Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Check out your system with Security Task Manager

5 of 25 NEXT PREV
  • 61073.png

    If you've ever looked at Task Manager's Processes tab and wondered where all those processes came from, then you need to investigate Security Task Manager. It's very easy to use and provides you with all kinds of detailed information on each and every process running on your computer.

    You may download a free trial version of Security Task Manager from TechRepublic's software library.
    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61074.png

    You can download Security Task Manager from TechRepublic's Software Library.

    To find it, just type Security Task Manager in the text box and click Search. When you click the Download link, you'll see the File Download dialog box and should just click Save.
    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61075.png

    Once you download Security Task Manager, locate the taskmanager17.exe file in Windows Explorer, and double-click it to launch the installation. When you do so, you might see the Open File Security Warning message.

    Just click the Run command to get started.
    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61076.png

    The Security Task Manager installation procedure starts with a very quick extraction operation.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61077.png

    The actual Security Task Manager installation wizard appears on top of full screen gradient layered blue background reminiscent of days gone by. The 3 step wizard walks you through the standard installation decisions.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61078.png

    The last step in the wizard prompts you to immediately launch Security Task Manager.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61079.png

    Since Security Task Manager is packaged as a time limited trial version, the first thing that you see when you launch it is a nag screen, which is actually kind of unique in that the sales pitch actually contains a bit of humor and the background pleasantly changes colors much like a screen saver.

    To proceed, you need to click Continue.
    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61072.png

    As soon as Security Task Manager launches, it scans for trustworthy programs and then begins scanning all running processes and compiles a very detailed description of each running process.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61081.png

    In addition to scanning running processes, Security Task Manager also delves into your browser and looks for all browser extensions, which as you know are designed to allow legit developers to add browser enhancements, but are also used by Malware thugs to hide deviant tools.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61082.png

    Once Security Task Manager is finished scanning all running processes and browser extensions, it begins analyzing and rating the risk factors of each item that it has identified.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61083.png

    When Security Task Manager completes the risk rating phase, it sorts the list, color codes the rows, and displays bar graphs for each item according to its risk rating.

    As you can see, dark red rows indicate a higher risk factor while lighter red and white rows indicate successively lower risk factors.
    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61084.png

    When you select any process in the list, the bottom portion of the windows will transform into a very detailed three panel information source. The left panel provides you with details about the file, the middle panel provides with details about individual criteria that are used to calculate the risk rating, and the right panel provides you with a listing of all the plain text found in the file.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61085.png

    If you click the Start item in the left panel, you'll see the Start dialog box that tells you when the program started, how it started and the location from which it starts.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61086.png

    If you click any one of the items in the middle panel, you’ll see a pop-up window that provides you with details about each one of the criteria used to calculate the risk rating.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61087.png

    If you recognize an item that Security Task Manager flags as dangerous, you can click the Comment item in the left panel and you’ll see the Comment dialog box that not only allows you to add your own custom information to describe the program, but you can also use the drop down to change the rating.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61080.png

    As you can see here, because I recognized HydraDM as a tool that came with the ATI video card and changed the rating, the middle panel reflects those changes accordingly. You’ll also notice that the row color and bar graph in the main list have changed as well.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61089.png

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61090.png

    The first stop on the way to Google is the Neuber.com Web site where you’ll find a brief report on the file that contain links to predefined Google searches. You can also read opinions or comments from other users of Security Task Manger as well as add your own comments using the form located at the bottom of the page.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61091.png

    If you click any of the links in the brief report section at Neuber.com, you’ll then see a Google search results page.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61092.png

    In addition to the other methods of gathering information about a particular process, you can just double-click the item and you’ll see the file’s standard Windows Properties dialog box.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61093.png

    If you discover a suspicious or dastardly process, you can click the Remove button. When you do, you’ll see the Remove dialog box and will have two options. First, you can simply remove the process from memory or you can quarantine the processes’ file.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61094.png

    Once you’ve quarantined a file, you can click the Quarantine button on the toolbar and then either delete or restore the file, depending on whether you’ve determined if it is a loathsome piece of malware or a mislabeled piece of reputable software.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61095.png

    When you close the trial version, you’re slyly prompted to learn a more about the features in the full version.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61096.png

    If you click Yes, Security Task Manager will tell you how many services and drivers it found that are potentially dangerous. But, that’s all you get. Clicking More Details only takes you to a sales pitch for the full version.

    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

  • 61088.png

    If you suspect that something bad has snuck into your computer or are just curious about all the running process, then Security Task Manager is an awesome tool for performing a bit of computer forensics.

    If after you use Security Task Manager for 30 days you decide you'd like to use it longer, you can register your copy for $29. When you do, you'll receive a key that will also unlock the addindional features.

    Security Task Manager is compatible with Windows 9x, ME, NT, 2000, XP and Windows Server 2003.

    You may download your free trial version of Security Task Manager from TechRepublic's software library.
    Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

    Caption by: Greg Shultz

5 of 25 NEXT PREV
  • 61073.png
  • 61074.png
  • 61075.png
  • 61076.png
  • 61077.png
  • 61078.png
  • 61079.png
  • 61072.png
  • 61081.png
  • 61082.png
  • 61083.png
  • 61084.png
  • 61085.png
  • 61086.png
  • 61087.png
  • 61080.png
  • 61089.png
  • 61090.png
  • 61091.png
  • 61092.png
  • 61093.png
  • 61094.png
  • 61095.png
  • 61096.png
  • 61088.png

Investigate the inner workings of your computer with Security Task Manager!

Read More Read Less

The actual Security Task Manager installation wizard appears on top of full screen gradient layered blue background reminiscent of days gone by. The 3 step wizard walks you through the standard installation decisions.

Published: April 9, 2007 -- 17:17 GMT (10:17 PDT)

Caption by: Greg Shultz

5 of 25 NEXT PREV

Related Topics:

PCs Servers Storage Networking Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • Galaxy Fold first look at Samsung's Unpacked

    Samsung gave its foldable phone an official name and revealed when you can buy it. (Warning: It isn't cheap.)

  • Galaxy S10 first look: All the models and colors up close

    Here is Samsung's latest flagship range, in all its glory.

  • Weird but super useful gadgets

    I seem to be someone who buys things on the off chance that they will be useful at some point down the road. Thile there are many times when it doesn't feel like this pays off, some of the ...

  • Old flames: Products that keep the retro fires burning

    It's no fun when lovers play mind games, but there's no shortage of ways to celebrate one's love of old video games, not to mention other tech products carrying brands that once flamed ...

  • Tech that stole our heart or broke it

    With Valentine's Day around the corner, ZDNet's contributors and editors were reminded of all the technology they were infatuated with, either in their past or present, as well as ...

  • Valentine's Day gifts: Tech for lovers and friends

    If your partner or friend is tech-obsessed, we've rounded some cool items we think they'll love this Valentine's Day.

  • Last-minute tech gifts and gadgets for your Valentine

    Chocolate and flowers are not the only options this Valentine's Day.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums