solar-powered aircraft that can stay airborne for weeks, and even months, without refueling.
The U.S. government said it is investigating after People's Republic of China hackers targeted commercial telecommunications service providers in the U.S.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Scammers are using increasingly sophisticated ways to lure unsuspecting victims, and some are impersonating an email help desk or support team.
You can unsend or edit your iMessages with the latest iOS updates. Kurt the CyberGuy explains how you can save yourself some potential embarrassment.
Kurt “CyberGuy" Knutsson says there’s been a rise in cybercriminal services using hacked police and government emails to send subpoenas and data requests to U.S. companies.
Kurt “CyberGuy" Knutsson discusses how Axiom Space and luxury designer Prada are collaborating on NASA's Artemis III spacesuit design.
Voice assistants may cause confusion across devices. Tech expert Kurt “CyberGuy" Knutsson offers some solutions to fix it.
Shameless scammers trick veterans into giving personal info or cash. Tech expert Kurt “CyberGuy" Knutsson explores five common scams.
Tech expert Kurt “CyberGuy" Knutsson helps you honor our heroes with these powerful podcasts, audiobooks and documentaries this Veterans Day.

D2X Digital SLRCoolpix 8800 Actually Refers to Two Nikon Cameras

Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More

Cut Through the Hype and Make the Right Digital Camera Comparisons

There are soooo many choices. With all the styles and... Read More

Temporary Fixes to Spyware, Ad-ware, and Virus Infections

So you've got some spyware, ad-ware, or viruses on your... Read More

Learn the Lost Art of Touch Typing

Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More

Portable Technology: Getting to Know the Treo

Up until the recent past, those who wanted to take... Read More

The Advantages of Portable MP3 Players

With their solid-state technology, compact size, and abundant memory, portable... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

HTML Explained: Part 2

Get started creating web pages using text files and HTML... Read More

Buying A PC Flat Screen Monitor

For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More

Is DVD Storage An Attractive Alternative For Your Computer Backup?

If you have a computer for home use or for... Read More

Basic Problem in a PC

I have a p3 500MHz PC with 128MB RAM, 10.2... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Be Your Own IT Department

If you use a computer, you need to know more... Read More

Toshiba Wins Hollywood Support for the HD DVD format

What led them to this choice, as all four studios... Read More

Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

COOKIES - What Are They!!

Cookies, not the kind that Mom makes, but the computer... Read More

Cache In Your Chips And Get A Bus!

Computer related terminology could sometimes be daunting to newcomers. These... Read More

Keeping the Windows Registry Operational

The registry is where the computer stores information about the... Read More

10 Easy Steps to Speed Up Your Computer - Without Upgrading

1. Empty the Temp directory regularly. To do this, make... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment

MP3 players are Hot! Playing music has come a long... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

Virtual Memory - What is It?

I recently got an e-mail asking about virtual memory. The... Read More

Antigo wedding limo ..