background preloader

TaskList.org - List of Windows Proccesses and Descriptions

TaskList.org - List of Windows Proccesses and Descriptions

http://www.tasklist.org/

Related:  security & privacy

SpeedFan - Access temperature sensor in your computer SpeedFan is a program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips. SpeedFan can even access S.M.A.R.T. info and show hard disk temperatures. SpeedFan supports SCSI disks too. DriveImage XML Backup Software - Data Recovery Product DriveImage XML English (1.78MB) Image and Backup logical Drives and Partitions File Size:1.78 MB Price: Private Edition Free - Commercial Edition - Buy Now System Requirements: Pentium Processor - 256 MB RAM Windows XP, 2003, Vista, Windows 7, Windows 8, Windows 10 Image and Backup logical Drives and Partitions DriveImage XML is an easy to use and reliable program for imaging and backing up partitions and logical drives.

Gates predicts death of the password SAN FRANCISCO--Microsoft Chairman Bill Gates predicted the demise of the traditional password because it cannot "meet the challenge" of keeping critical information secure. Gates, speaking at the RSA Security conference here on Tuesday, said: "There is no doubt that over time, people are going to rely less and less on passwords. People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure." RSA is working with Microsoft to develop a SecurID technology specifically for Windows. Both companies agreed there is a need to remove the vulnerabilities associated with employees using weak passwords. SecurID is the best-known two-factor authentication system and is used by many large enterprises.

Top 10 External Hard Drive Tricks @jsim: do you really need your stuff from 1972? Start a plan of data shredding. I have ZERO financial documents past 7 years old. It's a liability to have them longer than that. Security Process Explorer - Best Free tool for Process Management Detailed Information It displays all the standard information, including file name, directory path, description, CPU usage, as well as a unique security risk rating. User-friendly Interface The program interface is logically structured and based on the default task manager and the process of replacing it is fast so that we quickly forget having ever used a default tool. Full Featured Security Process Explorer allows you to monitor CPU and memory usage graphs per process, view detailed processes information (with descriptions), stop and start new processes, set priorities and much more.

Downloadable Computer Repair CDs One of our Technibble forum members, PcTek9, and a handful of other Technibble members have compiled a large list of CDs for various computer repair tasks. In this list, the following types of CD are available for download: Antivirus Boot CDs, Recovery Disks, Hardware Diagnostic Boot CDs, Network Testing/Monitoring, Data Recovery Boot CDs and Special Purpose CDs. Some of these are free to download, some are not. Be sure to read the EULA for the CD’s you download and the applications you use to make sure you are allowed to use them in the manner you plan to use them in.

Most Common Passwords Roleplay. Learn to play songs by ear! Free Ear Training.[Video Tutorial] How to build google chrome extensions Update: See my analysis of the most common passwords from singles.org and other hacked databases. Most people are clueless as to how accounts are hacked and their passwords reflect that. 50+ Amazing Rainmeter Desktop Skins - Take Your Desktop To The Next Level! Customizing the features on your personal computer to be unique has never been as hot as it is today. You can get stickers for your Macbook, upload desktop images to create a certain mood and now you can even customize your desktop skin to fit your exact needs. One of the really powerful tools for creating customizable and functional desktop skins is Rainmeter.

collective-intelligence-framework - a framework for warehousing intelligence bits CIF is a cyber threat intelligence management system. CIF allows you to combine known malicious threat information from many sources and use that information for identification (incident response), detection (IDS) and mitigation (null route). The most common types of threat intelligence warehoused in CIF are IP addresses, domains and urls that are observed to be related to malicious activity.

SoftKey Revealer - The Official Site of Game Key Revealer & SoftKey Revealer SoftKey Revealer 2.6.4 Released! SoftKey Revealer retrieves the CD-Key and Serial for installed softwares on computer. It also saves your money and time, free and easy to use. If you lost your CD-Key or Serial of purchased softwares, you can do these:1: You can buy a license again.2: You can buy a product key finder program.3: Or you can use free SoftKey Revealer. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

Related: