Security Task Manager User Guide



Similar documents
Advanced Event Viewer Manual

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Network Security Task Manager User Guide

SecuraLive ULTIMATE SECURITY

User manual of the Work Examiner Contents

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365

Sophos for Microsoft SharePoint startup guide

Citrix Access Gateway Plug-in for Windows User Guide

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Anti-Virus for Mac OS X Help

Best Practices for Deploying Behavior Monitoring and Device Control

Sophos for Microsoft SharePoint Help

User Guide for the Identity Shield

FortKnox Personal Firewall

SysPatrol - Server Security Monitor

Charter Business Desktop Security Administrator's Guide

System Administrator Guide

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

Sophos Anti-Virus for Mac OS X: Home Edition Help

Microsoft Security Essentials Installation and Configuration Guide

Revo Uninstaller - User's Guide

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

TeamViewer 7 Manual Remote Control

Sophos Endpoint Security and Control Help

DiskPulse DISK CHANGE MONITOR

Sophos for Microsoft SharePoint Help. Product version: 2.0

PC Security and Maintenance

RDM+ Remote Desktop for Android. Getting Started Guide

ViRobot Desktop 5.5. User s Guide

TeamViewer 8 Manual Remote Control

How to easily clean an infected computer (Malware Removal Guide)

INSTALLATION AND CONFIGURATION GUIDE

Follow the instructions below for first-time users only

Best Practice Configurations for OfficeScan (OSCE) 10.6

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

Sophos Enterprise Console Help

Basic Administration Guide

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Frequently Asked Questions: Xplornet Internet Security Suite

Page 1. Max Total Security

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

CYAN SECURE WEB APPLIANCE. User interface manual

MacroPhone. ISDN Call Monitor, Telephone Answering Machine and Fax-Functions over Networks

Installing the Microsoft Network Driver Interface

WINDOWS PROCESSES AND SERVICES

How To Use Secureanything On A Mac Or Ipad (For A Mac)

Getting Started with Vision 6

Sticky Password User Manual Sticky Password

Windows XP File Management

User Guide Terminal Service Plus

K7 Business Lite User Manual

F-Secure Internet Security 2012

Symantec AntiVirus Corporate Edition Patch Update

Trend Micro OfficeScan Best Practice Guide for Malware

Pcounter Web Report 3.x Installation Guide - v Pcounter Web Report Installation Guide Version 3.4

User Guide Win7Zilla

6 USING WINDOWS XP 6.1 INTRODUCTION

TeamViewer 9 Manual Remote Control

Attix5 Pro Server Edition

QBalance.com. We make QuickBooks work for you. Call Toll-Free: (800) Congratulations! You are using the best accounting software available!

Introduction to Free Computer Tools

Contents. McAfee Internet Security 3

Attix5 Pro Server Edition

ThinPoint Quick Start Guide

TeamViewer 7 Manual Remote Control

Novell ZENworks Asset Management 7.5

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

VIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods:

Basic Computer Maintenance

Core Protection for Virtual Machines 1

Windows File Management A Hands-on Class Presented by Edith Einhorn

Symantec Mail Security for Domino

Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For Windows 8

Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

Installation and Configuration Guide

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Avira AntiVir Professional User Manual

User Guide to the Content Analysis Tool

SecuraLive ULTIMATE SECURITY

Infor ERP BaanIV / Baan 5.0 / LN 6.1. User's Guide for Worktop 2.4

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

AnVir Task Manager v5.2 User's Guide

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Personal Call Manager User Guide. BCM Business Communications Manager

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Ajera 7 Installation Guide

Sophos Endpoint Security and Control Help. Product version: 11

File Management in Windows Explorer

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Windows 7 for beginners

TeamViewer 10 Manual Remote Control

ViRobot Management System 4.0

Operating Systems. and Windows

Lenovo Online Data Backup User Guide Version

SystemTech AntiSpyware Manual

Transcription:

Security Task Manager User Guide Enhanced Process Viewer with security risk rating A. & M. Neuber Software GmbH

