Friday, August 22, 2008

Process File Name MSGSRV32

Process File Name: msgsrv32.exe

Process Description: The file msgsrv32.exe is a process which is initiated by Microsoft Windows 9x and ME only. The function is to act as a 32 bit message server and will never appear in the Windows task list.
The process msgsrv32.exe performs several functions. It loads at start up installable Windows drivers and unload them at shut down. It serves the operating system by mediating plug and play messages among the OS’ various parts. Automatic responses to Setup programs are coordinated by the file msgsrv32.exe including checking whether a Setup program has improperly overwritten Windows files, and optionally restoring the Windows versions of those files. It runs and re-runs the shell program (usually Explorer.exe) if it fails to respond. If networking is enabled, it displays the initial logon dialog box. Another function of this program welcomes and says goodbye to the user because it plays the system’s startup and shutdown sounds. This program applies to Microsoft Windows 95, Microsoft Windows 98 Standard Edition, and Microsoft Windows Millennium Edition.
If you are using the msgsrv32.exe program you will notice that it has a higher security, there is an online updates troubleshooting and repair, easy server management, and excellent networking control. It is very similar to a simplified XP Pro. It shuts the offending program down when it sees a software issue, rather than crash. The installation and startup are quick and easy.

This process is very useful and to avoid any problem with its function the user must not rush the system when starting up and make the mistake of loading programs before Windows has completed loading all the Startup and System Tray programs it’s been instructed to load.

For Microsoft Windows Millennium Edition the system requirements are: (1) Minimum processor type is Intel Pentium – 150 Megahertz; (2) Minimum RAM size is 32 megabytes; (3) Minimum Hard Drive space is 295 megabytes; (4) Peripheral/Interface Devices are CD-ROM, Fax modem, sound card, mouse or compatible device.

Author: Microsoft Corp.

Author URL: http://www.microsoft.com/

Part of: Microsoft Windows 9X and ME

Memory Usage: High

System Process: Yes

Application: No

Background Process: Yes

Uses Network: No

Uses Internet: No

Hardware Related: No

Common Path: C:\ WINDOWS\ SYSTEM32\ msgsrv32.exe

Process File Name MPFTRAY

Process File Name: mpftray.exe

Process Description: The mpfttray.exe is a process related to the installation and utilization of Macafee PC Protection solutions.

McAfee Personal Firewall Plus software offers advanced protection for your computer. Personal firewall creates a barrier between your computer and the Internet. It silently monitors Internet traffic for suspicious activities.

The software has the following features: 1) Defends against potential hacker probes and attacks. 2) Complements anti-virus defenses. 3) Monitors Internet and network activity Alerts you to potentially hostile events. 4) Provides detailed information on suspicious Internet traffic. 5) Integrates Hackerwatch.org functionality, including event reporting, self-testing tools, and the ability to email reported events to other online authorities. 6) Provides detailed tracing and event research features.

The program runs automatically in the background in "Standard Security" mode. It blocks all questionable traffic from the Internet and records the data on the Events page. Standard Security mode keeps the computer secure and alerts the user when new traffic arrives across the Internet.

It also accomplishes several tasks via the McAfee icon, such as viewing traffic summaries, managing Internet applications, and handling events. When the user clicks view summary, a list of traffic and attacks on the computer and on computers worldwide is displayed on the screen. To view the list of allowed and blocked applications that attempt to access the Internet, the user clicks view applications. To view the Event Log generated when Personal Firewall blocks unsolicited Internet traffic, user clicks view event log.

The program comes with several new features. Improved gaming support- protects the computer from intrusion attempts and suspicious activities during full-screen gameplay. It can hide alerts if it detects intrusion attempts or suspicious activities. Red alerts appear after you exit the game. Improved access handling-lets users dynamically grant applications temporary access to the Internet. Access is restricted to the time the application launches until the time it closes. When Personal Firewall detects an unknown program, attempting to communicate with the Internet, a Red Alert provides the option to grant the application temporary access to the Internet.

To install this program, the following are required of the system:
1. Microsoft® Windows 98, Windows Me, Windows 2000, or Windows XP
2. Personal computer with Pentium-compatible processor
Windows 98, 2000: 133 MHz or higher
Windows Me: 150 MHz or higher
Windows XP (Home and Pro): 300 MHz or higher
3. RAM
Windows 98, Me, 2000: 64 MB
Windows XP (Home and Pro): 128 MB
4. 40 MB hard disk space
5. Microsoft® Internet Explorer 5.5 or later


Author: McAfee

Author URL: http://www.mcafee.com/

Part of: McAfee Personal Firewall Plus software

Memory Usage: High

System Process: No

Application: Yes

Background Process: Yes

Uses Network: Yes

Uses Internet: Yes

Hardware Related: No

Common Path: C:\ PROGRAM FILES\ McAfee.com\ mpftray.exe

Process File Name MSGTAG

Process File Name: msgtag.exe

Process Description: The file msgtag.exe that lends its name to the product MSGTAG is an email management tool. It is designed to make it easy for users to check the status of their messages. The icon for this program on the taskbar is next to the clock. The program has a visible window. It is able to connect to Internet, record inputs and monitor applications.

Features of this program are as follows:

Email read notifications: The user will receive an email when his message is read, detailing when the message was sent, when it was received, and the time elapsed in between.

Multiple email accounts support: On the same computer, the user can send emails using different accounts. All of them will be tagged by MSGTAG. The “read notifications” for all email accounts are sent to one email address.

Message footer: The recipients will see a small MSGTAG footer that indicates that you now know they have read the sender’s email.

Customize your message footer: The user can add own text to the footer, instead of the default MSGTAG footer message.

Remove your message footer: The user can make the footer invisible. Receivers will not know that user or sender is tagging his messages.

Unlimited email technical support can tag emails with multiple recipients: Every recipient of the user’s email gets an individual tag.

Dashboard to keep track of tagged messages: The dashboard display eliminates the need for email receipts. The user will see at a glance which messages have been tagged, received, and when.

Email notifications optional: The user can choose whether to receive email notifications for certain messages.

Specify tagging & notification settings for groups of contacts: Users contact settings override his current settings, so all messages to certain contacts can be tagged the same way.

SMS notification: For those critical notifications that user needs to confirm receipt, SMS is used.

SSL/TLS and Gmail support: Enhances security and communication settings.

New "Mutual Mail" tagging method: Provides a new way to request a tag from recipients who normally block message tags.

User must comply with the following to run this program:
1. User’s computer must be running Windows 98, 2000, Me or XP
2. User is using an email program such as Outlook, Outlook Express, Incredimail, Eudora, Pegasus, or Netscape Mail which uses the SMTP protocol.
Hotmail, Yahoo!, AOL and similar services CANNOT run MSGTAG.
You can send message-tags to Hotmail, Yahoo! and AOL addresses, and use these services to receive your receipts, but you cannot send tagged messages from these services.

The MSGTAG Dashboard is a handy alternative to traditional email notifications. The dashboard keeps track of your tagged messages and allows you to see at a glance whether messages have been received and opened. Status also provides contact list management, more notification options and customizable tags, all controlled through the MSGTAG Dashboard.

Author: eCOSM Limited

Author URL: http://www.ecosm.com/

Part of: Message Tag

Memory Usage: High

System Process: No

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: Yes

Hardware Related: No

Common Path: C:\ Program Files\ msgtag.exe

Process File Name MPK

Process File Name: mpk.exe

Process Description: The process file mpk.exe is the MyPopupKiller utility that displays all the list of opened windows on your web browser and closes unwanted popup and advertising windows. The program can automatically hide the internal ads of Kazaa Media Desktop, Download Accelerator (DAP), and Opera browser.

The process can operate in three (3) modes namely manual, automatic and aggressive mode.
In the manual mode, the program displays the list of opened windows, and allows you to easily select and close the unwanted popup windows. The popup and ad windows are automatically selected, so you can close all of them in a press of a button.

In the automatic mode, the program closes popup and advertising windows automatically. Closing is done in accordance to what you select in the configuration screen. The popups can be temporarily enabled by holding the Alt (the default), Ctrl, or Shift key. In this mode the program automatically closes all new browser windows. In this mode, the new browser windows cannot open, unless you hold the Alt key.

The process has 2 methods to recognize unwanted ads windows:

It can distinguish between normal windows and popup windows. Most popup windows contain advertising or other unwanted content. However, if the user chooses to automatically close all popup windows, some "good" popup windows may also be closed. In such case, you can hold the Alt key in order to temporarily enable the popups. You can also avoid closing good popups by adding them to the “Allowed Windows" list. You can add a window by its Web address, or by the window title.

It can recognize an advertising window if its title or Web address is found in the banned windows list. If you get an advertising window that MyPopupKiller doesn't recognize, you can add it to the ban list, and avoid that ad in the future.

The process supports the following Web browsers:
Internet Explorer: version 5.x and 6.x
Netscape: version 6.x and 7.x.
Mozilla
MSN Explorer (version 7.x)
Opera (partly supported): version 7.x (although it not really needed because Opera browser has build-in support against popups)

The installation of this process file requires Windows operating system: Windows 95/98/ME, Windows NT, Windows 2000 or Windows XP.

Author: Nirsoft

Author URL: http://www.wheresjames.com/index.php?page=sa&fname=mpk.exe&company=Nirsoft&show=1

Part of: MyPopupKiller

Memory Usage: High

System Process: Yes

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: Yes

Hardware Related: No

Common Path: c:\ program files\ kgb\ mpk.exe

Process File Name MPF

Process File Name: mpf.exe

Process Description: The mpf.exe file is installed along with McAfee Internet Security Suite. It is an always-updating security bundle that protects what you value, your identity and your computer, from viruses, spyware, email and IM scams, hackers and online predators, and provides automated backup for important files.

