In the operating systems we use on our computers, including the popular Windows 10 for desktop environments, the applications and processes we use are key elements. These are the programs that we use on a day-to-day basis with the team and that help us get the most out of it.
It is for all this that we comment, so knowing as best as possible how these programs that we run work is increasingly important. We tell you all this because some of them, without our knowing it, run with hidden commands loaded. For example, as we have commented on some occasion in the past, those hidden commands can be added to the Chrome browser.
These are small parameters that are added to the program’s execution file, to a shortcut, or process, in order to change its behavior. So we can make the program always open in private mode, or with a particular profile. Of course, Chrome is not the only application that supports these small changes. We say this because many other applications do it, all through hidden commands that the applications admit from the outset but that we can know that they have been loaded, or not.
Check hidden commands from Task Manager
As we mentioned, these additional parameters or commands are a good way to change the behavior of a specific application. Thus, in the event that we run an application on the desktop and we want to know if it runs normally or with any of these, let’s see how to know. The truth is that it is quite easy to find out, for which we will give you two methods.
First of all we are going to make use of the Task Manager to see the processes, which is the easiest method to achieve this that we discussed. Thus, we open the aforementioned Task Manager with the key combination Ctr + Shift + Esc. Then we right-click on any column heading and select the Command Line option from the menu. This will add a new column with the same name so that we can locate the running application from the list shown here.
In the new column we will be able to check and see first-hand all the hidden commands and parameters that were used when the application in question was launched.
Discover the hidden commands of the processes from the CMD
Of course, in the event that this does not work for a particular application or you want to ensure, we can also use the command line for all this. This, in the same way as with the previous system, will show us all the hidden parameters with which an application is running.
Before we can use the command, we are going to need a little information about the application or processes in question. To do this, we return to the Task Manager and look for the application in the Processes tab where we click the right mouse button. We select Go to details from the contextual menu, which will place us in the Details tab of the Task Manager with that application highlighted. Then we have to write down the value of the PID column, after which we open a command prompt window with CMD.
In it we execute the command that we are going to show you next, but we substitute the asterisks for the PID value .
“Wmic.exe path Win32_Process where handle = ‘*****’ get Commandline / format: list”
For example, in the case that concerns us here, the corresponding command would be:
“Wmic.exe path Win32_Process where handle = ‘14432 ′ get Commandline / format: list”
Thus, after its execution, the command will return all the hidden parameters for that particular process in the Command Prompt window itself.