symproxysvc.exe

July 18th, 2006 - 06:56 pm ET by

This is a proxy that is installed with Norton’s Internet Security Suite. A proxy is a program that manages the transfer of files between a private network and a remote server, normally on the Internet.

Symproxysvc.exe allows you to communicate between your program and the Symantec server, mostly to receive updates.

Norton’s Internet Security Suite offers protection against viruses, spyware, Trojans and remote attacks. This software can apparently protect you from spam (unwanted email) or place a parent control on certain internet websites to protect your children.

If you want to stop this process you should uninstall Norton’s Internet Security Suite for security and stability reasons. In this case we recommend that you install a new security program as soon as possible.

  • LuComServer.exe (Live Update Communication Server) This process verifies the presence of updates for your Norton Security software.These updates can be new virus definition files (allowing you to identify the latest found viruses) or new updates to the software. You
  • ccregvfy.exe (Common Client Registry Integrity Verifier) Installed with the Norton protection software, this process will start with Windows to ensure that no dangerous operations are started via the Windows registry.This is a vital component of your protection software and
  • ccPxySvc.exe (Symantec Common Client Proxy Service) Installed with the Norton protection software, this process works as an intermediary between your computer and the Internet. It filters incoming and outgoing data.It is used, for example, by the Norton Firewall or the
  • nisum.exe (Norton Internet Security User Manager) Installed with the Norton firewall program, this process seems to compile statistics on your firewalls activity (like the amount of traffic that is incoming and outgoing on your computer and the number of blocked
  • aupdate.exe (Automatic LiveUpdate) This process verifies the presence of updates for Symantec security programs and will ask you if you want to install them if there are any.These updates can be new virus signature files (allowing you to identify the
See the other processes from this designer

Field descriptions :

  • Short name : this is the name of the process which appears in Windows Task Manager.
  • Full name : this is the full name of the process as defined by its designer.
  • File path : indicates the location where the process program is located. You should be aware that this information may be different if you have changed the default installation location of a program.
  • Description : this will present information about the origins of the processes, its use and additional information.
  • Designer : provides the name of the process designer, with this generally being a hardware or software maker.
  • Associated Service(s) : indicates the services associated to the process in question.
  • System Processes : these correspond only to the processes which are owned by Windows, ensuring the operating system functions correctly.
  • Applicative Processes : concerns all non-system processes, which means those that correspond to programs.
  • Priority : concerns the default priority of a process, with there being 6 options: Real time, high, above normal, normal, below normal and low. The higher the priority is set, the more often the process will be executed over the other processes. You should be aware that changing this setting can lead to abnormal functioning of the PC.
  • Background Processes : concerns the "invisibles" processes which correspond to those which are running in the systems background and which are not used by the user. These can be, for example, a service.
  • Network Processes : concerns the processes which are directly linked to network management.
  • Hardware Processes : concerns the processes which are directly linked to hardware management.
  • Spyware : indicates whether the process in question is linked to a spyware program.
  • Trojan Horse : indicates whether the process in question is linked to the presence of a Trojan horse.
  • Virus : indicates whether the process in question is linked to the presence of a virus which has contaminated your system.
  • How to stop it : there are three ways to stop a process: close the program or stop the service which is behind the process, or stop it brutally through Windows Task Manager.
  • How to delete it : essentially concerns applicative processes. Deleting a process often requires that you uninstall the software being the process.