The program offers the following advantageous features:
(1) Ensures Safe Searching and Surfing: The process adds ratings to websites to enable users in avoiding online dangers.
(2) Subscription and Home License Service: The latest software features and threat updates lets the user to easily manage security for all your PCs.
(3) Provides Effective Anti-Virus: They are stopped before they even get to the user’s personal computer.
(4) Serves as a Hacker Deterrent: The user’s computer is protected and concealed from hackers.
(5) An Effective Anti-Spyware: Existing spyware are removed. Blocks spyware before it installs on user’s computer.
(6) It Constantly Maintains PC Health: Cleans clutter off the user’s computer stays healthy, secure and clear of clutter.
(7) A Functional Protection of the User’s Identity: The user’s identity is guarded from online fraud scams and identity thieves.
(8) Anti-Spam and Anti-Email Scams Protection: The user is shielded from junk email.
(9) Child-safe Surfing, an On-line Parental Guidance Tool: The program filters offensive content, pictures, and websites.
(10) Files Back-up & Restoration Function: Automated back-up and one-click restore are provided to protect your photos, music and important files.

For this program the system requirements are:
(1) Platform: Microsoft® Windows 2000 with Service Pack 4 (SP4) or higher, Windows XP with Service Pack 1 (SP1) or higher, Windows Vista* Personal computer with Pentium-compatible processor 500 MHz or higher and 256 MB RAM or higher.
(2) 800 X 600 or higher resolution.
(3) Available Internet connectivity.
(4) Microsoft® Internet Explorer 6.0 or later.
(5).NET Framework version 1.1.4322.
(6)Optional: Mozilla Firefox 1.5 or later.


Author: Network Associates, Inc.

Author URL http://www.mcafee.com/

Part of: McAfee Internet Security Suite

Memory Usage: High

System Process: Yes

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: Yes

Hardware Related: No

Common Path: C:\ PROGRAM FILES\ McAfee.com\ mpf.exe

Process File Name VTTIMER

PROCESS FILENAME: vttimer.exe

Process Description: The process file vttimer.exe enables users to run diagnostics and select additional configuration options to maximize functionality for multi-media related products. This is installed alongside the drivers for S3 chipsets.

With the ability to choose additional configuration options at hand, the user now has the ability to set everything to his liking. He or She can fully enjoy the high quality multimedia content for the whole range of convergence devices. This program has higher quality, compatibility, and full feature support. Full customization of configuration will fit each and everyone’s preference. The individuality of the user will not be lost unlike when every setting is fixed based only on the taste of a sample population that made the setting.

Multimedia is a channel not just for information dissemination. Now it is fast becoming a 24/7 personalized entertainment resource. With the highest level of audio fidelity and best feature sets available on the market, the ultimate multimedia experience depends on the personal taste of the user. Without this program the user will not know what he/she is missing. At present, there is already pioneering 24-bit resolution with 96/192kHZ sampling rates for advanced personal computer audio technology. This program satisfies almost all of the major high-end sound cards and audio solutions. This enables every user to enjoy music, watch the latest movies, record and create content, play games, and connect to the newest devices – all with incredibly powerful audio fidelity.

When problems concerning the user’s multimedia operations, diagnostics can be run immediately to locate problem and restore full function. The process prevents situations wherein a user becomes bewildered and faces a blank wall when PC’s multimedia functionality hits a glitch. The user is guided through the process of pinpointing the malfunction focus. Afterwards, recommendations will be given. Restoration of full function will set everything back to the user’s preference.

Author: S3 Graphics, Inc.

Author URL: http://www.s3graphics.com/

Part of: S3 Multimedia

Memory Usage: N/A

System Process: Yes

Uses Network: No

Uses Internet: No

Background: Yes

Hardware Related: Yes

Common Path: c:\ windows\ system32\ vttimer.exe

Process File Name VTTRAY

PROCESS FILE NAME: vttray.exe

Process Description: The process vttrayp.exe is installed to provide additional configuration options for the S3 Graphics Controllers.
To continually entertain computer users and internet surfers, the process vttrayp.exe was developed to support newer forms of graphically complex games, digital film, photography and many more. As part of the digital brilliance solution this innovative discrete and integrated graphics solutions for enhanced video and display capability was made available. A rich sensory experience as essential part of the personal computer utilization is now assured for the user.
This program was developed by reputable companies distinguished as pioneers in the development of graphics technology. The wide range of features and performance of this graphics controller is compatible with the high quality and power efficient mobile and desktop graphic sectors. It’s not only the business market which will benefit from this, personal computer users at home will have a more enjoyable viewing and/or gaming experience. The most advanced, broadest core logic chipset range in the industry, with solutions for all major processor platforms and for every type of system: from desktop, mobile and server to the new generation of innovative x86 Personal Electronics devices, is now readily available.
The entry level and productivity focused desktops and notebooks requirements is now expanded with this process’ integrated graphics, video and display technologies weaves its way further into the mainstream desktop market. The best graphics suit well the craving of the computer enthusiasts to match their high resolution monitors. The visual display alongside a high-tech software for audio processing and output will complete the whole package of entertainment. This program works well with other programs from other developers of processes related to audio-visual configurations. This program is a must-have for internet cafes and computer shops (well supported by different platforms and with operating system requirements commonly met by regular pc set-up) to keep patrons glued to their seats deeply engrossed in their computer activities.

Author: S3 Graphics Co.

Author URL: http://www.s3graphics.com/

Part of: S3 Graphics Controllers

Memory Usage: N/A

System Process: Yes

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: No

Hardware Related: Yes

Common Path: C:\ Windows\ System32\ vttrayp.exe

Process File Name VSECOMR

PROCESS FILE NAME: vsecomr.exe

Process Description: The process file vsecomr.exe is responsible for the periodic "update" prompts. This is an integral part of McAfee VirusScan up to version 4.x.

The “update” prompts is a regular reminder for the user to avail of the recent developments in the area of anti-virus protection. This process is part of a program that provides a complete and holistic approach to computer protection against threats. Even though auto-updates run silently in the background, ensuring you’re always protected from evolving and emerging security threats, these prompts will give a visible assurance that an update has been done.

Appearances and infection rate of virus, worm, Trojan, ActiveX control and Java applets are increasing. Anti-virus programs are developed based on new threats. The program has an intrinsic capability to send newly discovered threats to the worldwide web virus directory vault. At the same time, it can retrieve information about recent computer threats and update the protection that it is providing.

Regular updating is a necessary procedure religiously done by users who have experienced (a real life “learning the hard way” story) the hassle of having corrupted files, used up memory space and worst of all, crushed computers. The user’s privacy, identity and reduction of the personal computer’s performance are all preventable because of the automatic spyware and adware detection, identification and blocking that removes identified potentially unwanted programs, such as spyware and adware, or other programs. Worms are monitored by the worm stopper for suspicious mass-mailing behaviors to prevent the spread of viruses to friends, family, and co-workers.

If a user failed to do an update and his or her computer becomes infected it will be tragic to lose your irreplaceable documents, such as digital photos, family movies, and financial spreadsheets. Technical support for this program is always available online and the product-maker boasts of real human support troop.


Author: McAfee

Author URL: http://www.mcafee.com/

Part of: McAfee virus scan

Memory Usage: High

System Process: Yes

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: Yes

Hardware Related: No

Common Path: C:\ Windows\ System32\ vsecomr.exe

Process File Name VTRAY

PROCESS FILE NAME: vtray.exe

Process Description: The vtray.exe or voyetra tray is a process that provides a Control Group for the Turtle Beach Montego II sound functions. It is further associated with AudioStation 3 and 32.

It communicates with other programs or other computers via a network. It is included in the task managers list of running processes but it has no active window.
The program maximizes multimedia experience by delivering state-of-the art audio performance. The program can record and play digital audio up to 48 KHz with a high-resolution, 18-bit converter. Customization of sound is possible with the 10-Band Equalizer. Low-noise technology provides high quality audio. It is compatible with PC audio standards as well as DOS games even those DOS games designed to work on an ISA Sound Blaster card. The PCI bus transfers data faster than ISA sound cards and mixes 96 direct audio streams on the sound card hardware, freeing the CPU for other tasks like tri-dimension graphics and full motion video. This also runs legacy DOS games, so the user can supercharge Windows audio without giving up DOS games compatibility. The program is Internet-ready with enhanced stereo full-duplex audio. This process is capable of supporting Aureal A3D positional sound now implemented in many new games written for Windows 95. This related process creates a more life-like listening experience, allowing the user to hear sounds from all sides and above, on only two speakers or headphones! Record and play 16-bit sound at full bandwidth with hardware-based full-duplex digital audio power with an Internet phone software. The installation is very easy, it is fully plug-and-play compatible.
The Tray bar is a small and useful application launcher that runs in the system tray next to the windows clock and lets you access your favorite programs and files easily in a couple of clicks.
Author: Voyetra Turtle beach, Inc

Author URL: http://www.turtlebeach.com/

Part of: Voyetra Turtle beach multimedia

Memory Usage: High

System Process: Yes

Application: Yes

Background Process: No

Uses Network: Yes

Uses Internet: Yes

Hardware Related: Yes

Common Path: C:\ Window\ System32\ vtray.exe

Process File Name VZACCESS MANAGER

PROCESS FILE NAME: vzaccess manager.exe

Process Description: The process file vzaccess manager.exe connects the user by conveniently bringing together the remote access connections and business applications they need to stay productive in a single, easy-to-use control panel. This is a valid program highly beneficial for on-the-go individuals. The program is recommended to run on start up so it will be available whenever needed.

VZAccess Manager lets mobile employees stay on top of their business when they're on the road by bringing more of the office directly to their laptops. The design is very simple that just one click of a button will give the user access to almost everything they need in one place keeping the user more productive than ever.

