No virus or Trojan that exists in the system can completely sever its relationship with processes. Even if they use hiding techniques, clues can still be found from the processes. Therefore, viewing active processes in the system becomes our most direct method to detect viruses and Trojans. However, with so many processes running simultaneously in the system, which ones are normal system processes and which ones are Trojan processes? What roles do the system processes often impersonated by viruses and Trojans play in the system? Please read this article.
This article is from How - Making Life Simpler | www.hooow.cn Original link: http://www.hooow.cn/hulianwang/0703ruhecongjinchengpanduanmumahebingdu_612.html