Examples of using Running processes in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
R Show only running processes.
Show current amount of memory occupied by all running processes.
To check the running processes use the command ps.
In Windows® systems youcan use Task Manager to view running processes.
Shutdown- Stops all running processes and shuts down the system.
The software also allows you to disconnect the various applications andclose the running processes of computer.
Since all the current running processes are stored onto the RAM, it slows the system speed.
The Processes tab shows a list of all running processes on the system.
Terminate as many running processes as possible before running antivirus and antimalware scans.
Built-in task manager allows you to track all running processes and disable them as needed.
You can check running processes, change permissions, and access files on your remote machine right from the machine in front of you.
He always check the system and running processes(working"in the shadow");
I was able to watch as the scanner moved from checking the startup files to scanning the Windows registry andconcluded by conducting heuristics analysis on running processes.
By shut down, the system will stop all running processes and then the computer turns off.
The list includes a quick scan, which scanned my directories in under five minutes,and an active processes scan which checks all running processes for threats.
RogueKiller is a tool written in C++, which scans the running processes and kill those who are malicious.
Because pods represent running processes on nodes in the cluster, it is important to allow those processes to gracefully terminate when they are no longer needed(vs being violently killed with a KILL signal and having no chance to clean up).
Our Behavior Shield determines- with greater precision- whether any running processes are displaying any unusual behavior.
KillProcess can also scan the running processes on the computer, and kill them on sight, much like an anti-spyware application would.
Our Behavior Shield now uses more sophisticated logic for determining-with greater precision- whether any running processes display any unusual behavior.
This can be achieved by concealing running processes from monitoring programs, or hiding files or system data from the operating system.
Quick access of the basic system information for your Android platform, including information for CPU, memory,SD Card, running processes, network states and installed applications.
The application control feature literally keeps an eye on all running processes and their behavior, and if the learning mode is selected from the setup process you are prompted whenever applications interact in order to allow or deny their activity if you consider it suspicious.
This one is perhaps more oriented towards batch hash file checking because you can add single or multiple files,folders and sub folders, running processes, and also adding by wildcard.
Techniques used to accomplish this can include concealing running processes from monitoring programs, or hiding files or system data from the operating system.
System scanning can be done in a surprising number of ways, including dedicated scans for all local drives, for removable drives,the My Documents folder structure, all running processes, and even for rootkit action.
You can monitor major application events(installations, etc.), running processes, file and network activity, and network connections.
RogueKiller is a tool written in C++, which scans the running processes, and kills those which are malicious.
Norton AntiVirus 2014 will include a version of the module develops Insight,which examines the files and running processes, spreading their reliability and to zabranyatsScanning, optimizing the available resources on your system.
Besides this, the malware also includes a few more modules to execute any file it receives from the server,enumerate running processes, terminate a running process by name, as well as send a list of partitions found on the infected machine.