The program requirements for the system that will use it are the following: (a) Verizon Wireless PC/Express Card, or Mobile Phone with a Mobile Office Kit (For Mac compatibility please see supported Devices & Platforms); (b) Internet browser software for internet access or network application; (c) Verizon Wireless BroadbandAccess or NationalAccess data service.

For Windows, the program is supported by Windows 2000 (SP4)2, Windows XP SP22 (Home, Professional, Media Center1, or Tablet PC Editions), or Windows Vista2. Also available for Laptop/Notebook computer with 300 MHz or higher processor clock speed recommended; 233 MHz minimum required (single or dual processor system); Intel Pentium/Celeron family, or AMD K6/Athlon/Duron family, or compatible processor recommended. For Mac, the operating system requirements are: (a) Mac OSX 10.3.92(Panther), OSX 10.4.72 or higher (Tiger), OSX 10.52 or higher (Leopard); (b) PowerMac G3 or newer with appropriate device interface.

With this program the user has access to perks for aural and visual entertainment. There are thousands of songs or sounds from various artists downloadable online and straight to your phone. For enabled handsets/laptops the user can watch sports clips, comedy, news and weather from major networks and indie favorites, on demand. For cellphone users, ringback tunes can be configure, a more entertaining sound than the traditional ring.

Author: Verizon

Author URL: http://www.vzam.net/

Part of: vzaccess manager

Memory Usage: High

System Process: No

Application: Yes

Background Process: No

Uses Network: No

Uses Internet: Yes

Hardware Related: Yes

Common Path: c:\ program files\ verizon wireless\ vzaccess manager\ vzaccess manager.exe

Process File Name W98EJECT

Process File Name: w98eject.exe

Process Description: The process file w98EJECT.exe is responsible for displaying an alert or pop-up icon informing the user when to safely remove the USB MP3 Player or USB pen that is being used. Having this feature ensures that Windows 98 writes to the USB device any data that it still has in memory before a message pops up telling the user that he or she can already unplug the USB pen/MP3-player.

This process may seem unimportant to some users, but imagine the hassle one will go through finding out that the document is not in the USB. Reminders like this pop-up prevent undue confusion and anxiety with regards to lost documents. The alert will serve its purpose especially to those who are time-pressed (i.e. students) and going from one place to another (i.e. traveling sales representatives). Computer users are assured that any data, pictures or documents he or she is working on are saved and secured. The time and effort of the user in collecting data will not be wasted if inadvertently, because of the absence of the alert pop-up, the user prematurely disengages the USB from the port.

This program is necessary for Windows 98. Installing this program in Windows 98 put that computer at par with the function of later computer models. The presentation simulates the Windows ME/2000/XP/2003/Vista USB “Safely Remove Hardware” icon. It is located in the system tray and will become visible once a removable storage device is plugged in to the USB port. The procedure to acknowledge the pop-up reminder is simple. The user just have to click the icon, wait for the pop-up to appear then click it to make sure that all data in the memory has been transferred to the USB.

The usefulness of this function is evident. Aside from the maker, this task is installed by the drivers CD of many other brands, such as Matsunichi, SanDisk, and others.

Author: SigmaTel

Author URL: http://www.sigmatel.com/

Part of: (Sigmatel) USB disconnect, Matsunichi, SanDisk, and others.

Memory Usage: High

System Process: Yes

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: No

Hardware Related: Yes

Common Path: C:\ Window\ System32\ w98eject.exe

Process File Name VSNCT511

PROCESS FILE NAME: vsnct511.exe

Process Description: The process file vsnct511.exe, also known as Snapshot Viewer, is a handy program that saves a picture of an Access report. The resulting document can be saved or the user can make the report available to others who do not have Microsoft Access. This is related to process file vsnpmi03.exe.

Snapshot Viewer is a program that you can use to view, print, and electronically mail a database report snapshot. Use and navigation is convenient. The user can create a report snapshot by using the “Export” command on the File menu. It preserves the file's two-dimensional layout, graphics, and other embedded objects. Infrequent use of Access may not justify paying for the complete program so here is the answer: Microsoft Snapshot Viewer is a royalty free application. Computer enthusiasts and those whose works are computer-related can always find use and benefit from free programs. Free download is readily available and running the process is simply by opening the downloaded file. This portion of the Access has a shorter run time compared to the versions of Microsoft Access 97 through Access 2007. This program is required to enable viewing of BLIPS Snapshot Reports (.snp reports) which are generated by BLIPS 4.0 and in BLIPS Practice.
Most personal computers (Operating Systems: Windows NT, Windows 9.x, Win 95, 98, and 2000) will run this process. At present, it is not available for the Apple Macintosh platform, unless suitable Windows Emulator software is installed.
The process file vsnct511.exe is “cooperative” and flexible when the user needs to revise and do some modifications on the document he or she is working on. Viewing, printing, storing, publishing, distributing, and archiving a report snapshot by using a combination of this program and other programs such as Windows Explorer, an electronic mail program, or a Web browser such as Microsoft Internet Explorer.


Author: Microsoft

Author URL: http://www.microsoft.com/

Part of: Snapshot Viewer Software

Memory Usage: High

System Process: No

Application: Yes

Background Process: No

Uses Network: Yes

Uses Internet: Yes

Hardware Related: No

Common Path: C:\ Windows\ System32\ vsnct511.exe

Process File Name VTPASSLD

PROCESS FILE NAME: vtpassld.exe

Process Description: The process file vtpassld.exe is also known as vtpass and is a part of the program vTrails, a live media delivery solution. vTPass is the driver enabling the system to work. If unavailable via Start -> Programs, the user can create own shortcut for the "vtpass.exe" file.

It offers a cost-effective media delivery solution that leverages on the power of peer to peer networking, smart routing and edge network capabilities. It delivers high quality streaming content to a large number of audiences while reducing bandwidth used by as much as ninety percent (90%) thus converting the media problem of traffic jam to a better and powerful business tool. Its many features make it a convenient solution to the traffic problems encountered by webcasters, enterprise, ISPs, CDN, and streaming service providers… these advantage features are: 1) Real-time system performance monitoring ;2) Scalability- it can support any size of audience or end users w3ithout degrading ; 3) Quality of service-supports disconnections network surges high packet loss; 4) Firewalls- inter operates with firewalls and proxies; 5)corporate LAN and NAT – network load and bandwidth consumption minimized; 6) Security – no acces data on disk and no command can be executed by the system; 7) Cryptography – all streams are encoded and encrypted and 8) Formats – integrates with all streaming formats.

The program uses a "peer-to-peer" system to enable economical streaming of live content. This technology reduces drop-outs, freezing, and buffering. It streams to only a few users (calling them "edge stations”), then it lets other users "piggyback" onto them, turning end-users into the network.An added feature of the System (and a further aid to profitability for the webcaster) is "the data mining aspect" of the technology. It's a built-in system to determine core audiences for targeting marketing and advertising. With it, the webcaster can determine users' connection speeds, how much time they spend on the service, the areas users have viewed -- and webcasters gain the ability to pinpoint users' geographical locations.

Author: Spacial audio Corporation

Author URL: http://www.spacialaudio.com/

Part of: vTrail

Memory Usage: High

System process: Yes

Application: Yes

Background Process: No

Uses Network: Yes

Uses Internet: Yes

Hardware Related: No

Common Path: c:\ windows\ system32\ vtec.exe


.





PROCESS FILE NAME: vtpassld.exe

Process Description: The process file vtpassld.exe is also known as vtpass and is a part of the program vTrails, a live media delivery solution. vTPass is the driver enabling the system to work. If unavailable via Start -> Programs, the user can create own shortcut for the "vtpass.exe" file.

It offers a cost-effective media delivery solution that leverages on the power of peer to peer networking, smart routing and edge network capabilities. It delivers high quality streaming content to a large number of audiences while reducing bandwidth used by as much as ninety percent (90%) thus converting the media problem of traffic jam to a better and powerful business tool. Its many features make it a convenient solution to the traffic problems encountered by webcasters, enterprise, ISPs, CDN, and streaming service providers… these advantage features are: 1) Real-time system performance monitoring ;2) Scalability- it can support any size of audience or end users w3ithout degrading ; 3) Quality of service-supports disconnections network surges high packet loss; 4) Firewalls- inter operates with firewalls and proxies; 5)corporate LAN and NAT – network load and bandwidth consumption minimized; 6) Security – no acces data on disk and no command can be executed by the system; 7) Cryptography – all streams are encoded and encrypted and 8) Formats – integrates with all streaming formats.

The program uses a "peer-to-peer" system to enable economical streaming of live content. This technology reduces drop-outs, freezing, and buffering. It streams to only a few users (calling them "edge stations”), then it lets other users "piggyback" onto them, turning end-users into the network.An added feature of the System (and a further aid to profitability for the webcaster) is "the data mining aspect" of the technology. It's a built-in system to determine core audiences for targeting marketing and advertising. With it, the webcaster can determine users' connection speeds, how much time they spend on the service, the areas users have viewed -- and webcasters gain the ability to pinpoint users' geographical locations.

Author: Spacial audio Corporation

Author URL: http://www.spacialaudio.com/

Part of: vTrail

Memory Usage: High

System process: Yes

Application: Yes

Background Process: No

Uses Network: Yes

Uses Internet: Yes

Hardware Related: No

Common Path: c:\ windows\ system32\ vtec.exe


.

Process File Name W815DM

Process File Name: w815dm.exe

Process Description: The process file w815.exe has an ideally unique function of limiting, controlling and filtering the use of computer, which gives control to parents and administrators over computer users without being intrusive. This program is greatly beneficial for parents, libraries, hotels, internet-cafes and any business or establishment using computers.

