Cis2455 Unit 5 Assignment 1

Submitted by: Submitted by

Views: 10

Words: 334

Pages: 2

Category: Science and Technology

Date Submitted: 08/20/2016 11:51 AM

Report This Essay

TO: John Doe, Network Adminstrator

FROM: Robert Smith, Consultant

DATE: June 3, 2016

SUBJECT: Alternatives to Windows Resource Monitoring Tools

Many surprisingly robust resource monitoring tools are preinstalled with Windows operating systems. Task Manager and Resource Monitor are powerful programs that can be used to track most system parameters. Sometimes, however, more in-depth information is required or more sophisticated control options are needed. Fortunately several alternatives are available.

Process Explorer

Price: Free

This program displays open DLLs and other resources being held captive by a particular program. This can be useful for finding problems in DLLs and determining which programs are preventing resources from being used for more important tasks. Process Explorer also reveals the command line script for every program running. This can be used to distinguish between otherwise identical processes and determine which one is causing a problem.

NetWorx

Price: Free

A free network monitoring tool, NetWorx has tools that reveal network parameters that can be used to improve network functionality or detect an intruder. It can also be set up to notify the user when bandwidth usage spikes which can used to determine which tasks use the most bandwidth. NetWorx also maintains logs of detailed information about each session that can be used during an investigation to track down the source of an attack.

Process Hacker

Price: Free

This application shows extended process trees for every running application. Its ability to bypass security software and malware infections to kill a process at its root sets apart from Windows native programs and it can used to set delays on programs that are set to start on boot to improve startup time. Process Hacker also allows users to create services, manage page files, manipulate DLLs and verify digital signatures all in a single user interface

Sources:...