Sorry for the misreading.
Robin Walker's given excellent guidance. There are some process-related web
sites which attempt to decode some of these things, but I don't have one to
recommend. Some of them have useful information, but often the author has
some specific axe to grind--such as eliminating "non-essential" services.
This may turn out to be fine until you install hardware or software that
expects that "non-essential" service to be available, and fails with a
cryptic error message.
If you really have a suspicion of malware, looking for oddities of naming or
paths--names resembling random strings, or names resembling, but not quite
the same as, system process--or the same as system processes but in a
non-standard location are all things to watch out for.
If you have an executable and want an opinion on it, there is a good
multi-vendor antivirus site:
http://virusscan.jotti.org
Again, a clean opinion doesn't tell you an executable is safe.
The intent of the Spynet submission process is to build a knowledge base
that will be able to provide the background info necessary to fill in those
details you mention.
I expect you've read the KB article explaining the svchost entries in XP:
http://support.microsoft.com/?kbid=314056
There is indeed an amazing amount going on under the hood in XP--I hadn't
really thought of the parallels between, say, a '57 Chevy and a current year
Toyota product, but the changes are probably somewhat similar in magnitude,
from, say, a dos/windows 3.1 perspective.
I think I'm meandering a bit much here--I agree with you that the background
info on the services needs to improve, and I hope that's something the
developers have been able to manage in the work going into beta2.
--