2 Security Task Manager Table of Contents Part I Features of Security Task Manager 4 Part II Using Security Task Manager 6... 6 Overview... 6 Viewing process details... 7 Learning more about a process (Google search)... 7 Ending a process... 7 Using quarantine folder... 8 Printing process list... 8 Exporting process list... 8 Writing a comment... 8 Checking Hosts file changes... 9 Changing the language Part III Basics 11... 11 Risk Rating of processes... 12 Process types... 12 Contacting the Security Task Manager Team... 13 Uninstalling Part IV Protecting your computer with SpyProtector 15... 15 Delete traces of your Internet and computer activity... 15 Disable keyboard monitoring... 15 Disable other monitoring... 15 Warning when registry is changed Part V Registration and Order information 17... 17 Remarks about the trial version... 17 How to register Security Task Manager... 17 How to unlock the shareware version Index 19

Features of Security Task Manager Part I

4 Security Task Manager I. Features of Security Task Manager Security Task Manager provides advanced information about programs and processes running on the computer. For each process it shows the following information not shown in Windows Task Manger: security risk rating virus scan with 40 anti-virus engines file name and folder path description start time CPU usage graph program icon contained hidden functions (keyboard monitoring, Browser supervision, manipulation) process type (visible window, systray program, DLL, IE-Plugin, service) The Security Task Manager also recognizes virtual driver software, services, BHO or processes hidden from the Windows Task Manager.

Using Security Task Manager Part II

6 Security Task Manager II. Using Security Task Manager Overview Security Task Manager shows all active processes on your computer. The Rating tells you all relevant security functions a process contains. The listed processes can be sorted by the following properties. Click on View menu to chose, which properties are shown: Name Rating Process ID (PID) CPU and Memory Active runtime File Type Start Title and Description Company and Product Click a process to obtain more information about the process. You can: see properties end process place process in quarantine Click Windows processes button to see all internal Windows operating system processes. Windows system processes are not shown by default. When you are logged on to Windows with a standard user account, perhaps you see for some system processes: <taskeng.exe - Services - Access denied> Please run Secu rity Tas k M an ager as Administrator in this case: Right-mouse click the Secu rity Tas k M an ager icon. Then click Run as administrator. Viewing process details Click on a process to see more information about this process. Follwing properties are shown: Name Rating Company Description Type Start File Comment Receive further information or stop the process: Information from the Internet about a process Ending process

Using Security Task Manager 7 Putting in quarantine Learning more about a process (Google search) 1 Click on the process you want to examine. 2 Click Google button on tool bar. An information web page is displayed on www.neuber.com/taskmanager where you can submit your opinion about this software/driver software, or read other user comments. You can also search for further information about this process at Google.com. Your Internet browser transmits information (e.g. operating system, language setting). Neither the Security Task Manager program nor any of its components connect to the Internet directly. Google.com is one of the most commonly used search engines, and will provide you with relevant results. Ending a process 1 Click on a process you want to close. 2 Click the button Remove. 3 Then select one of following options: End process Move file to quarantine Uninstall Ending a process can cause system instability, including crashes. Software that needed Adware programs could not work. Please save opened documents. You can create a restore point, to can restore your Windows system at any time. You need administrator rights for this dialog. To start Security Task Manager with administrator rights, please right-mouse click the Security Task Manager shortcut. Then click Run as... Using quarantine folder The quarantine folder works like the Windows Recycle Bin (trash). When you put a file into quarantine folder, the file is renamed and moved to an isolated folder. Corresponding Autostart keys in the Windows registry are deleted so the process cannot be started again. Restoring the whole process is possible at any time: Restoring processes 1 Click quarantine button on tool bar. 2 In the quarantine folder click on process you want to restore. 3 Click Restore button. You can create a Windows restore point in the system at any time. Remove dialog, to restore your Windows

8 Security Task Manager Printing process list 1 On File menu click Print. 2 Chose a printer and make any necessary settings (e.g. duplex print). Click Windows processes button to see all Windows internal processes. Then you can print Windows processes too. Windows system processes are not shown by default. Exporting process list 1 On File menu click Export to. 2 Chose a file type: Text file (*.txt) Website (*.html) Click Windows processes button to see also all Windows internal processes. Then you be able to save Windows processes too. Windows system processes are not shown by default. Please save the process list from time to time. A saved process list can serve as a point of comparison to help you find new processes in the future. Writing a comment You can record a remark about each process, which will be visible in the process properties. You can vote the process to change the Security Task Manager Rating. To write a comment 1 Right mouse click a process you want. 2 Click Comment... on the appearing context menu. 3 Enter you comment and your opinion about the process. Checking Hosts file changes The Windows hosts file is located in c:\windows\system32\drivers\etc folder by default. This text file contains the mappings of IP addresses to Internet domain names (e.g. www.file.net). If the hosts file was changed without your knowledge, there could be a malware which redirects websites (e.g. from banks, antivirus companies) to fake web pages. You can edit the hosts file with Windows notepad. To deactivate a redirection, simply delete the line. The h os ts file replaces DNS (Domain Name Service). The lm h os ts file in the same folder replaces WINS, which IP addresses to computers in your LAN network.

Using Security Task Manager 9 Changing the language Security Task Manager recognizes the used language (English, Deutsch, Espanol,...) automatically. To change the language do the following: 1. On View menu click Language 2. Then click the language you want. The software can easily be translated to any language. Simply translate the lgs_english.txt text file in the program's folder, and send it to. You will receive a free registration for your translation. Um die deutsch Sprache einzustellen, klicken Sie hier.

Basics Part III

Basics 11 III. Basics Risk Rating of processes Security Task Manager uses objective criteria to judge the safety risk of a process. Security Task Manager examines the process to determine if it contains critical function calls or suspicious properties. Points are allocated depending on the potential danger of these functions and properties. The sum of the points results in the Security Task Manager Risk Rating (0 to 100 points). Security Task Manager examines the processes looking for the following functionalities (sorting by dangerousness): Able to record keyboard inputs Hidden stealth process File is hidden Keyboard driver, could record inputs Could manipulate other programs Able to monitor Internet browser Starts when starting of programs Listen on port Send to port unknown program listens or sends Monitor program starts Window not visible Start when Windows starts No detailed description available Unknown file in Windows folder No Windows system file No description of the program functions: Internet, monitor, record inputs, hide, manipulate functions: not determinable Unknown company Trusted properties (reduces risk): Microsoft signed file Verisign signed file Belongs to Certified by Own comment Click on an above property to learn more about this. Highly rated programs are not always dangerous; they may just contain properties typical of

12 Security Task Manager some known spyware programs. Click the Windows processes button to see all internal Windows operating system processes. Windows system processes are not shown by default. Process types Security Task Manager distinguishes between the following types of processes. Click Type on View menu, to see or hide the type as column in the main window. Software DLL files Program Taskbar icon DLL ShellExecute Internet PlugIns Browser Helpers Objects Driver and Services device driver file driver Service (own process) Service (own process with desktop interaction) Service (shares process) Service (shares process with desktop interaction) Click on an above type to learn more about this. Click the Windows processes button to see all internal Windows operating system processes. Windows system processes are not shown by default. Contacting the Security Task Manager Team Technical Contact: address: A. & M. Neuber Software GmbH Postfach 11 05 25 D-06019 Halle Germany fax: (+49) 0700-11 777 000 Internet: www.neuber.com/taskmanager email: The registration is executed by the international registration service ShareIt (Eden/U.S.A, Köln/ Germany, London/UK, Roissy/France, Upplands Väsby/Sweden).

