README.txt

Please download to get full document.

View again

of 4
13 views
TXT
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Document Description
Process Hacker is a powerful free and open source process viewer. ## Getting started Simply run ProcessHacker.exe to start Process Hacker. There are two versions, 32-bit (x86) and 64-bit (x64). If you are not sure which version to use, open Control Panel System and check the System type . You cannot run the 32-bit version of Process Hacker on a 64-bit system and expect it to work correctly, unlike other programs. ## System requirements Windows XP SP2 or higher, 32-bit or 64-bit. == Proce
Document Share
Documents Related
Document Tags
Document Transcript
  Process Hacker is a powerful free and open source process viewer.## Getting startedSimply run ProcessHacker.exe to start Process Hacker. There are twoversions, ! it $x%&' and &( it $x&('. )f you are not sure whichversion to use, open *ontrol Panel + System and check the Systemtype. -ou cannot run the ! it version of Process Hacker on a&( it system and expect it to work correctly, unlike other programs.## System reuirements/indows 0P SP! or higher, ! it or &( it.11 Process Hacker 11Process Hacker is licensed under the G23 GP4 v, with exceptions. 5 fullcopy of the license is provided in 4)*62S6.txt. *opyright $*' !778 !79& w:! and various authors This program is free software; you can redistriute it and<or modify it under the terms of the G23 General Pulic 4icense as pulished y the =ree Software =oundation, either version  of the 4icense, or $at your option' any later version. This program is distriuted in the hope that it will e useful, ut /)TH>3T 52- /5??52T-@ without even the implied warranty of A6?*H52T5B)4)T- or =)T26SS =>? 5 P5?T)*345? P3?P>S6. See the G23 General Pulic 4icense for more details. -ou should have received a copy of the G23 General Pulic 4icense along with this program. )f not, see Chttp;<<www.gnu.org<licenses<+.11 Aini 0A4 11Process Hacker uses Aini 0A4 licensed under the following terms; The Aini 0A4 lirary and included programs are provided under the terms of the G23 4irary General Pulic 4icense $4GP4' with the following exceptions; 9. Static linking of applications to the Aini 0A4 lirary does not constitute a derivative work and does not reuire the author to provide source code for the application, use the shared Aini 0A4 liraries, or link their applications against a user supplied version of Aini 0A4. )f you link the application to a modified version of Aini 0A4, then the changes to Aini 0A4 must e provided under the terms of the 4GP4 in sections 9, !, and (. !. -ou do not have to provide a copy of the Aini 0A4 license with programs that are linked to the Aini 0A4 lirary, nor do you have to identify the Aini 0A4 license in your program or documentation as reuired y section & of the 4GP4.11 P*?6 11Process Hacker uses Perl *ompatile ?egular 6xpressions licensed under thefollowing terms;   P*?6 is a lirary of functions to support regular expressions whose syntax and semantics are as close as possile to those of the Perl D language. ?elease % of P*?6 is distriuted under the terms of the BSE licence, as specified elow. ?edistriution and use in source and inary forms, with or without modification, are permitted provided that the following conditions are met; F ?edistriutions of source code must retain the aove copyright notice, this list of conditions and the following disclaimer. F ?edistriutions in inary form must reproduce the aove copyright notice, this list of conditions and the following disclaimer in the documentation and<or other materials provided with the distriution. F 2either the name of the 3niversity of *amridge nor the name of Google )nc. nor the names of their contriutors may e used to endorse or promote products derived from this software without specific prior written permission. TH)S S>=T/5?6 )S P?>)E6E B- TH6 *>P-?)GHT H>4E6?S 52E *>2T?)B3T>?S 5S )S 52E 52- 60P?6SS >? )AP4)6E /5??52T)6S, )2*43E)2G, B3T 2>T 4)A)T6E T>, TH6 )AP4)6E /5??52T)6S >= A6?*H52T5B)4)T- 52E =)T26SS =>? 5 P5?T)*345? P3?P>S6 5?6 E)S*45)A6E. )2 2> 662T SH544 TH6 *>P-?)GHT >/26? >? *>2T?)B3T>?S B6 4)5B46 =>? 52- E)?6*T, )2E)?6*T, )2*)E62T54, SP6*)54, 606AP45?-, >? *>2S6362T)54 E5A5G6S $)2*43E)2G, B3T 2>T 4)A)T6E T>, P?>*3?6A62T >= S3BST)T3T6 G>>ES >? S6?)*6S@ 4>SS >= 3S6, E5T5, >? P?>=)TS@ >? B3S)26SS )2T6??3PT)>2' H>/66? *53S6E 52E >2 52- TH6>?- >= 4)5B)4)T-, /H6TH6? )2 *>2T?5*T, ST?)*T 4)5B)4)T-, >? T>?T $)2*43E)2G 26G4)G62*6 >? >TH6?/)S6' 5?)S)2G )2 52- /5- >3T >= TH6 3S6 >= TH)S S>=T/5?6, 662 )= 5E)S6E >= TH6 P>SS)B)4)T- >= S3*H E5A5G6.11 AED 11Process Hacker uses a AED implementation licensed under the following terms; AED hash implementation and interface functions *opyright $c' !77 !77D, Iouni Aalinen C:kmalineJcc.hut.fi+ This program is free software@ you can redistriute it and<or modify it under the terms of the G23 General Pulic 4icense version ! as pulished y the =ree Software =oundation.11 SH5 11Process Hacker uses a SH5 implementation licensed under the following terms; *opyright !77( =ilip 2avara Based on pulic domain SH5 code y Steve ?eid CsteveJedmwe.com+ This lirary is free software@ you can redistriute it and<or modify it under the terms of the G23 4esser General Pulic 4icense as pulished y the =ree Software =oundation@ either version !.9 of the 4icense, or $at your option' any later version. This lirary is distriuted in the hope that it will e useful, ut /)TH>3T 52- /5??52T-@ without even the implied warranty of A6?*H52T5B)4)T- or =)T26SS =>? 5 P5?T)*345? P3?P>S6. See the G23 4esser General Pulic 4icense for more details.   -ou should have received a copy of the G23 4esser General Pulic 4icense along with this lirary@ if not, write to the =ree Software =oundation, )nc., D9 =ranklin St, =ifth =loor, Boston, A5 7!997 979, 3S511 2atural order string comparison 11Process Hacker uses strnatcmp.c licensed under the following terms; strnatcmp.c Perform Knatural orderK comparisons of strings in *. *opyright $*' !777, !77( y Aartin Pool Cmp sourcefrog net+ This software is provided Kas isK, without any express or implied warranty. )n no event will the authors e held liale for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistriute it freely, su:ect to the following restrictions; 9. The srcin of this software must not e misrepresented@ you must not claim that you wrote the srcinal software. )f you use this software in a product, an acknowledgment in the product documentation would e appreciated ut is not reuired. !. 5ltered source versions must e plainly marked as such, and must not e misrepresented as eing the srcinal software. . This notice may not e removed or altered from any source distriution. This code has een modified for Process Hacker.## Settings)f you are running Process Hacker from a 3SB drive, you may want tosave Process HackerKs settings there as well. To do this, create alank file named ProcessHacker.exe.settings.xml in the samedirectory as ProcessHacker.exe. -ou can do this using /indows 6xplorer;9. Aake sure Hide extensions for known file types is unticked in Tools + =older options + iew.!. ?ight click in the folder and choose 2ew + Text Eocument.. ?ename the file to ProcessHacker.exe.settings.xml $delete the .txt extension'.## PluginsPlugins can e configured from Hacker + Plugins.)f you experience any crashes involving plugins, make sure theyare up to date.The 6xtendedTools plugin is only availale for /indows ista andaove. Eisk and 2etwork information provided y this plugin isonly availale when running Process Hacker with administrativerights.## LProcessHackerProcess Hacker uses a kernel mode driver, LProcessHacker, toassist with certain functionality. This includes;  F *apturing kernel mode stack tracesF Aore efficiently enumerating process handlesF ?etrieving names for file handlesF ?etrieving names for 6tw?egistration o:ectsF Setting handle attriutesLProcessHacker is only availale on /indows M and aove.2ote that y default, LProcessHacker only allows connections fromprocesses with SeEeugPrivilege. To allow Process Hacker to show detailsfor all processes when it is not running as administrator;9. )n ?egistry 6ditor, navigate to; HL6-N4>*54NA5*H)26OS-ST6AO*urrent*ontrolSetOServicesOLProcessHacker!. 3nder this key, create a key named Parameters if it does not exist.. *reate a E/>?E value named Security4evel and set it to !. )f you are not using an official uild, you may need to set it to 7 instead.(. ?estart the LProcessHacker service $sc stop LProcessHacker, sc start LProcessHacker'.
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks