(The most powerful process management analysis software in China! The perfect substitute for Windows Task Manager! The most powerful manual anti-virus and system monitoring software! Make up the deficiency of firewall and anti-virus software comprehensively! Help you say goodbye to viruses, Trojans and remote control! Main functions: 1. It can close any process, including the core process of the system. It is not necessary to enter the safe mode for anti-virus. 2. With high permissions, even when the CPU is 100% occupied, the process can still be quickly called out through the shortcut key settings, and the law enforcement officer can check and kill the process. 3. You can view the details of applications (similar to the task manager), normal processes (similar to the task manager), network processes (tcp-udp port associated processes), hidden processes (processes hidden through various hook technologies), and perform various operations on processes. 4. Provide rich information about the process. You can view the basic information, version information, process association service, possible startup items, threads, process Port Association, process description, process tree, process prompt, module information, handle information, IP information and process security judgment of the process. Both novice and veteran can easily check and judge. 5. It provides powerful monitoring functions to monitor the creation of processes, the access and egress of TCP connections, the monitoring of specified ports, and the monitoring of hidden processes. 6. It provides a powerful killing function, which can kill specified process names, specify processes that exceed the memory usage threshold, specify that only Microsoft programs can be run, and kill hidden processes. 7. It provides various effective process operations, such as closing, deleting, debugging processes, supporting unloading modules, ending threads, deleting startup items, and providing anti scanning of connected IP. 8. Provide the process protection function to ensure that the process is not non - protected according to the protection policy Cannot close. 9. Provide additional tools such as module manager, driver manager, service manager, sharing manager, user manager, window manager, etc. 10. It provides direct operations for process modules, threads, startup items, etc., and provides computer performance monitoring, traffic monitoring and terminal service monitoring to protect your machine in all aspects. 11. Monitor and intercept new startup entries in the startup folder and registry in real time. 12. You can customize the monitoring and interception system folder to accurately record various operations in the folder. 13. Provide system monitoring function to monitor system users and shared directories in real time. 14. Provide additional tools such as process query and startup manager. 15. It provides the function of timing alarm clock, which can remind, shut down the computer, restart the computer and enforce the specified process at the specified time. 16. Integrate useful tools built into the system. Users can call these tools directly through the process law enforcement officer.
This document contains the following attachments:
IPSearcher. dll
PJClock. rmd
PJProtect. exe
PJudger. exe
PJudger. ini
PJUpdater. exe
ProcessDB. mdb
ProcessProtect. dll
ProcFindInfo. exe
Projgtips. dll
psapi. dll
showallfile. reg
StartUpManager. exe
wry. dll
Process law enforcement officer CHM
Process law enforcement officer v2.20)