Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC, to close crashed programs and processes, and to check performance. You probably avoid a few processes whose names mean nothing to you, but they're essential to Windows. svchost.exe sure likes to appear all the time and multiple times at that. What's taskmgr.exe? Oh yeah, it's the window you're looking at right now. ctfmon? Is he related to Pokemon? navapsvc.exe? Navy? Napa Valley? Navel? NOTA (none of the above).

This is not a comprehensive list as that would take days. It has the standard processes as well as process names from popular applications. If you want to know about a process, the best place to go is? ProcessLibrary.com. Just like adware and spyware, there are bad processes that come to life thanks to the bad guys like Trojans and viruses. The site has a list of the top five security threats, so watch out for those processes.

Also, beware the bad guys like to use legitimate names of processes. For example, rundll.exe is a system process that should not be terminated. However, recent reports have stated, "It can also be the LOXOSCAM virus depending on Operating System and file path; this is always a virus on Windows XP and 2000 operating systems however."

You can download software that provide more information about the process. Task Manager, as you know, says nothing except the name of the process and how much CPU it's using. One example is Process Explorer, a standalone application that also has the option of replacing the built in Task Manager for windows. It shows you information about which handles and DLLs processes have opened or loaded. http://www.sysinternals.com/ntw2k/freeware/procexp.shtml

acrotray.exe
Acrobat Assistant that is used when printing documents to a PDF. The process should not be removed while converting documents to PDF.

ADService.exe
Active Disk Service is a component of the Iomega zip drive.

AppServices.exe
Also for the Iomega zip drive.

ccEvtMrg.exe
Associated with Symantec's Internet Security Suite. Keep it and protect your PC.

ccSetMgr.exe
Also associated with Symantec's Internet Security Suite. Keep it and protect your PC.

csrss.exe
System process that is the main executable for the Microsoft Client / Server Runtim Server Subsystem. It should not be shut down.

ctfmon.exe
Non-essential system process. If you're using only English as the language, then it is not needed. However, it's recommended to leave it alone.

explorer.exe
This must always be running in the background. It's a user interface process that runs the windows graphical shell for the desktop, task bar, and Start menu.

iexplore.exe
Internet Explorer browser. But why are you using it unless it's for a site that doesn't work in any other browser? Use Firefox instead.

lsass.exe
Local Security Authority Service is a Windows security-related system process for handling local security and login policies.

Navapsvc.exe, nvsrvc32.exe, and navapw32.exe
These are Symantec's North AnvtiVirus processes. They or whatever virus program you use should run all the time.

realsched.exe
RealNetworks Scheduler is not an essential process. It checks for updates for RealNetworks products. It can be safely disabled.

rundll32.exe
A system process that executes DLLs and loads their libraries.

savscan.exe
Nortons AntiVirus process. Keep it.

services.exe
An essential process that manages the starting and stopping of services including the those in boot up and shut down. Do not terminate it.

smss.exe
Session Manager SubSystem is a system process that is a central part of the Windows operating system. If you try to kill it, it will be difficult? hence, the importance of leaving it be.

spoolsv.exe
Microsoft printer spooler service handles local printer processes. It's a system file.

svchost.exe x 6
You may have more than six appearances of this process or less. It's there multiple times to handle processes executed from DLLs. Leave it there.

System
This is a file that stores information related to local hardware settings in the registry under 'HKEY_LOCAL_MACHINE'. Kill it and kiss your PC's stability bye bye.

System Idele Process
Calculates the amount of CPU currently in use by applications. This won't go away no matter how hard you try. Don't try it, OK?

taskmgr.exe
Appears when you press Ctrl+Alt+Del.

wdfmgr.exe
Windows Driver Foundation Manager is part of Windows media player 10 and newer. Better not to stop the process.

winlogon.exe
Handles the login and logout processes. It's essential.

winword.exe
The great Carnac says, "You're running Microsoft Word."

Don't panic if you see something you have on the "bad guy" list. svchost.exe is important, but some are good guys and some are bad guys. Do your research before deleting anything. For instance, I have admin.exe, which has been reported as a bad guy. However, it is the admin process for one of my programs. When I closed the program, admin.exe also went away.

Meryl K. Evans, Content Maven, is Editor-in-Chief of eNewsletter Journal and The Remediator Security Digest. She's a slave to a MarketingProfs weekly column and a Web design reference guide at InformIT. She is the author of the popular e-report, How to Start a Business Blog and Build Traffic. Visit her site at http://www.meryl.net/blog/ for free newsletters, articles, and tips.

non-toxic cleaning company Winnetka ..
In The News:

Researchers are now showing us that old smartphones as data centers could be the next big thing in sustainable tech.
Scientists have created micro-robots for sinus infection treatment that can enter the nasal cavity, eliminate bacteria directly at the source, and exit without harming surrounding tissue.
Let's examine how your data is collected in everyday life, who is buying and selling it, what happens to it afterward, and, most importantly, what you can do to protect yourself.
Researchers at the University of Sheffield in the U.K. developed small robots called "Pipebots" that can travel inside water pipes to find and potentially repair leaks, all without any excavation.
A groundbreaking new study has uncovered disturbing AI blackmail behavior that many people are unaware of yet.
Four teams of autonomous humanoid robots competed in China's first AI soccer tournament, demonstrating advanced capabilities in ball detection and independent decision-making.
The ID. Buzz autonomous van features self-driving technology with 13 cameras, nine LiDAR units and five radars after Volkswagen partnered with Hamburg and Uber for 2026 deployments.
Social Security phishing scams use urgency and impersonation to steal personal data. Learn how to spot fake SSA emails and implement 10 protective measures.
French startup Pazzi Robotics created an AI-powered pizza robot that made pies in under five minutes without human help, but it closed in 2022 despite patents and expert partnerships.
Reclaim your time from big tech with effective screen time reduction strategies for iPhone and Android, featuring steps to limit app usage and create phone-free zones.
Amazon Prime Day shoppers face threats from 120,000-plus scam websites as cybercriminals prepare phishing traps and malware ahead of the July sales event.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
The AEON humanoid robot tackles labor challenges with Nvidia AI, Microsoft Azure cloud and advanced spatial awareness, working alongside industry leaders Schaeffler and Pilatus.
Google's Ask Photos feature brings AI-powered searches to your photo library, letting you find memories with natural language queries while maintaining privacy controls.
The return of blue book exams emerges as universities fight widespread AI academic dishonesty and educators debate whether to ban AI tools or teach responsible usage.
Signs your phone might be hacked include strange behavior, unauthorized texts, battery drain and pop-ups, while protection involves updating software and avoiding public Wi-Fi.
Tokyo startup H2L has launched Capsule Interface technology enabling full-body robot control with muscle sensors, offering immersive remote operation.
The A.I. industry seems set for growing pains as Big Tech companies scramble for solutions to the medium's unprecedented strain on the power grid.
Fourth of July fireworks cause a 60% spike in lost pets, but GPS trackers and AI photo-matching services like Love Lost can help reunite missing dogs with their families.
Protect yourself from jugging, the rising crime by which thieves monitor ATM users and follow them to steal cash, with six practical safety tips to stay alert and secure.
U.S. airlines like Delta, American and United are selling your domestic flight records to government agencies through the little-known Travel Intelligence Program.
Autonomous robots from Uber Eats are rolling out across U.S. cities, featuring LIDAR sensors, secure compartments and all-weather operation for food and grocery delivery.
Costco has expanded into EV infrastructure with new ultra-fast charging stations that can charge most electric vehicles to 80% in 20-60 minutes while shoppers browse the warehouse.
The new Gemini Robotics On-Device AI allows robots to perform complex tasks without internet, offering enhanced privacy, reliability and adaptability for real-world use.
Protect yourself from Amazon phishing scams by spotting red flags like suspicious sender addresses and spelling errors while using Amazon's Message Center to verify communications.

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

How to Switch to Firefox and Why You should

First things first, what is Firefox? Well, it's a browser.... Read More

5 Steps to Remove Spyware for Free

Have you ever tried to remove Spyware off your PC... Read More

Why Build Your Own Computer System

Have you ever thought about building your own computer system?... Read More

Back Up, Back Up, Back Up!

This is not your typical lost data story. I was... Read More

Cisco CCNA Certification: Five Things To Do DURING The Exam

There are plenty of articles out there about how to... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

Taking Advantage of the iPod Experience

Music lovers have been carrying around radios and other bulky... Read More

Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix... Read More

Help, I Need a New HDTV! (Part 4 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Buying a Personal Computer (PC)

For many people the computer industry is a seeming unsolvable... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy... Read More

Cisco Certification: A Survival Guide To The Cisco Cable Jungle

One of the most confusing parts of beginning your Cisco... Read More

Apache, MySQL & PHP for Windows

Apache, MysQL and PHP for Windows could be a nice... Read More

A Lesson in HTML

As the owner of a Country Mall and Top Site... Read More

Ergonomics and Healthy Computing - Positioning Your Body For Maximum Comfort At Your Computer

Do you remember the old saw about how computers would... Read More

Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment

MP3 players are Hot! Playing music has come a long... Read More

Basic Computer Thermodynamics

That desk in front of you and everything else around... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: ???Get... Read More

How To Recognize The Telltale Signs Of Spyware

Spyware is the software that collects information about your online... Read More

A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More

experienced cleaning professionals Glencoe ..