Geeks in Phoenix

Geek Blog


Google opens web based Android Market

The one thing I love about my Android-based smartphone is the availability of applications for it. And finding and installing Android applications just got easier. Google has recently opened a web-based version of the Android Market.

The Google Android Market website homepage
The Google Android Market website homepage

The website is clean and easy to navigate, with clearly marked tabs. I found the amount of applications to be the most available for Android based hardware anywhere. I found quite a few that I had never seen on the Verizon version of the Android Market application.

A typical application category list
A typical application category list

I browsed through a few categories and found an application to download. Remember that you have to be signed in to your g-mail account associated with your phone to install any applications. I clicked on install and got the following prompt asking for the installation location. I selected my phone and clicked install.

Android Market application installation screen
Android Market application installation screen

I got a confirmation that the app would be downloaded to my Android.

Android Market download confirmation screen
Android Market download confirmation screen

I checked my phone and sure enough, on the status bar on top was an icon indicating an app had been installed. A quick check confirmed the installation of the application.

This is, by far, the easiest way to find and install Android applications I have found to date. Hands down the best! If you have an Android powered device, I highly recommend you go over to Google Play and take a look around.

Security made easier with Microsoft Security Essentials 2

In a previous article, I discussed Microsoft Security Essentials (MSE). I like the ease of use, the integration with Windows Update, and the small footprint it has, especially on my netbook. Recently, Microsoft has released Microsoft Security Essentials Version 2 with some new features, including a new and improved protection engine, Windows Firewall integration, and a Network Inspection System.

Microsoft Security Essentials Version 2
A new look for MSE V2

As you can see, the user interface changed slightly, with a new color palette and mesh graphics. There are a few more options for the user to configure, but it is still one of the easiest anti-virus applications to setup. For more on the major improvements, here is a quote from the MSE web site:

Windows Firewall integration
Windows Firewall can help prevent attackers or malicious software from gaining access to your computer through the Internet or a network. Now when you install Security Essentials, the installation wizard verifies that Windows Firewall is turned on. If you have intentionally turned off Windows Firewall, you can avoid turning it on by clearing a check box. You can change your Windows Firewall settings at any time via the System and Security settings in Control Panel.

Network Inspection System
Attackers are increasingly carrying out network-based attacks against exposed vulnerabilities before software vendors can develop and distribute security updates. Studies of vulnerabilities show that it can take a month or longer from the time of an initial attack report before a suitable security update is developed, tested, and released. This gap in protection leaves many computers vulnerable to attacks and exploitation for a substantial period of time. Network Inspection System works with real-time protection to better protect you against network-based attacks by greatly reducing the timespan between vulnerability disclosures and update deployment from weeks to a few hours.

Award-winning protection engine
Under the hood of Security Essentials is its award-winning protection engine that is updated regularly. The engine is backed by a team of antimalware researchers from the Microsoft Malware Protection Center, providing responses to the latest malware threats 24 hours a day.

Now, in going through the program, I did find two options quite interesting...

Microsoft Security Essentials Version 2
Enable behavior monitoring and Enable Network Inspection System options in MSE V2

I did a little digging in the MSE V2 Help file and found this description of these features:

Enable behavior monitoring
This option monitors collections of behavior for suspicious patterns that might not be detected by traditional anti-virus detection methods.

Enable Network Inspection System
This option helps protect your computer against “zero day” exploits of known vulnerabilities, decreasing the window of time between the moment a vulnerability is discovered and an update is applied.

Here are a few of the other changes inside of MSE V2:

  • Microsoft Security Essentials also supports Windows XP Mode in Windows 7
  • The ability to limit CPU usage during scanning
  • Automatic removal of quarantined files after a set amount of time
  • You can now select between monitoring all files, incoming or outgoing

Microsoft Security Essentials Version 2 is available for Windows XP (SP 2 or SP 3)(x86), Windows Vista (x86, x64), and Windows 7 (x86, x64) and can be downloaded here.

Note:
The only issue I came across was that the update function inside Version 1 would not update the program to Version 2. I tried it on a couple of systems without success. I had to uninstall Version 1 first, then install Version 2.

Harden / Mitigate the security of your Windows programs with Microsoft EMET

Updated January 31, 2021. Microsoft's Enhanced Mitigation Experience Toolkit reached the end of its life on July 31, 2018, and is no longer available for download.

Enhanced Mitigation Experience Toolkit 5.5

Let's face it, some of the software we use on a daily basis has become subject to security vulnerabilities and exploits. Software manufacturers do their best to develop and test fixes / patches as fast as possible, but this can take time. A lot of users just cannot keep up with all of the updates and hotfixes. A few years ago Microsoft released the Enhanced Mitigation Experience Toolkit (EMET) to deal with just this issue.

