If you ever use Chrome browser to view PDF document, you probably aware that Chrome has it’s own PDF viewer plugin. This allowed user to view any PDF document using iDF document, you can easily disable to plugin in chrome://plugins by un-check the plugin checkbox in that page.
But this has feature has changed drastically since Chrome upgraded to version 56 and above. With the latest Chrome browser, you can’t disable the PDF plugin anymore in chrome://plugins. As stated in chrome bug tracking, they mentioned that chrome://plugins will be depreciated soon.
![Chrome Plugin for PDF.png](https://ahkhaicom.wordpress.com/wp-content/uploads/2017/02/chrome-plugin-for-pdf.png?w=474)
https://bugs.chromium.org/p/chromium/issues/detail?id=615738
https://bugs.chromium.org/p/chromium/issues/detail?id=673199
And now, Chrome has moved the setting to Content Settins page instead.
Settings > Show Advanced Settings > Content Settings. Tick the “Open PDF files in the default PDF viewer application”, then you would be able to view PDF document using your own default application.
![chrome-pdf-viewer](https://ahkhaicom.wordpress.com/wp-content/uploads/2017/02/chrome-pdf-viewer.png?w=474)
It is pretty easy to kill a process in Windows operating system’s task manager. But some processes cannot be killed using Windows task manager because it is a “protected process”.
Even using process explorer application, you might not able to kill the process. So recently I found that there is a very powerful tool that can solve the problem. Process Hacker, Process Hacker was started in 2008 as an open source alternative to programs such as Task Manager and Process Explorer. It is a portable application that doesn’t required any installation. It is safe to use, not a hacking tools, just a professional name.
http://processhacker.sourceforge.net
It has graphs and statistics allow you quickly to track down resource hogs and runaway processes.
![System information summary](https://i0.wp.com/processhacker.sourceforge.net/img/screenshots/sysinfo_trimmed_1.png)
Or view detailed stack traces with kernel-mode, WOW64 and .NET support.
![Stack trace](https://i0.wp.com/processhacker.sourceforge.net/img/screenshots/thread_stack.png)
Please download from http://processhacker.sourceforge.net/downloads.php?bottom=1
A technology blog, discuss about programming, networking, attached storage and many more.
You must be logged in to post a comment.