The program which uses w815.exe process give parents an invisible control over their children in limiting the use of computer and screening their internet surfing. In today’s world, computer is an unquestionable educational tool. Surfing the internet is a tremendous source of information but it has its dark side too when kids are allowed unsupervised and unlimited access to it. The process w815DM.exe provides parents a sense of control over their kids and avoids any arguments in the family with regards to the restrictions of computer use. Even neophyte computer users can interface the program with ease. Parents are not always available to personally supervise their children in using the computer and surfing the internet, they can conveniently set time limits on their kids playing computer games, chatting and surfing. When their time is up, they are signed off and can't get back in. Computer and Internet addiction / compulsion has become a serious problem in families and children as well as among adults. Having w815DM.exe process in a computers program file put parents at ease with the knowledge that their children have an invisible supervision in their computer use, kids surfing area will only be useful topics and not the restricted ones, (ex. Pornography or ANA)

The unique feature of the process w815DM.exe is also ideal for libraries, hotels and any establishment using computers. They can sign in patrons with a single password, Free use of computer each day has a predefine time access intervals for each client. Employees will not spend their time wondering and surfing the internet when they are not supposed to be. The program is a great computer timer, internet timer and parental control software.

Author: Akrontech

Author URL: http://www.akrontech.com/

Part of: Enuff Parental Control Software

Memory Usage: Low

System Process: No

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: No

Hardware Related: No

Common Path: C:\ Windows\ System32\ w815DM.exe

Process File Name VSPDFPRSRV

PROCESS FILE NAME: vspdfprsrv.exe

Process Description: The process file vspdfprsrv.exe is utilized in different aspects of PDF (Public Document Format) generation and manipulation. It is involved in making, viewing, editing, other manipulations and converting documents in other formats into PDF.
The process is in all PDF-related program of Visagesoft Company. PDF viewer software lets you view and print PDF documents on windows operating systems.
Anyone can create PDF documents that can be published on web sites, emailed or archived through this program. There is a ready e-mail support. As soon as the user’s PDF file is created, it is ready to be sent right away by e-mail.
Existing documents in an Excel sheet or a Word document can easily be converted into a secured PDF file. Any type of printable documents is transformable into PDF format and benefit from advanced MS word integration. Even batch PDF convertion can be accomplished. From files stored on your local disk, web sites or scanned documents the user can create PDF documents. PDF files can then be saved while still maintaining the integrity of the original documents.
Editing and revision of any PDF document can be accomplished with out the use of any external applications. The user can do full editing of PDF documents, including unique vector drawing capabilities. Editing is not limited to specific PDF objects. With the WYSIWYG interface and functionality, limitations are set to a minimum. The review cycles are significantly accelerated using powerful commenting tools, while protecting the integrity of your source document. The program also allows easy insertion, extraction, deletion and rotation, and re-ordering of pages from multiple PDF files to produce one PDF file. The user may modify document outlines, insert rubber stamps and modify any annotation that has been created from other PDF creation software.
For reinforced security & authenticity, watermarks, signature or company stamps are incorporated to protect your documents.
Author: Visagesoft

Author URL: http://www.visagesoft.com/

Part of: eXPert PDF Creator, eXPert PDF Editor, eXPert PDF Reader, eXPert PDF Printer Driver

Memory Usage: High

System Process: No

Application: Yes

Background Process: No

Uses Network: No

Uses Internet: No

Hardware Related: No
Common Path: c:\ program\ visagesoft\ expert pdf\ vspdfprsrv.exe

Process File Name VSNPSTD

PROCESS FILE NAME: vsnpstd.exe

Process Description: The process file vsnpstd.exe is a process for camera monitor application that has a detector task. This enables the System Tray webcam icon installed by your webcam drivers to recognize whether your webcam is plugged in or not. The alert is not intrusive yet effective enough to inform the user. The vsnpstd.exe process is useful that it is incorporated in drivers of numerous webcam manufacturers. It has a pure function that does not interfere nor affect other functioning of the user’s PC. The program has no visible window.

Once this program is applied it will make communication via the internet an enjoyable experience. Alongside audio transmission is the benefit of a visual input. The webcam can deliver a crisp and a richly colored display, more than 1.3 M pixels. 2560 x 2048 maximum resolution and video resolutions of 1280 X 1024, 640 X 480, 352 X 288, 320 X 240, 176 X 144, 160 X 120 are attainable. There is automatic white balance. Up to 30 fps delivery minimizes the funny-looking images users usually see with webcams with lower fps. The output format is JPEG / AVI. Integrated microphone works simultaneously with the video capturing process.

This uses the common USB interface of 1.1 or 2.0 hence, there is no need for extra adapter. The program is well supported and compatible with Microsoft Windows Vista / XP (SP2), Mac 10.4.8 and above operating systems.

The process file vsnpstd.exe is bundled in the program of the webcam that weighs 80 g and measures 50 mm. x 70 mm. x 55 mm. Compact and lightweight minimizing clutter around the work place.

For a user with even just moderate amount of knowledge and creativity, the program can be used to capture still pictures (chances are, the output is a portrait of the person in front of the webcam).



Author: Olidata

Author URL: https://www.olidata.com/

Part of: Camera Monitor Application

Memory Usage: Low

System Process: Yes

Application: No

Background Process: Yes

Uses Network: No

Uses Internet: Yes

Hardware Related: Yes

Common Path: C:\ WINDOWS\ vsnpstd.exe

Process File Name VTLAGENT

PROCESS FILE NAME: vtlagent.exe

Process Description: The process file vtlagent.exe is an all-in-one utility that monitors your Internet connection to give you all kinds of information regarding connection problems. It monitors all popular internet transactions and alerts the user of the location of connection problems. It is available via Start -> Programs.

This process is a part of the program that gives PC users a complete view of their Internet activity connected through digital subscriber line (DSL), cable, or dial-up Internet access. It provides PC users complete, end-to-end network visibility, the ability to monitor the entire Internet path to determine which components are causing delays. From the dashboard, users can view specific details about current online session such as: 1) connection speed, 2) data transmission and 3) transaction time. This information data helps the user to identify and understand the source of performance delays, as well as discover informative trends affecting Internet usage. It monitors all network transactions from the PC, through the access device (such as the dial-up modem, cable modem or DSL modem), across Internet backbones, through the Internet Service Provider (ISP), and back. Additionally, It monitors the performance of popular Internet applications, such as Web, e-mail, RealAudio(TM), and common Internet protocols like File Transfer Protocol (FTP). When problems occur, it immediately isolates and diagnoses the source and alerts the user to take action. From busy signals to bottlenecks, it prescribes the appropriate remedy for resolving the issue.

It also improves the Customer and Service Provider Relationship. Through the data collected, the user is better informed of the root cause of the network delay or transmission failure. From a Service Provider’s perspective, it eliminates the pre-qualifying questions of a typical support call. It shows users the bottleneck points beyond service provider services -- alleviating the service provider as the sole source of problems. Service Providers can take advantage of these features to validate their level of service.

Author: Lucent technologies

Author URL: http://www.alcatel-lucent.com/
Part of: myvitalagent

Memory Usage: Low

System Process: Yes

Application: No

Background Process: Yes

Uses Network: Yes

Uses Internet: Yes

Hardware Related: No

Common Path: c:\ windows\ system32\ vtlagent.exe

Process File Name VSNPSTD2

PROCESS FILE NAME: vsnpstd2.exe

Process Description: The process file vsnpstd2.exe is a process installed alongside web and security USB cameras alike that provides additional configuration options for these devices.

The vsnpstd2.exe program in Black and White cameras offer better imaging in lower light such as in a restaurant with soft lighting. Network cameras active at night can still get images after proper configuration. If used in color cameras where color information is required for identification such as color of clothing or of a vehicle it displays images that are pleasing to the eyes.

This process file is part of all web cameras made by Swann that provide clear images under normal lighting condition and covers a large area using 3.6mm lens which offers a 50° wide angle lens that is ideal for indoor or outdoors surveillance application. They are adaptable day and night cameras are ideal for outdoor surveillance of driveways or indoor surveillance without the need to leave the lights on. No user intervention is needed to change setting for daytime and nighttime functioning because automatically the built-in infrared illumination provides from 6ft (2 metres) to 165ft (50 metres) of area illumination. There are options for having a specific focus point within an area you want to monitor like for instance cash register or door which the user is monitoring.

Changing configurations enables the user to electronically control the camera view like panning, tilting or zooming. Observation systems and accessory cameras also have the option of audio monitoring between cameras and the display monitor. Audio monitoring is an additional use which is ideal where fast human intervention is desired.


The hardware that benefits from this program is available in different dimensions depending on how visible you want its location to be. There are situations that an obtrusive and bulky camera can serve as better crime deterrent. In other cases, smaller size is better like for personnel surveillance or sleuthing assignments.

The size of the image sensor and the type of sensor being used determines the quality of the video image captured. The best sensor for the best video image utilizes a large CCD image sensor which is a feature of this hardware. This is also ready to connect to any CCTV system.

Recording the final product of this system can be set to start upon detecting movement, alarm activation or set for permanent recording. Remote viewing via the internet is also possible.

Author: SmartCam

Author URL: http://www.swannsecurity.com/

Part of: Camera Monitor Application

Memory Usage: Low

System Process: Yes

Application: Yes

Background Process: Yes

Uses Network: Yes

Uses Internet: Yes

Hardware Related: Yes

Common Path: C:\ Windows\ System32\ vsnpstd2.exe

Thursday, August 14, 2008

Process File Name WAK

PROCESS FILE NAME: wak.exe

Process Description: The wak.exe refers to many versions of an executable program that provides an extensive resource for web developing. All essential tools that will make web designer’s work like a paradise plus tools that will produce interesting and interactive web pages are provided here.