Basics 13 Uninstalling 1 Click Start-Settings-Control panel. 2 Click Software. 3 Click the Remove button to delete Security Task Manager from your Computer. You can also run uninstal.exe in the Security Task Manager directory

Protecting your computer with SpyProtector Part IV

Protecting your computer with SpyProtector 15 IV. Protecting your computer with SpyProtector Delete traces of your Internet and computer activity SpyProtector contains following tools to protect your computer from keylogger, spyware and trojans: Delete history Check this option to eliminate traces of Internet activities (cookies, cache, history, typed URLs) in Internet Explorer. You can also delete the recently used file list of programs (Word, ACDSee, PDF, WinZip, Mediaplayer, etc) and the recently used program list on the Windows Start menu. Block keyboard monitoring Check this option to block the redirection of all keyboard inputs to a keylogger for the current Windows session. Keyboard redirection is realized by programing a Hook function; even keyboard utilities like macro and autotext programs don't use these malicious Hook functions. Block other monitoring Check these options to block programs which log data for the current Windows session: Keyboard inputs (indirect): This prevents monitoring of internal Windows messages (e.g. keyboard inputs) by other programs. Mouse activities: This prevents monitoring of mouse movements and mouse clicks Macro: This prevents recording of user activities. This methode, often used by macro programs, is not typically used by keyloggers. Starting and ending of programs: Program starts and stops are logged. This function is frequently used by tutorial programs (computer based training) to aid user interaction with the software. Attention: Some safe and valid programs (e.g. some Macro programs) do use these Hook functions. If one of your programs stops working after selecting an option above, please deselect the option or restart your computer. Warn when your registry is changed Check this option to see a warning message when any program tries to create an autostart key in the Windows registry. Many dangerous programs use an autostart key in the Registry to activate themselves.

Registration and Order information Part V

Registration and Order information 17 V. Registration and Order information Remarks about the trial version Security Task Manager can be tested for free for a trial period of up to 30 days. If you find this program useful and would like to continue using Security Task Manager, then you are required to register for $29 (29.EUR). You will receive a registration code that you can use to unlock the trial version. The registration code will turn off all nag screens and trial limitations, and work with future minor updates. As a registered user, you will get: legal license for the software your personal key to unlock trial version free minor updates free software SpyProtector Spyprotector eliminates your Internet traces, warns when Autostart key in registry is changed and disables keyboard and mouse surveillance free technical support (via email or mail) On Help menu click Info... to see whether your version is registered. How to register Security Task Manager Order your own registration code for $29 (29 EUR) today! We accept credit cards, PayPal, bank/wire transfer, checks or cash. Internet: mail/fax: Secure Online Ordering Order Form phone: +1 952 646-5747 (English customer support) +49 221 3108820 (de/fr/it/es/pt support) program ID: 174510 s If you pay by credit card, you'll receive the registration code immediately. The code unlocks the trial version. One time purchase. No subscription! If you have questions about ordering please ask: Digital River, Inc., 10380 Bren Road West, Minnetonka, MN 55343, United States, support@shareit.com How to unlock the shareware version 1 On REGISTER menu click Unlock the trial version. 2 Enter the Name and Code in the registration dialog exactly as shown in the information sent to you. 3 Click Unlock. s

18 Security Task Manager If you have questions please ask us.

Index 19 Index - A - active runtime 6 - B - BHO 12 Browser Helpers Objects 12 buy 17 - C - comment 8 CPU 6 - D - DLL 12 driver 12 - E - end process 7 export to 8 - F - file 11 folder 7 - G - Google search 7 - H - hosts file 8 - I - information about processes 6 Internet delete traces 15 - K - looking for info about process 7 process Type 12 keyboard 11, 15 keylogger 15 - L - language change 9 - M - memory 6 monitoring 11, 15 - N - 8 - O - order code 17 Overview 4 - P - PID 6 prevent surveilance 15 price of registered version 17 print 8 process comment 8 end 7 print 8 properties 6 rating 11 types 12 Program 12 properties of processes 6 purchase 17 - Q - quarantine 7

20 Security Task Manager - R - rating 11 registration code order registration code 17 unlock the shareware 17 Registry Warner 15 remark 8 risk of process 11 - S - save export 8 print 8 Security Task Manager Features 4 Get it now! 17 How to use 6 uninstalling 13 unregistered version 17 service 12 SpyProtector 15 start 6 - T - task 6 Taskicon 12 title 6 Type 12 - U - uninstall 13 unlock the shareware 17 - W - web information 7