Date: June 22nd, 2005
Article by: Jeff Caldwell (Hardware Reviewer)
Edited by: Nathan Glentworth (Head Editor / Hardware Reviewer)
Product was submitted by: Uniblue
<--CLICK FOR DEALS ON SOFTWARE IN THE UNITED STATES
<--CLICK FOR DEALS ON SOFTWARE IN CANADA
The main screen offers a very versatile, informative twist to the standard task manager built into Windows. While going through the list of processes you can view detailed descriptions of anything that is in WinTasks process library. I only have found one application that is running on a day to day basis that WinTasks did not have a description for, oddly it was Asus Probe. If it is malicious, it will point it out to you and will show you the associated malicious program it is associated with.
With the simple click of a mouse you can view which programs are executed upon Windows startup. You can compare these results to the process library to check if you really need these programs opening on boot up. To disable (or enable) a startup program simply click the associated button. If you don't want the program ever starting up, just click the delete and it will remove the associated run registry key.
A nifty feature built into WinTasks is the ability to choose any process and view all associated DLL (Dynamic Link Libraries) files that are in use for that process. This can help track down why certain files are in use, if it's ever needed.
WinTasks also allows you to block any unwanted processes that are being run by your PC. This basically lets you tell the computer it can not run a program without your permission. This can stop trojans while you wait for your anti-virus vendor to release a fix for them.
Now for my favorite tool inside of WinTasks, the statistics window. This version shows the CPU and memory usage for each program! The statistics are shown graphically in a chart that you can slide back and forth in time to see when it was using the most power, etc. This new graphical representation is simply fantastic compared to the task manager built into Windows. If you find a internet based program using a lot of CPU or memory resources, you might want to check out to see if someone is trying to that program to infiltrate your computer.
<--CLICK FOR GREAT PRICES ON COMPUTER SOFTWARE