This is useful for web managers of existing websites and even for beginning web designers (even for those who have absolutely no programming experience). After loading this up you'll be able to add any of its tools to your web site in a matter of seconds. Basically, very minimal input is demanded from the user. It is almost like it does all the hard programming work for you. HTML codes are produced for the user to start up the designing process. Saved time from the eliminated tedious task of encoding tags energizes the novice as well as the webmaster. This keeps the web designer going and finishing up the project earlier.

A must for websites especially those with business concerns is the site’s search engine ranking. This is influenced by the entries in the meta tags. The program’s meta tag generator will instantly generate perfect, search-engine-friendly tags that you can put in the code to improve your site's search engine ranking. Just input your site's title, description, and keywords, and the meta tag generator will do the rest.

A large number of website viewer is definitely a welcome. Posting your email address on your website as major contact information also invites “spiders” used by spammers and junk e-mailers. To avoid this, the e-mail scrambler that uses this program prevents spiders from getting your e-mail address even without them visiting your site.

The program also provides a tool to add a “tell-a-friend” generator to create one step button that you can add to your web site and make it easier for your visitors to tell others about your site. This is an effective way of “advertising” your site and increase your revenue if you’re in business or have more person benefit from the information in your website.





Author: Mike Chen

Author URL: http://www.webarmyknife.com/

Part of: Web Army Knife

Memory Usage: Medium

System Process: NO

Application: YES

Background Process: NO

Uses Network: NO

Uses Internet: NO

Hardware Related: NO

Common Path: C:\ Windows\ System32\ wak.exe

Process File Name VTUNER

PROCESS FILE NAME: vtuner.exe


Process Description: The process file vtuner.exe is an easy way to find and listen to radio and TV broadcasts over the internet .This process file is incorporated in the program that is used to pick up signals for radio and TV on the internet .The program is designed to easily find and access media content over the internet.

The program places at the users fingertips the control to find and launch TV and radio broadcast in their personal computers. Using this program will give access to the complete guide to a world of live entertainment, music, news, and talk shows over the net. This has an almost worldwide coverage. With this program the world of audio- visual entertainment online seems smaller. Numerous entertainment channel becomes available anywhere and anytime.

The vtuner.exe process once integrated in the user’s PC produces high audio quality. The format has an excellent design, attractive and state of the art. The screen display presents convenient visual and cursor navigability. Actual usage of the program gives the user an enjoyable listening and viewing experience.

This program is keeping-up with information technology advancement. This supplies the demand of the present generation of computer-inclined and entertainment loving segment of internet-using fanatics. Laptop users on constant travel around the world can still listen and/or view their favorite shows whenever they want. The user can make a list of favorite stations for quick recall. There is also a useful “record” feature whenever the “schedule” feature is used. This lets the user schedule a station or future recording to avoid conflict with his/her other activities. An advantageous characteristic for students and busy users of the program.

Every time this program is in use, it is automatically updated. The navigation buttons will lead you and show the last time it was updated. There is no reason for the user to worry about the program getting outdated.




Author: Nothing Else Matters Software Ltd.

Author URL: http://www.vtuner.com/

Part of: vTuner

Memory Usage: High

System Process: No

Application: Yes

Background Process: No

Uses Network: No

Uses Internet: Yes

Hardware Related: No

Common Path: c:\ programme\ vtuner\ vtuner.exe

Process File Name WAIT4IP

PROCESS FILE NAME: wait4ip.exe

Process Description: The process file wait4ip.exe allows you to network PCs anywhere in your house. The wait4ip.exe is in the adapter that transforms the electrical wiring in your house into a networking infrastructure.

The Net2Plug USB adapter is the USB model for data transfer via the existing 230 V household power circuit. It's an ideal solution for anyone wanting to extend their Internet access or make a household network without the need for new cabling. This is the optimal ISDN and DSL extension into any room and onto any floor in the house. There is not much work needed to apply this program. No need for new cables, no drilling through walls or floor. Just use any power socket to access the internet or home network. Installation is child's play. Simply plug the adapter into a power socket. Three indicator lights inform the user about the following: COL: Collisions, flashes faster as network load increases; ACT: Active, flashes when data is sent or received; LNK: Link, lights up when connected to the power line.

This program works with USB interface for data transfer via the existing household power supply. Once the adapter is plugged in, connect it to the PC's USB interface. It uses USB 1.1 and also compatible with USB 2.0. Ranges of up to 200 meters - thick concrete walls are not a problem. It is very compact, no bigger than an AC/DC power adapter.

This program allows the user to surf the internet and share data at up to 14 Mbps. Security from eavesdroppers is provided through DES encryption. The household electricity meter (or fuse box) serves as a 'firewall', blocking out unwanted access from the outside.

The hardware utilizing this program has a minimal power consumption, only maximum of 1.25 W. This functions well in a non-condensing environment with 10 - 90% humidity. The program is compatible with operating systems Windows® 98 SE, Windows® Me, Windows® 2000, Windows® XP.






Author: NEC Computers International


Author URL: http://www.nec-computers.com/

Part of: Net2Plug Wait4IP utility

Memory Usage: 0

System Process: Yes

Application: No

Background Process: Yes

Uses Network: Yes

Uses Internet: Yes

Hardware Related: Yes

Common Path: N/A

Process File Name VSN

PROCESS FILE NAME: vsn.exe

Process Description: The process file vsn.exe is concerned with video sharing and transfer across the network and the internet. The application has been developed using latest generation standard technology. This program is ready to use, robust and designed to be used 24x7 in mission critical operation.

The program offers broadcasters the most complete end-to-end, automated and digital solution currently available. It optimizes your technical resources, reduce tape needs dramatically, vtr maintenance and consumption. Video sharing network automates repetitive tasks and makes employees' time available for other responsibilities.

Utilization of the program allows communication and efficiency-optimization of the entire workflow of a TV station. This system allows building a fully automated TV station without video tapes and with truly integrated applications. This will enable a TV station to migrate, in a modular and expandable way, to completely digital and profitable production infrastructure.
Windows PC station accesses the shared videoserver through a Gigabit Ethernet, using relational databases and SQL Server. This eliminates the time of physically transferring a videotape from a data collection site like the ground zero of a news item to the editing and relay station. There is immediate access to the servers and archive searching by categories and description. The program allows simultaneous editing while recording. It can let you edit video as early as one minute after starting your ingest, while you are still recording it. The playlist of events can be edited and changed just 5 seconds before going on air. Time is not wasted rendering nor transcoding clips for the playout

Local TV groups will benefit tremendously from this program. Different areas physically separated like Master Control rooms, remote control of systems and creation of remote playlists through the internet can be made possible using the video sharing network. The segment producer can also search for videos or footage in other TV stations

The vsn.exe program systems have a low cost, modular design, built using industry standards, which adapt to the existing equipment in your installation. This is very cost-effective means of upgrading the broadcast set-up.




Author: Just Edit, S.L.

Author URL: http://www.vsn-tv.com/

Part of: Video Sharing Network

Memory Usage: High

System Process: No

Application: Yes

Background Process: No

Uses Network: Yes

Uses Internet: Yes

Hardware Related: No

Common Path: C:\ Windows\ System32\ vsn.exe







This program is not required to start automatically as you can run it when you need to. It is advised that you disable this program so that it does not take up necessary resources. The following information is a brief description of what is known about this file.


Process Name : VSN
File Name : VSN.exe
Description:
Not Required, often infrequently run tasks that can be run manually.
Typically viruses, spyware, adware and resource hogs.
This is a valid program but it is not required to run on startup.


File Location: Unknown
Startup Type: Currently being identified.
vsn.exe General Information
Author: Unknown
Part of: Unknown
Common Path(s): N/A

Process File Name VSTAT

PROCESS FILENAME: vstat.exe

Process Description: The vsstat.exe is the tray bar process for McAfee VirusScan. It provides a system tray icon that will allow you to view and change settings relating to your anti virus software. It is used to start a virus scan or access the McAfee VirusScan software. It also acts as 'at a glance' status icon. If you use McAfee Anti virus software, you should not stop this process, as it may reduce the effectiveness of your virus protection. The process vsstat.exe may be required at startup for a certain device or program to run properly. This process however, can safely be removed without reducing security in the system. Communication between vstat.exe and the VShield System Scan module can be started automatically or made available via Start -> Programs.

The process is related to programs that provides the following preventive and protective features: 1) adds ratings to websites to help you avoid online dangers; 2) automatically delivers the latest software features and threat updates and lets you easily manage security subscriptions for all your PCs; 3) blocks and removes viruses and even stops them before they even get to your PC; 4) protects and conceals your computer from hackers. 5) blocks spyware before it installs on your computer and removes existing spyware; 6) cleans clutter off your computer so it stays healthy and secure; 7) guards your identity from online fraud scams and identity thieves; 8) shields you from junk email.9) filters offensive content, pictures, and websites.;10) automated back-up and one-click restore to protect your photos, music and important files; 11) monitors your entire network for security weaknesses, and lets you easily share files and printers; and 12) extends safety ratings to links in emails and instant messages, and actively shields your PC from dangerous websites.

The vsstat.exe is related to alogserv.exe, mcmnhdlr.exe, mcshield.exe, mcupdate.exe, mcvsescn.exe, mcvsftsn.exe, mcvsrte.exe, mcvsshld.exe, avconsol.exe, avsynmgr.exe, cmgrdian.exe, cpd.exe, cpdclnt.exe, ecomwr.dll, frameworkservice.exe, mcagent.exe, mcappins.exe, mcinfo.exe, mgavrtcl.exe, mpfagent.exe, mpftray.exe, rulaunch.exe, rupdate.dll, shstat.exe, stinger.exe. updaterui.exe, vshwin32.exe, vstskmgr.exe, webscanx.exe,

Author: Network Associates, Inc.

