- slide 1 of 4
The Windows Defender contains a Software Explorer tool which is used to view all the software performing in the processor. To accomplish this task, the start up programs in category options should be selected from Software Explorer.
The Windows Defender is a Vista tool which is used to keep spyware and other unwanted software from interacting with the processor. To detect whether the software is malware or spyware, the Windows Defender will use definitions. The definition will also be used to alter the potential risk to the user. The Windows Definitions will be predominantly updated by setting Windows Defender to search for online updates or to get updated through Windows Update in the system.
Windows Defender provides us with three ways to protect our system, and they are:
- Real time protection: When unwanted software or spyware will install itself or will try to run on a processor, then the Windows Defender will display an alert message on the screen when the program will try to change a setting in windows.
- SpyNet Community in PC: There is a SpyNet communication which was created by an online Microsoft and this spynet is used for responding to the software’s that has not yet been classified for risk in the processor. The Windows Defender will use the community’s suggestion which will help the user in taking decisions.
- Scanning options in processors: The Windows Defender will be used to scan the system for unwanted software’s and spyware which will be installed.
- When we use the Windows Defender in our system then we should know that the Defender will not always be up-to-date.
- slide 2 of 4
Task Manager Utility
We can get information about the processes and programs running in the system by using the Task Manager utility. We can also use the Task Manager to end a process, display an overview of the processes performance, and run or end the program in the computer. We can also get an immediate impression about the performance and activities in the system by using the Task Manager utility.
- slide 3 of 4
To display the current TCP/IP configuration we can use the command line IPCONFIG. The TCP/IP configurations such as subnet mask, default gateway, IP address etc., will be displayed. The DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System) settings will be refreshed by running IPCONFIG /renew at the command line. If you’d like to know about the TCP/IP configuration in the system, you should run the IPCONFIG command using the command prompt.
- slide 4 of 4
To scan and repair the volumes on the hard disk, we use the CHKDSK command to solve the problem. The CHKDSK command will also be used to repair the volumes logical errors like: cross linked files, directory errors or lost clusters.
Understanding and Working with Windows Vista
- Understanding Windows Vista: Backup, Storage, Restore Files
- Understanding Windows Vista: HTTP, SMTP, POP3, and IMAP Protocols
- Understanding Windows Vista: Removing Registry Entries
- Understanding Windows Vista: Fonts Raster and Outline Fonts?
- Understanding Windows Vista: Working with Vista’s New Event Viewer
- Understanding Windows Vista: IPCONFIG, CHKDSK, Windows Defender & Task Management Utility