找回密码
 立即注册
进程processTheprocesses | 邮电通讯系统 2022-06-29 78 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
国产最强大的进程管理分析软件!windows任务管理器的完美替代品!最强悍的手工杀毒与系统监视软件!全面弥补防火墙与杀毒软件的不足!辅助您告别病毒、木马、远程控制!主要功能:1、可以关闭任何进程,包括系统核心进程、杀毒不需要进入安全模式。2、具有较高权限,即使在CPU占用100%的情况下,通过快捷键的设置,仍可以快捷的呼出进程执法G查杀进程。3、可以查看应用程序(类似于任务管理器)、普通进程(与任务管理器类似)、网络进程(TCP-UDP端口关联进程)、隐藏进程(通过各种HOOK技术隐藏的进程)的详细信息,并能对进程进行各种操作。4、提供进程的丰富资料。可以查看进程的基本信息、版本信息、进程关联服务、可能的启动项、线程、进程端口关联、进程描述、进程树、进程提示、模块信息、Handle信息、IP信息以及进程安全性判断。不论是新手还是老手均可以轻松查看判断。5、提供强大的监视功能,能够监视进程的创建、TCP连接的接入与外出、指定端口的监视以及隐藏进程的监视。6、提供强大的查杀功能,能够查杀指定进程名、指定超过内存使用阀值的进程、指定只准运行微软公司的程序以及查杀隐藏进程。7、提供各种有效的进程操作、如关闭、删除、调试进程、支持卸载模块、结束线程、删除启动项、提供对连接IP的反扫描等功能。8、提供进程保护功能,根据保护策略,确保该进程不被非.法关闭。9、提供模块管理器、驱动管理器、服务管理器、共享管理器、用户管理器、窗口管理器等附加工具。10、提供针对进程模快、线程、启动项等的直接操作,提供计算机性能监控、流量监控以及终端服务监控,对你的机器进行全方面的保护。11、实时监控并拦截启动文件夹、注册表中的新增启动项。12、可以自定义监视与拦截系统文件夹,对文件夹内的各种操作准确记录。13、提供系统监视功能,对系统用户、共享目录进行实时监控。14、提供进程查询器、启动管理器等附加工具。15、提供定时闹钟功能,能够在指定的时间提醒、关闭计算机、重启计算机以及强制执行指定进程。16、集成系统内置的有用工具,用户可以直接通过进程执法G来调用这些工具。
本资料共包含以下附件:
IPSearcher.dll
PJClock.rmd
PJProtect.exe
PJudger.exe
PJudger.ini
PJUpdater.exe
ProcessDB.mdb
ProcessProtect.dll
ProcFindInfo.exe
Projgtips.dll
psapi.dll
showallfile.reg
StartUpManager.exe
wry.dll
进程执法G.CHM
进程执法GV2.20....


(The most powerful process management analysis software in China! The perfect substitute for Windows Task Manager! The most powerful manual anti-virus and system monitoring software! Make up the deficiency of firewall and anti-virus software comprehensively! Help you say goodbye to viruses, Trojans and remote control! Main functions: 1. It can close any process, including the core process of the system. It is not necessary to enter the safe mode for anti-virus. 2. With high permissions, even when the CPU is 100% occupied, the process can still be quickly called out through the shortcut key settings, and the law enforcement officer can check and kill the process. 3. You can view the details of applications (similar to the task manager), normal processes (similar to the task manager), network processes (tcp-udp port associated processes), hidden processes (processes hidden through various hook technologies), and perform various operations on processes. 4. Provide rich information about the process. You can view the basic information, version information, process association service, possible startup items, threads, process Port Association, process description, process tree, process prompt, module information, handle information, IP information and process security judgment of the process. Both novice and veteran can easily check and judge. 5. It provides powerful monitoring functions to monitor the creation of processes, the access and egress of TCP connections, the monitoring of specified ports, and the monitoring of hidden processes. 6. It provides a powerful killing function, which can kill specified process names, specify processes that exceed the memory usage threshold, specify that only Microsoft programs can be run, and kill hidden processes. 7. It provides various effective process operations, such as closing, deleting, debugging processes, supporting unloading modules, ending threads, deleting startup items, and providing anti scanning of connected IP. 8. Provide the process protection function to ensure that the process is not non - protected according to the protection policy Cannot close. 9. Provide additional tools such as module manager, driver manager, service manager, sharing manager, user manager, window manager, etc. 10. It provides direct operations for process modules, threads, startup items, etc., and provides computer performance monitoring, traffic monitoring and terminal service monitoring to protect your machine in all aspects. 11. Monitor and intercept new startup entries in the startup folder and registry in real time. 12. You can customize the monitoring and interception system folder to accurately record various operations in the folder. 13. Provide system monitoring function to monitor system users and shared directories in real time. 14. Provide additional tools such as process query and startup manager. 15. It provides the function of timing alarm clock, which can remind, shut down the computer, restart the computer and enforce the specified process at the specified time. 16. Integrate useful tools built into the system. Users can call these tools directly through the process law enforcement officer.
This document contains the following attachments:
IPSearcher. dll
PJClock. rmd
PJProtect. exe
PJudger. exe
PJudger. ini
PJUpdater. exe
ProcessDB. mdb
ProcessProtect. dll
ProcFindInfo. exe
Projgtips. dll
psapi. dll
showallfile. reg
StartUpManager. exe
wry. dll
Process law enforcement officer CHM
Process law enforcement officer v2.20)

[下载]10264335533.rar




上一篇:网络人远程控制软件企业版 V5.41
下一篇:怎样查看局域网共享-局域网查看共享文件工具下载