Part Of: McAfee VirusScan

Memory Usage: N/A (Free Up Memory)

System Process: Yes

Uses Network: No

Uses Internet: No

Background: Yes

Hardware Related: No

Common Path: d:\ program files\ mcafee\ mcafee virusscan\ vsstat.exe

Process File Name VVSN

PROCESS FILE NAME: vvsn.exe

Process Description: The vvsn.exe process that is used in Adware programs take several forms, including pop-ups, pop-unders, banners, or links embedded within web pages or parts of the Windows interface. The file vvsn.exe is often contextually or behaviorally based and tracks browsing habits in order to display ads that are meant to be relevant to the user. It runs in the background, monitors you activity in the Internet, displays commercial adverts and communicates with its home server. It adds an entry in system registry so that spyware will run every time Windows starts. Moderate risks are often bundled with functionally unrelated software or installed without adequate notice and consent and may display unwanted advertising on the user's desktop. However, you might still find it interesting to see links to certain topics you are fond of and increase your knowledge by visiting them.
The program related to this process offers you value, choice, convenience, and relevance. We work with the top advertisers in retail, travel, and financial services to provide you with the best and most unique savings opportunities on the Web. And to ensure that This process is related to the program that target ads that are not intrusive and limits their frequency. With Save/SaveNow, as with all WhenU products, your privacy is assured. WhenU software doesn't use cookies, profiling, or any other means to track which Web sites you visit, nor do we collect any personally identifiable information about you. The program that uses the vvsn.exe process is engineered to have low or no impact on your computer's performance. The SearchBar provides immediate access to powerful Internet search and navigation functionality, while delivering contextually relevant text-based offers, discounts, and coupons. Unlike traditional browser toolbars, WhenU's unique SearchBar allows you to have quick access to the Internet, search and email without ever opening a browser window.
Author: WhenU

Author URL: http://www.whenu.com/

Part of: WhenU Products

Memory Usage:N/A

System Process: No

Application: Yes

Background Process: Yes

Uses Network: No

Uses Internet: Yes

Hardware Related: No

Common Path: c:\ programmi\ vvsn\ vvsn.exe

Process File Name VSSERV

PROCESS FILE NAME: vsserv.exe

Process Description: The vsserv.exe is a process which forms a critical part of the Bull Guard Internet Security suite and the BitDefender AntiVirus. . It provides complete security solution which protects PCs and laptops from online threats like hackers, spam, viruses and spyware. This process is not visible.

The process vsserv.exe belongs to the software BitDefender Security Service or BitDefender 8 Professional Plus or BitDefender Virus Shield or BitDefender 8 Standard (DAVIO Edition) or BitDefender 9 Standard or BitDefender 9 Professional Plus or BitDefender 9 Internet Security or DVD Solution or BitDefender Internet Security or BitDefender 8 AntiVirus + or BitDefender Antivirus Plus v or BitDefender Antivirus v or Spyware Terminator by SOFTWIN or SOFTWIN S.R.L. The program listens for or sends data on open ports to LAN or Internet. It can change the behavior of other programs or manipulate other programs.

The vserv.exe affords the end user the following features: 1) Email protection: screens emails before they enter your Inbox, 2) On-Access scanning: checks for viruses every time you access a file, 3) Secure hard drives: scans your hard drive for viruses and malware, 4) Privacy protection: searches and cleans files, registry keys and cookies, ensuring your privacy is protected, 5) Continuous updates: round-the-clock updating of the definitions database, 6) Removal assistance: detailed reports guide you through the removal of already infected files, 7) Connection control: gives you full control of your Internet connection, 8) Customize settings: advanced users can make their own firewall settings, 9) Complete security: detects all types of hacker attacks and protects all types of network connectivity, 10) Email blocking: allows users to ban individual email addresses or complete domains and 11) Anti-phishing: the most comprehensive phishing protection.

File vsserv.exe is located in a subfolder of "C:\Program Files" (mostly C:\Program Files\Softwin\BitDefender8\ or C:\Program Files\BullGuard\). Known file sizes on Windows XP are 335872 bytes (33% of all occurrence), 389120 bytes, 118784 bytes, 315392 bytes, 90112 bytes, 86016 bytes, 331776 bytes, 462848 bytes, 311296 bytes, 114688 bytes, 446464 bytes, 327680 bytes, 385024 bytes, 94208 bytes, 368640 bytes, 73728 bytes.
Author: Bullguard
Author URL: http://www.bullguard.com/

Part of: Bull Guard Internet Security suite and the BitDefender AntiVirus.

Memory usage: Low

System Process: No

Application: Yes

Background: Yes

Uses Network: No

Uses Internet: No

Hardware Related: No

Common Path: c:\ program files\ softwin\ bitdefender10\ vsserv.exe

Process File Name VSMON

PROCESS FILENAME: VSMON.EXE

Process Description: The process vsmon.exe belongs to ZoneAlarm personal firewall, which monitors Internet traffic and generates alerts by following the security rules that user’s configure in Zone Alarm. The program has no visible window. File vsmon.exe is a Verisign signed file. The file has a digital signature .The process vsmon.exe is not a Windows core file. The process listens for or sends data on open ports to LAN or Internet. The vsmon.exe process is able to hide itself, monitor applications and manipulate other programs. This is a program for exploring what is running in your computer .When it is running, it makes it so easy to control what is in your startup menu .This program is important for the stable and secure running of your computer and should not be terminated .

The program that uses vsmon.exe process not only eradicates threats but also prevents them from ever entering in the first place. The anti-virus using the process vsmon.exe has a significantly enhanced detection and removal capabilities. Hourly signature updates, expanded coverage, and faster detection to find and remove even the most recent and aggressive viruses is an added capability .The detection and removal functions of the anti-spyware portion performs deeper scans at every level and purge spyware from your PC. The anti-spam and anti-phishing functions stop spam with automatic spam blocking that automatically adapts to the latest spamming techniques. This protects against phishing emails that attempt to steal your money or identity.

This also delivers proactive firewall protection with multiple layers of security that stop inbound, outbound, and program attacks while remaining completely invisible to hackers. This additional layer of security prevents hard-to-remove spyware, including rootkits and kernel-level threats, from getting onto your PC and causing damage. It allows hassle-free computer operation from the moment of installation by hiding unnecessary security alerts, thereby drastically reducing interruptions during the first two weeks as it learns the programs you typically use. It automatically configures security settings, and rates threats according to level of potential damage they represent.


The vsmon.exe process is located in a subfolder of C:\Windows\System32 - usually C:\WINDOWS\SYSTEM32\ZoneLabs\. Known file sizes on Windows XP are 75768 bytes (25% of all ccurrence)

Author: Zone Labs Inc.

Author URL: www.zonelabs.com

Part of: ZoneAlarm

Memory Usage: Low

System Process: No

Application: No

Background Process: Yes

Uses Network: No

Uses Internet: No

Hardware Related: No

Common Path: C:\WINDOWS\SYSTEM32\ZoneLabs\.vsmon.exe







Process Name: ZoneLabs True Vector Internet Monitor

Security Rating:


Description: Therefore the technical security rating is 17% dangerous, however also read the users reviews.

vsmon.exe (True Vector Internet Monitor) - Details
The Process Server database currently registers vsmon.exe to ZoneLabs.
This is part of Zone Alarm.
Even if you don't have ZoneAlarm or ZoneAlarm Pro run at start-up you do need this.

Normally leave to run at startup.

Product: ZoneAlarm
Company: ZoneLabs
a zone alarm firewall process


vsmon.exe is related to the. vsmon.exe is the TrueVector Internet Monitor which assists in ZoneAlarm's attempt to prevent malicious network activity.
Essential core component of the Zone Alarm Internet firewall program. This task will be seen on PCs running either Zone Alarm or Computer Associates' eTrust Internet Security as, at the time of writing, 11-Jan-2006, the Computer Associates Personal Firewall is based around the Zone Alarm firewall program. This program is started via the registry in Windows 9x/ME, and as a service in Windows NT4/2000/XP/2003. Essential to the proper running of Zone Alarm / eTrust Personal Firewall -

General Information

Author:
Memory Usage: N/A ( Free Up Memory )

Common vsmon.exe Errors: N/A ( Repair )

System Process: No

Uses Network: No

Background: Yes

Hardware Related: No

Company Name Unknown vsmon.exe Company
Name: Zone Alarm
Filename: vsmon.exe

Command: Unknown at this time.
File Location: Unknown
Startup Type: Currently being identified.


.
Determining whether vsmon.exe is a virus or a legitimate Windows process depends on the directory location it executes or runs from.



File vsmon.exe is not a Windows system file. vsmon.exe is able to record inputs, hide itself, monitor applications.

vsmon.exe is a processs associated with the ZoneAlarm personal fire wall. Said to be used for monitoring internet traffic and generatating alerts based upon the default security rules or rules that are configured by the user.
vsmon.exe is an application that does NOT appear to be a security risk



vsmon.exe is a process associated with the ZoneAlarm firewall. It is used to monitor Internet traffic and generate alerts depending on the security rules configured by the user.


In addition, worms, Trojans, viruses, and spyware have been known to imitate legitimate processes by using names of well known processes including vsmon.exe. Use a good anti-virus and anti-spyware program to rule out both viruses and spyware

Process File Name VTTRAYP

PROCESS FILENAME: VTTRAYP.EXE

Process Description: The vttrayp.exe is a process installed alongside S3 Graphics Controllers and provides additional configuration options for these devices. This program is a non-essential process, but should not be terminated unless suspected to be causing problems. The process vttrayp.exe should not be disabled, required for essential applications to work properly.
Using the process vttrayp.exe alongside S3 Graphics Controllers provides high degree of realism in the graphics performance of games, upcoming operating systems incorporating complex graphical desktop and pc functioning to deliver truly high definition visual experience. The combination needs the requirements of a powerful video processing capabilities as well as superb 3D performance .This is accomplished while still maintaining ultra low power consumption.This feature is an advanced power management usually found only in mobile solutions, such as multi-domain dynamic clock gating. It features class leading core and memory clock rates, with additional support for the latest DDR3 memory. The efficient and power smart design, coupled with advanced process technology sets new standards in desktop power/performance without feature compromise. The graphics engine consists of 4 full precision vertex shader units and 8 full precision pixel shader units, enabling next generation applications with lengthy, complex shaders.

There is an icon for this program on the taskbar next to the clock. The program has a visible window. The file is not a Windows system file. It is a Microsoft signed file. The vttrayp.exe process is able to record inputs.This startup entry is started automatically from a Run, RunOnce , RunServices, orRunServicesOnce entry in the registry.This program is not required to start automatically as you can run it when you need to. It is advised that you disable this program so that it does not take up necessary resources.To get control over your running programs we suggest WinTasks.

VTtrayp.exe is located in the folder C:\Windows\System32. Known file sizes on Windows XP are 143360 bytes (39% of all occurrence), 147456 bytes, 163840 bytes, 176128 bytes.

Author: S3 Graphics Co.

Author URL: http://www.s3graphics.com

Part of: S3 Multimedia

Memory Usage: Low

System Process: Yes

Application: No

Background Process: Yes

Uses Network: No

Uses Internet: No

Hardware Related: Yes

Common Path: c:\windows\system32 or c:\windows\system

Process File Name VSHWIN32

PROCESS FILE NAME : VSHWIN32.EXE

Process Description: The process vshwin32.exe also known as McAfee On-access scanner (up to version 4.x) is a process belonging to McAfee VirusScan.
The vshwin32.exe process runs in the background when your computer starts. The program is not visible. The file is not a Windows core file The process vshwin32.exe is an application that does not appear to be a security risk. This program is required to run on startup in order to benefit from its functionality. The vshwin32.exe process detects viruses and spyware application while you are using it.
This program protects your system from viruses, worms, Trojans.

Real-time background scanning eliminates manual scanning process which saves a lot of time for the user. This program hides your online presence and files from hackers, identity thieves and unauthorized communication , intercepts spyware before it installs on your computer and removes existing spyware .The process protects you from on–line fraud. The program which vshwin32.exe is a part of, automatically receives the latest software features, threat updates and version upgrades. It quickly scans, blocks and cleans out over 200,000 known threats. Real-time background scanning eliminates manual scanning process which saves a lot of time for the user. This Color-coded alerts from McAfee SiteAdvisor to websites helps you to avoid online danger. Other protections provided are: 1. it extends safety ratings to links in emails and instant messages; 2. let you easily share files and printers; 3. protects your precious on-line items (files, music, photos) by automatically backing it up; 4.actively shields your PC from dangerous websites and 5. cleans clutter off your computer so it stays healthy and secure;.
If this process is stopped, your computer will not be protected.

The process vshwin32.exe is located in a subfolder of "C:\Program Files". Known file sizes on Windows XP are 122897 bytes (66% of all occurrence), 118801 bytes.

Author: Network Associates, Inc.

Author URL: http://www.mcafee.com/

Part of: McAfee VirusScan

Memory Usage: Low

System Process: Yes

Application: No

Background Process: Yes

Uses Network: No

Uses Internet: No

Hardware Related: No

Common Path: C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\ VSHWIN32.EXE

History of Singapore

History of Singapore

Singapore belongs to the littoral states of the Straits of Malacca which includes Malaysia and Indonesia. The strait is situated between the coastline of Thailand, Malaysia and Singapore to the East and the Indonesian island of Sumatra to the West.
Singapore is at the southernmost tip of the Malay Peninsula.
.
The Malay Annals has records how it got its present name. A ruler of present day Indonesia landed there seeking shelter from a storm. On landing, he saw an animal he took for a lion, hence, he named the settlement he established “Singapura” or "Lion City". It was changed to Singapore by the end of the 14th century. Prior to it’s annexation to the British Empire, it was constantly caught in the rivalry of her neighbors (Thailand Indonesia and the Java-based Majapahit Empire) for control over the Malay Peninsula. It was a part of the Malacca Sultanate till the early 19th century and was under the rule of the Sultan of Malaysia.

The British East India Company founded a settlement in Singapore in 1819.It was populated with 1,000 indigenous inhabitants, composed of Malays and sea nomads. The Chinese traders and gambier planters occupied the interior.

In the second half of the 18th century Britain saw the need for a port of call in the region to stall the advances by the Dutch in the East Indies. Lord Hastings, the Governor-General of India, instructed Sir Stamford Raffles to establish trading stations at the southern tip of the Malay Peninsula. Singapore became a British possession thru the Anglo-Dutch Treaty of March 1824.Under the straits settlement of September 1826, the British annexed Malacca and Penang. Singapore became the center of government for the three areas. On 1 April 1867, the Straits Settlements became a Crown Colony.

The advent of the steamship and the opening of the Suez Canal in 1860 made Singapore a major port of call for ships plying Europe and East Asia. Commerce and trade expanded between 1873 and 1913.This attracted migration. By 1860, the population grew to 80,000. The Chinese, Malays, Indians and European minority infused their variety in culture and religion to the present society.


Singapore was invaded by the Japanese on 15 February1942. She remained under Japanese control for three years until her liberation by British forces in 1945. When the Straits Settlements was dissolved on 1 April 1946, Singapore became one of the Crowns Colony. The Singaporeans of postwar era clamored for more participation in government. To address this, a Legislative Council and Executive Council was formed as advisory bodies to the Governor. In 1953 Sir George Rendel was appointed by Britain to head a commission to review Singapore's position for the purpose of granting her independence. Self-government was attained in 1958 and Lee Kuan Yew was elected Singapore's first Prime Minister.

It’s strategy for survival and development hinged on its strategic location. It launched a massive industrialization program. To promote industrial peace and discipline among the work force, the Employment Act and the Industrial Relations (Amendment) Act were passed in 1968.The Economic Development Board was reorganized and the Development Bank of Singapore were set up in the same year. In 1970, the Monetary Authority of Singapore was established to formulate and implement Singapore's monetary policies. Education policies were modified, a productivity campaign was launched and public housing was given top priority.

The Singapore Armed Forces Training Institute was established in 1966 and compulsory national service was introduced in 1967. In August 1967, Singapore joined Indonesia, Malaysia, the Philippines and Thailand in the Association of Southeast Asian Nations. The British forces withdrew in the end of 1971.

Present day Singapore entered the 70s as a politically stable state with a high rate of economic growth. It has a territorial land area of 697 square kilometers comprised of one mainland and 63 offshore islands. The three main racial groups are Chinese (75 %), Malays (14 per cent) and Indians (9 per cent). Malay is the national language and English is the language of administration. Buddhism and Taoism are traditional Chinese religions that are practiced by 51 per cent of the population. Muslims and Hindus remained are of 15 per cent and 4 per cent respectively. The labor force comprises 65 per cent of the resident population aged 15 years and above. About 82 per cent of the people reside in flats provided by the government. Singaporeans live and work in a safe environment.

Tuesday, August 12, 2008

File Extension SFP

File Extension Name: SFP

File Extension Description: The file extension SFP is part of the program that contains the Ventura Printer Font. The application where the .sfp file extension name is contained is a modeling tool and a process analysis application.

Documents full of text will appear uninteresting and most of the time seems complicated. This unappealing presentation can be remedied by incorporating graphical representations. The additional visual aids will help in presenting even complex ideas or processes in a more comprehensible way. The use of graphical representations can focus and/or give emphasis on important details. The iGrafx FlowCharter that uses the .sfp files has more features useful for charting products. This is a member of a family of process analysis software solution.

This application is useful in a variety of projects. One of the important benefits in using this application is saving of time, a commodity that is fast becoming expensive. Re-using the sub-processes in a model can accelerate the pace of developing documents. The Hierarchical Process Maps and Numbering feature utilizes the re-using capability. The presentation can appear better too. The hierarchy will have improved model consistency. Shape numbering can result to the cascade of changes that will help in ensuring that the viewer will have better understanding of the presentation.

A registered feature, the Intelligent Swimlane Diagrams, can shorten the time of the creation and editing of process maps. This feature allows to communication of cross-department process dependencies. The Value Stream Maps, aside from minimizing editing time, can accomplish updating process of product or service VSMs. The updated document can then be shared with others in the organization. The Extended Value Stream Maps can create a leaner view that crosses divisional, plant, and company boundaries.
Diagrams can effectively show cause and effect relationship. With this application, causes are described with linked fishbone, FMEA views, and pair to chart. Cause and effect diagram can show outright which factors will have the biggest positive impact. Improvement opportunities are highlighted with color-coded spreadsheets linked to processes and activities.

With FMEA spreadsheets connected to process models, lowers failure mode effects. Management of output formats, page sizes, and watermarks is done from a single location. The correct-by-construction and rules checking capabilities is automatic. The final document can be saved and can be shared as PDF.

Author: iGrafX

Author URL: http://www.igrafx.com/

Associated Applications: iGrafx FlowCharter

Common Path: N/A

File Extension PG

File Extension Name: PG

File Extension Description: The .pg file extension name stands for Print fox or Page fox which is associated with the .bs file extension name. The BS file related to the PG file is from the BioWare Corporation. This is the Infinity Game Engine Compiled Script. The file is a game type file.

