The Security Task Manager installation procedure starts with a very quick extraction operation.
The actual Security Task Manager installation wizard appears on top of full screen gradient layered blue background reminiscent of days gone by. The 3 step wizard walks you through the standard installation decisions.
The last step in the wizard prompts you to immediately launch Security Task Manager.
As soon as Security Task Manager launches, it scans for trustworthy programs and then begins scanning all running processes and compiles a very detailed description of each running process.
In addition to scanning running processes, Security Task Manager also delves into your browser and looks for all browser extensions, which as you know are designed to allow legit developers to add browser enhancements, but are also used by Malware thugs to hide deviant tools.
Once Security Task Manager is finished scanning all running processes and browser extensions, it begins analyzing and rating the risk factors of each item that it has identified.
When you select any process in the list, the bottom portion of the windows will transform into a very detailed three panel information source. The left panel provides you with details about the file, the middle panel provides with details about individual criteria that are used to calculate the risk rating, and the right panel provides you with a listing of all the plain text found in the file.
If you click the Start item in the left panel, you'll see the Start dialog box that tells you when the program started, how it started and the location from which it starts.
If you click any one of the items in the middle panel, you’ll see a pop-up window that provides you with details about each one of the criteria used to calculate the risk rating.
If you recognize an item that Security Task Manager flags as dangerous, you can click the Comment item in the left panel and you’ll see the Comment dialog box that not only allows you to add your own custom information to describe the program, but you can also use the drop down to change the rating.
As you can see here, because I recognized HydraDM as a tool that came with the ATI video card and changed the rating, the middle panel reflects those changes accordingly. You’ll also notice that the row color and bar graph in the main list have changed as well.
The first stop on the way to Google is the Neuber.com Web site where you’ll find a brief report on the file that contain links to predefined Google searches. You can also read opinions or comments from other users of Security Task Manger as well as add your own comments using the form located at the bottom of the page.
If you click any of the links in the brief report section at Neuber.com, you’ll then see a Google search results page.
In addition to the other methods of gathering information about a particular process, you can just double-click the item and you’ll see the file’s standard Windows Properties dialog box.
If you discover a suspicious or dastardly process, you can click the Remove button. When you do, you’ll see the Remove dialog box and will have two options. First, you can simply remove the process from memory or you can quarantine the processes’ file.
Once you’ve quarantined a file, you can click the Quarantine button on the toolbar and then either delete or restore the file, depending on whether you’ve determined if it is a loathsome piece of malware or a mislabeled piece of reputable software.
When you close the trial version, you’re slyly prompted to learn a more about the features in the full version.
If you click Yes, Security Task Manager will tell you how many services and drivers it found that are potentially dangerous. But, that’s all you get. Clicking More Details only takes you to a sales pitch for the full version.