View of the main screen inside EMET 5.5
View of the main screen inside EMET 5.5

So what is EMET? EMET monitors selected programs (Internet Explorer, Microsoft Office, etc.) for known attack actions and techniques. When one of the several pseudo mitigation technologies is triggered, EMET will either block the programs' access to the resource it is trying to reach or just terminate it. EMET expands on the technologies that Microsoft implemented with Data Execution Prevention (DEP), which has been included in the Windows operating system since Windows XP SP2. It will also validate digitally signed SSL certificates inside of Internet Explorer.

View of the application configuration screen inside EMET 5.5
View of the application configuration screen inside EMET 5.5

So how does EMET work? EMET acts as a shim between the program being monitored and the operating system. The monitored program thinks it's talking directly to the operating system, but it's actually talking to it through EMET. EMET comes with predefined profiles for some of the more common programs like Microsoft Office, Internet Explorer, Adobe Acrobat and Java. You can also add to the predefined profiles or create your own. I recommend that you monitor any program that can open files on or from the Internet.

What security exploits are currently covered

Here's is the current list of mitigations EMET 5.5 currently looks for.

  • Attack Surface Reduction (ASR) Mitigation
  • Export Address Table Filtering (EAF+) Security Mitigation
  • Data Execution Prevention (DEP) Security Mitigation
  • Structured Execution Handling Overwrite Protection (SEHOP) Security Mitigation
  • NullPage Security Mitigation
  • Heapspray Allocation Security Mitigation
  • Export Address Table Filtering (EAF) Security Mitigation
  • Mandatory Address Space Layout Randomization (ASLR) Security Mitigation
  • Load Library Check - Return Oriented Programming (ROP) Security Mitigation
  • Memory Protection Check - Return Oriented Programming (ROP) Security Mitigation
  • Caller Checks - Return Oriented Programming (ROP) Security Mitigation
  • Simulate Execution Flow - Return Oriented Programming (ROP) Security Mitigation
  • Stack Pivot - Return Oriented Programming (ROP) Security Mitigation
  • Windows 10 untrusted fonts

What programs should you harden / mitigate

You only want to harden / mitigate certain programs that are targeted on a regular basis. Web browsers like Chrome, Firefox and Internet Explorer, production / office programs like Microsoft Word, Excel and PowerPoint, e-mail clients like Outlook and Windows Live Mail are some of the few. I recommend that you harden any program that can open files on or from the Internet.

What programs should you not harden / mitigate

You should never configure EMET to monitor anti-virus, anti-malware, intrusion prevention / detection software, debuggers, software that handles Digital Rights Management (DRM) technologies or software that uses anti-debugging, obfuscation, or hooking technologies.

Installation notes

New installation: Just download EMET and install

Upgrade install: Since the registry keys for EMET changed with this version, you can either export your existing EMET settings using the method in the 'What's new' section below, download the converter or reconfigure all of the program settings. With the drastic change with the EMET data format inside of the registry, I think that it would be just easier to reconfigure EMET then try the export / import method. Either way, remember to uninstall any older version of EMET and restart your computer before you install this version.

What's new in EMET 5.5?

  • Full-featured GPO management, compatible with reporting and compliance requirements
  • Command line: new syntax and options
  • Implementation of certificate pinning now based on root CA thumbprints. Exceptions logic removed.
  • Export and Import now memorize path
  • EMET registry has been refactored. To convert settings from previous versions of EMET (including EMET 5.5 Beta), registry values must be saved in a file then imported back with the use of the converter PowerShell script after EMET 5.5 is installed. Here are the steps to follow:
  1. Export settings. With elevated PowerShell, run the following command:
    .\Migrate-EmetSettings.ps1 -RegFile .\NewEmetSettings.reg -MissingCertCsv .\MissingCerts.csv PowerShell script Migrate-EmetSettings.ps1 is provided with EMET 5.5 RTM. It includes documentation about its usage.
  2. Uninstall former version of EMET.
  3. Install EMET 5.5 RTM. When asked to choose between Use recommended settings and Configure manually later, chose option Configure manually later.
  4. Import settings. With elevated PowerShell, run the following command:
    reg.exe import .\NewEmetSettings.reg

Supported Operating Systems

Windows 10 , Windows 7, Windows 8.1, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2, Windows Vista

  • EMET 5.5 requires .NET Framework 4.5.
  • For Internet Explorer 10 on Windows 8 you need to install KB2790907 - a mandatory Application Compatibility update that has been released on March 12th, 2013 or any other Application Compatibility updates for Windows 8 after that

When your motherboard does not save settings it may be time to replace the CMOS battery

Updated April 7, 2025

A well-functioning motherboard is essential for a smooth computing experience, but like all components, it can encounter issues over time. One common problem users face is the motherboard’s inability to save settings, which often points to a failing CMOS battery.