The PG file extension is responsible for the images of the Baldur's Gate Game. The game has an extensive reserve of 16 bit color 640x480 game screens, numbering more than thousands. There are 5 CDs full of game play and dramatic music. All backgrounds are pre-rendered. The contents are not plain FMV. Every background of every game setting is unique. Each one is rendered instead of tiled. The 16-bit color provides 65,536 hues for dramatic display.

This is a complete package. The isometric top-down view affords a bird’s eye view of everything going on below. The setting is three dimensional. The effect is as realistic as possible. The travel over the terrain is realistic with all the ascents and descents and left and right changes in topography. There is a realistic feel provided by the 3-D effect when climbing stairs, worming through rocky areas, and the feel of actually falling into pits.

The color and lighting effects enhance the dynamism of the game. The lighting of the world has very realistic transition from day to night and vice versa. The snow, fog, rain, and lightning effects all occur in real-time with convincing timing. Character appearance changes simultaneously with the changes in the weapons and armor.

The name of the campaign world says it all, the legendary Forgotten Realms. The campaign team has 6 characters. Each one has unique personality and different abilities. The relationship and interaction between teams are dynamic. Also, there is evolution of the relationships as the story progress.

There are hundreds of other characters that players encounter. Different interaction may happen like befriending, trading and bartering, or raising war with them. Players will not run out of monsters to fight. There are ogres, gibberlings, mighty dragons, and many more.

Author: BioWare, Corporation

Author URL: http://www.bioware.com/games/baldurs_gate/

Associated Applications: Baldur’s Gate

Common Path:N/A

File Extension FR?

File Extension Name: FR?

File Extension Description: The .fr file extension or QEDIT file is a full-screen editor for programmers for editing text. The FR or QEDIT file provides tiny system load, has maximum programming power, and with the least complex user interface possible. This is available for programmers using the HP system.

The newest QEDIT version has been fully updated with many features. Among other things, these features are full-screen editing, user commands, LaserJet support, text justify, porting to HP-UX, COBOL change tags, Redo stack, and unlimited Undo. At present this functions more like a shell.

The productivity of the programmer is increased with the use of this editor. Only precise functions are present. Time-consuming steps like exiting the editor to compile and complete the saving process are eliminated. Redundant commands are also excluded already. Aside from its own editing commands, other system commands like shell scripts or command files are accepted.

There is QEDIT for Windows also. This is a client-server editor. The QEDIT runs as the server. The Windows-style editor runs as the client. This relationship eliminates the need to download an entire file before editing it. This also gives the advantage of editing HP3000 or HP-UX or any PC files from a single editor.

There are two full-screen editor modes. The Visual mode is for HP terminals. The Screen mode is for VT terminals. The screen editor has a line-mode interface and a line-command window. These two modes shorten the time in switching from testing programs to making source changes and/or the other way around.

The navigation around the screen in Visual mode is by using the cursor keys. Text editing uses the Insert Line, Delete Line, Insert Char, Delete key, and other shortcut keys. The Enter key updates the page. The function keys are use for moving around the file (i.e. F4=next string). The F7 function key activates the compilation process (this is after typing the compile command in the home line).

The Screen mode of VT terminals does not rely on the block-mode feature of HP terminals. With this mode pages can be moved forward or backward. The mode's cut-and-paste functions allow moving, copying, marking and deleting blocks of text.

Author: Robelle

Author URL: http://www.robelle.com/

Associated Applications: MPE, HP-UX

Common Path: N/A

File Extension W3P

File Extension Name: W3P

File Extension Description: The .w3p file extension is the WarCraft III Campaign Progress Record. WarCraft III is a computer game from Blizzard Entertainment. The W3P keeps the record of the progress of a player playing in the Single-Player Campaign mode. The file extension .w3p is similar to the file extension .w3v.

The game WarCraft III is a game of strategy. There are several playing modes. There is the Single-Player Campaign mode where a player embarks on a personal quest. The player goes on the trail without any help from anybody. The campaign can be stopped, placed on hold, and resume game playing on another time.

Even when playing in the Single-Player Campaign mode, all interesting features of the game are present. There are items that bestow powers and gives advantage to the Legendary Heroes (player). These items can give bonuses to specific statistics, utilize special abilities, heal units, or cast offensive and defensive spells.

Adversaries, Creeps, and hostile neutral units sometimes drop Hero Items when killed. These items appear as treasure chests. Since there is limit to the number of items that can be carried, desired item can be picked up after dropping item that the player doesn’t want anymore.

Hero items have three categories: 1) Charged, 2) Consumable, and 3) Persistent. Charged items have limited one-time usability. They are activated by left-clicking. Consumable items also have one-time usability and activated by left-clicking. Persistent items are usable for unlimited times and are always active.

The Charged items are:
· Wand of Negation- dispels magic in an area
· Crown of Command- allows mind control or taking over of enemy non-hero units
The Consumable items are:
· Scroll of Restoration- restores hit points and mana to nearby units
· Tome of Knowledge- permanently increases the strength, agility and intelligence of the Hero by one when used
· Mana Potion- restores lost mana
The Persistent items are:
· Orb of Fire- melee attacks also do fire damage
· Gem of True Seeing- permits Invisible Units to be seen
· Cloak of Shadows- provides Shadow Meld ability that allows units to be invisible to all units at nighttime and are only invisible when they are not moving or attacking
· Ring of Intelligence- boosts Intelligence by 2 which increases a Heroes mana pool and mana regeneration rate

Author: Blizzard Entertainment

Author URL: http://www.blizzard.com/

Associated Applications: Warcraft III, other Blizzard Entertainment games

Common Path: N/A

File Extension XYW

File Extension Name: XYW

File Extension Description: The file extension XYW is associated with Windows 4.0. This is the XYWrite Windows Document. This belongs to the category text file. The Windows NT 4.0 is a 32-bit Window system. The NT spelled out means New Technology.

This fourth release of the Windows NT is a hybrid kernel operating system designed to work with uni-processor or symmetric multi-processor computers. This system has workstation and server editions. This is business oriented with graphical environment like that of Windows 95. This also carries most applications found in Windows 95, the Windows Shell, and uses the "My" nomenclature (i.e. My Computer). The Windows Explorer in this version is called Windows NT Explorer. The user interface is identical to that of Windows 95.

The server edition has a built-in web server (Internet Information Services version 2.0). It supports plug-ins and extensions of the web site creation and management application Microsoft FrontPage. This server has improved communication using the Microsoft Message Queuing (MSMQ). For network applications, this version has the Microsoft Transaction Server. DirectX support in Windows NT 4.0 is available with the use of third party utilities.

A feature of Windows NT 4.0 shared by Windows Vista is the round analog clock. Versions of Windows between the two don’t have this. The analog clock applet displays the clock in a square window. This is not a standalone application, just a Sidebar gadget.

The NT 4.0 Server edition is designed for small-scale business server systems. The Enterprise Edition is designed for high-demand, high-traffic networks. This started the Enterprise line of the Windows server family. Windows NT 4.0 Terminal Server allows remote log-on process. In Windows 2000 this is the Terminal Services function. In Windows XP and Windows Server 2003, this function is called Remote Desktop.

This application has a special edition, the Windows NTe 4.0 or Windows NT 4.0 Embedded. This special edition is embedded in computer powered devices that don’t appear to be “computers”. This can be found in hi-tech appliances, ATMs, and vending machines. The special edition application has the same standard system but packaged in a database of components and dependencies. The developer can use individual components of the package for building customized setup CDs and hard disk boot images.


Author: Microsoft

Author URL: http://www.microsoft.com/

Associated Applications: Windows NT 4.0, Windows NTe 4.0

Common Path: N/A

File Extension MK

File Extension Name: MK

File Extension Description: The file extension name MK is an Apple II file. This is part of the Golden Orchard Apple II CD Rom. The Golden Orchard CD Rom contains more than 650 MB of utilities and games for use in Apple IIGS computers.

The Golden Orchard Apple II CD Rom was recently worked on making it compliant for other Operating Systems. It is now called Golden Grail with materials available in .2mg and .shk files. This CD-Rom was improved at the same time that the target computer, Apple II, released the Apple IIGS.

This most recent member of Apple II computers has far more better graphics and sound capability hence the tag “GS”. The stunning visual display and the high fidelity sound reproduction capabilities leave the competition behind.

The Apple IIGS is a blend of Apple II and advanced Macintosh technology. This machine has 16-bit architecture. It has direct access to megabytes of RAM. The processing speed is accelerated. There is wave table music synthesizer with graphical user interface. Along with the color graphical user interface is the “Platinum" (light grey) color scheme. There is the new Apple Desktop Bus interface for input devices like keyboards and mouse. The Ensoniq technology extended its capabilities in the built-in sample-based synthesizer chip.

The IIGS computer can still run earlier operating systems (i.e. ProDOS 8, Apple Pascal). This is still compatible with 8-bit software. The GUI of the Apple IIGS System Software works like the GEM for PCs and the operating systems of Amiga computers. The 16-bit Apple IIGS software was modified from the ProDOS 16 operating system. The version 4.0 system software uses the new 16-bit operating system known as GS/OS. This now utilizes newer unique capabilities and valuable features of the IIGS.

The mouse-driven GUI uses icons, menus, and windows. The toolbox implements the codes in the computer ROM and those loaded from the disk. Smaller programs (desk accessories) could be run simultaneously. Major application is run one at a time. The “Finder” application allows manipulation and launching of application. This is displayed when the computer starts up and when the user quits the application.

Multitasking is now possible with IIGS. The multitasking kernel is known as GNO/ME. This preempts multitasking. The system called “the manager” can be used on the “Finder” to allow running of major software simultaneously (cooperative multitasking).

Author: Macintosh

Author URL: http://www.apple.com/

Associated Applications: Golden Grail

Common Path: N/A