Welcome to Process-info.org library
Process-info.org is an online library of Computer Operating System's Processes, which helps you to identify processes running at background of computer operating system or at remote computers on your network.
Process-info.org contains a growing database of executable processes (mostly with .EXE extension) and DLL libraries. You can search for processes through search box or navigate alphabeticaly by starting letter of process name.
It is assumed that users are familiar with computer operating system they're using and agree with suggested changes. Process-info.org will not be held responsible, if changes you make cause a system failure.
Recently added processes
Recently updated processes
Top security risk processes
The Latest News
15 latest global news related to computer security
May 20, 2013 3:08:28 AM CEST
Rootkit:W32/ZAccess – Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.
May 18, 2013 2:00:51 PM CEST
NoSuchCon 2013 – Fostering knowledge exchange among different generations of security researchers is maybe one of the best traits of a good security conference. Judging by its attendance, NoSuchCon can easily claim to be one of these. It's rare to see such a mix of young researchers and old gurus exchanging ideas and getting to know each other. Organized this year in Paris, NoSuchCon takes place in the premises of the Espace Oscar Niemeyer; admittedly, indeed a nice move putting a security conference within an art exposition center (congrats to the organizers :)) . Espace Oscar Niemeyer
May 18, 2013 8:43:00 AM CEST
Does Drinking Water at Certain Times Of The Day Maximize Its Health Benefits? – Message purporting to be from a cardiac specialist claims that drinking water at specified times of the day can help activate organs, aid digestion, lower blood pressure and stop people from suffering strokes or heart attacks.
May 18, 2013 3:08:45 AM CEST
Kaspersky Endpoint Security 10 for Windows wins VB100 award – Kaspersky Lab product successfully blocked 100% of malware samples with no false positives during professional Virus Bulletin comparative test
May 17, 2013 9:26:00 PM CEST
Texas drone bill sparks a battle – The battle to find a balance between privacy concerns and the beneficial use of drones for commercial and law enforcement purposes is in sharp focus in a bill that's winding its way through the Texas legislature.
May 17, 2013 8:00:00 PM CEST
May 2013 Security Bulletin Webcast, Q&A, and Slide Deck – For those who couldn’t attend the live webcast, today we’re publishing the May 2013 Security Bulletin Webcast Questions & Answers page. We fielded 13 questions on various topics during the webcast, with specific bulletin questions focusing primarily on Internet Explorer (MS13-037 and MS13-038) and Visio (MS13-044). We invite our customers to join us for the next public webcast on Wednesday, June 12, 2013, at 11 a.m. PDT (UTC -7), when we will go into detail about the June bulletin release and answer questions live on the air. Customers can register to attend the webcast at the link below: Date: Wednesday, June 12, 2013 Time: 11:00 a.m. PDT (UTC -7) Register: Attendee Registration Thanks, Dustin Childs Group Manager, Response Communications Microsoft Trustworthy Computing
May 17, 2013 7:29:00 PM CEST
Alleged tech support scammers settle FTC charges – Operators of two alleged tech support scams that charged consumers hundreds of dollars to supposedly fix their computers have settled charges from the U.S. Federal Trade Commission.
May 17, 2013 6:51:00 PM CEST
Nation's critical infrastructure cyber defenses weak, DHS tells hearing – Experts criticize government's threat sharing, noting it wants the private sector to be generous but it's stingy with the private sector
May 17, 2013 6:42:00 PM CEST
Police arrest Anonymous suspects in Italy – Italian police arrested four suspected hackers Friday, accusing them of having taken control of the Italian branch of the Anonymous network.
May 17, 2013 6:01:22 PM CEST
VU#774103: Linux kernel perf_swevent_enabled array out-of-bound access privilege escalation vulnerability – The Linux kernel's Performance Events implementation is susceptible to an out-of-bounds array vulnerability that may be used by a local unprivileged user to escalate privileges.
May 17, 2013 5:44:00 PM CEST
Researchers uncover new global cyberespionage operation dubbed SafeNet – Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental organizations from over 100 countries.
May 17, 2013 3:58:17 PM CEST
Malicious PACs and Bitcoins – Now cybercriminals from Brazil are also interested in Bitcoin currency. In order to join the horde of phishers on the lookout for the virtual currency they have applied their best malicious technique: malicious PAC on web attacks, and phishing domains.The malicious usage of PAC (Proxy Auto-Config) among Brazilian black hats is not something new Â weÂve known about it since 2007. Generally, these kind of malicious scripts are used to redirect the victimÂs connection to a phishing page of banks, credit cards and so on. We described these attacks in detail here. In 2012 a Russian Trojan banker called Capper also started using the same technique. When itÂs used in drive-by-download attacks, it becomes very effective.After registering the domain java7update.com, Brazilian criminals started attacking several websites, inserting a malicious iframe in some compromised pages:
May 17, 2013 2:01:00 PM CEST
Big Data Investigations: Opportunity and Risk – Experts say large-scale security analytics can cut through the noise to find key intelligence. But connecting the dots can lead to legal trouble
May 17, 2013 2:00:00 PM CEST
Experts ding DHS vulnerability sharing plan as too limited – Without universally availability, plan could miss smaller businesses hackers could use as an entry point to critical infrastructure companies
May 17, 2013 1:58:00 PM CEST
LulzSec members sent to prison for infamous DDoS attacks – Four members of the infamous and largely British LulzSec hacking group that carried a string of high-profile DDoS attacks in 2011 have been handed relatively lenient prison terms of up to 32 months by the judge at Southwark Crown Court.