A Complementary Metal-Oxide-Semiconductor (CMOS) battery powers the real-time clock found on the motherboard and stores BIOS settings, including system time, date, and configuration settings for hardware components. This small battery, usually a coin-cell battery
Typical CMOS battery
is typically a CR2032 lithium battery, and it is designed to maintain these settings even when the computer is powered off.

Common indicators that the CMOS battery needs to be replaced

  • The most noticeable symptom is the continually resetting date and time in the BIOS. Each time you start your computer, if you find yourself having to reset the clock, your CMOS battery is probably failing.
  • You may also experience error messages related to the BIOS settings, particularly if the system cannot verify the configurations or has lost custom settings.
  • If you customize BIOS settings—such as boot order, fan speeds, or overclocking settings—and notice they revert to default every time the computer shuts down, the CMOS battery might be at fault.
  • In some cases, an aging battery can cause other inconsistencies, such as the computer shutting down unexpectedly or failing to start altogether.

Replacing the CMOS battery

  1. With the system turned off, unplug the power cord.
  2. Open the computer case.
  3. Locate the CMOS battery.
    Typical CMOS battery location
  4. Most batteries are held in place by a clip or simply snap out of their holder. Gently release the clip or pull the battery upwards to remove it.
    CMOS battery release lever
    CMOS battery released
  5. Replace with a new battery.
  6. Close the computer case and plug in the power cord.
  7. Start your computer and enter the BIOS setup (usually by pressing a key like DEL, F2, or F10 during startup). You’ll likely need to reset your configurations, including the date and time, and any unique settings you had previously established.

Upgrading to Windows 7 from Windows XP

Windows XP is currently the most popular operating system, with Windows 7 quickly catching up. As more and more people are moving from Windows XP to Windows 7, I thought I would spotlight a series of articles that I wrote a little while back. My move from Windows XP to Windows 7 was a 'side-by-side' migration, with two separate systems.

I, believe it or not, never used Windows Vista on any of my production systems. I ran Windows XP up until Windows 7 was released. I did run Windows 7 Release Candidates on a test system for several months before its release and was very happy with it. I even wrote a series of articles about it too. Here they all are.

Upgrading to Windows 7 from Windows XP

Upgrading from Windows XP to Windows 7 (Part 1)

Upgrading from Windows XP to Windows 7 (Part 2 - Drive Imaging)

Upgrading from Windows XP to Windows 7 (Part 3 - Hardware / Software Inventory)

Upgrading from Windows XP to Windows 7 (Part 4 - Windows 7 Installation)

Upgrading from Windows XP to Windows 7 (Part 5 - Applications and Settings)

Upgrading from Windows XP to Windows 7 (Part 6 - Epilogue)

Beta testing Windows 7

Beta testing Windows 7 - Part 1

Beta testing Windows 7 - Part 2

Beta testing Windows 7 - Part 3

Beta testing Windows 7 - Part 4 (Antec cases)

Beta testing Windows 7 - Part 5 (BIOS and installation)

Beta testing Windows 7 - Part 6 (software overview) (Video)

Beta testing Windows 7 - Part 7 (Photoshop Benchmark)

Free computer diagnostics

Repairing a PC can sometimes be expensive, and that is why we offer free basic in-shop diagnostics. Give one of our professional and experienced technicians a call at (602) 795-1111, and let's see what we can do for you.

Check out our reviews

Geeks In Phoenix LLC, BBB Business Review

This business is BBB Accredited

Customer service is #1

Here at Geeks in Phoenix, we take pride in providing excellent customer service. We aim to give the highest quality of service  from computer repair, virus removal, and data recovery.

Bring your computer to us and save

Repairing a computer can be time-consuming. That is why we base our in-shop service on the time we work on your computer, not the time it takes for your computer to work! From running memory-checking software to scanning for viruses, these are processes that can take some time.

Contact us

If you have any questions, please feel free to give us a call at (602) 795-1111  and talk with one of our Geeks. Or you can send us a message from our contact page , and one of our Geeks will get back to you as soon as possible. Or you can stop by and see us. Here are our hours and location.

Like Geeks in Phoenix on Facebook

Follow Geeks in Phoenix on Twitter

Watch Geeks in Phoenix on YouTube