Geeks in Phoenix

Geek Blog


Strengthen your computer security with EMET 5

Updated January 31, 2021. Microsoft's Enhanced Mitigation Experience Toolkit reached the end of its life on July 31, 2018, and is no longer available for download.

It seems like every day, a new software exploit or vulnerability is found. Software vendors work hard at keeping their software secure, but it can take time to test and deploy patches. So what can you do to protect your computer? The Enhanced Mitigation Experience Toolkit (EMET) from Microsoft does just that.

The main window inside of EMET 5
The main window inside of EMET 5

EMET is designed to prevent attackers from taking control of your system. It works as 'shim' in-between your programs and the operating system. EMET looks for the most common attack techniques and will block and terminate any program it is monitoring. EMET works alongside your favorite anti-virus and anti-malware programs for layered security.

I have been using EMET as part of my layered security for years and have written a few blogs on it. With each version, Microsoft keeps improving it. Some of the improvements in EMET 5 include Attack Surface Reduction (ASR), Export Address Table Filtering Plus (EAF+), and 64-bit ROP mitigations. Here's is the current list of mitigations EMET currently looks for.

  • Structured Exception Handler Overwrite Protection (SEHOP)
  • Data Execution Prevention (DEP)
  • Heapspray allocation
  • Null page allocation
  • Mandatory Address Space Layout Randomization (ASLR)
  • Export Address Table Access Filtering (EAF)
  • Export Address Table Access Filtering Plus (EAF+)
  • Bottom-up randomization
  • Return Oriented Programming (ROP)
  • Attack Surface Reduction (ASR)

There are two (2) different ways to configure EMET, a Graphic User Interface (GUI) and a command-line tool. It is best to configure EMET through the GUI since the command-line tool doesn't allow access to all EMET's features. The built-in configuration wizard will enable you to use either the recommenced settings, keep previous settings (upgrade install), or manually configure EMET (new install).

Easily configure programs to monitor in EMET 5
Easily configure programs to monitor in EMET 5

Once you have EMET installed, it's pretty easy to add programs to monitor. Just open the program you want EMET to watch and then open EMET. On the lower part of the main window, you will see Running Processes. Just find the program you want to monitor in the list, right-click on it, and select Configure Process. You will have to restart any program you have just configured inside of EMET.

How to upgrade your computers hard disk drive to a solid state drive

Updated September 24, 2020

Most computers (laptop & desktop) nowadays come with a Hard Disk Drive (HDD) as standard equipment with a Solid State Drive (SSD) as an option. Each drive type has its pros and cons: HDD's are cheaper and have more storage, but SSD's are extremely fast (especially when connected to an M.2 slot). So if your existing computer has an HDD, odds are you could replace it with an SSD. Here's how to upgrade your computer hard disk drive to solid-state drive.

How to upgrade your computer's hard disk drive to a solid state drive

I wrote an article not long ago on how to upgrade the hard drive in your computer and refer back to it often. It describes how to clone a smaller drive to a larger one of the same type. Since SSD's typically have less storage than HDD's, this time I'll have to shrink the existing HDD (80 GB) partition(s) down below the capacity of the target SSD (64 GB) before I can clone it.

As in the article mentioned above, the first thing to do is a Checkdisk of the existing HDD. Doing this will ensure there are no errors that may prohibit the cloning of the drive.

Running Checkdisk in Windows Vista / Windows 7

Running Checkdisk in Windows 8

Running Checkdisk in Windows 10

Now we have to start cleaning up the drive. Windows has a built-in tool called Disk Cleanup (cleanmgr.exe) that works pretty well at getting out the clutter. Try using it from an admin command prompt; that way, you'll get more options.

Disk Cleanup Windows 7 / Vista

Disk Cleanup Windows 8

Disk Cleanup Windows 10

Since we are trying to get the maximum amount of free space we can, we will have to delete some files, including documents, photos, videos, etc. Doing a backup right now will ensure we have a copy of all of the files if we need to recover some later.

Windows Vista / Windows 7 Backup

Windows 8 Backup

Windows 10 Backup

The next thing I have to do is find out what is taking up space on the existing HDD. For this, I'll use a copy of Space Sniffer. After a quick view, I see I can free up several gigabytes of space by permanently removing the hibernation file and temporarily deleting the swap file. Windows will warn you about having no swap file, but we will be recreating the swap file once the drive cloning is complete.

Disable Windows hibernation

Managing Virtual Memory / Pagefile in Windows Vista

Managing Virtual Memory / Pagefile in Windows 7

Managing Virtual Memory / Pagefile in Windows 8

Managing Virtual Memory / Pagefile in Windows 10

The next thing we need to do to the drive is to defragment it. I'll use Defraggler from Piriform for this task. Once the drive is defragged, it's time to shrink it. To do this, open Computer Management, expand the Storage section in the left column, and select Disk Management. In the right column, right-click on the partition marked as Boot (usually C:) and select Shrink. Remember to take the size down at least 10-15% below the capacity of the new SSD.

Shrinking a partition down in Windows 7
Shrinking a partition down in Windows 7

Once the partition has been resized, it's time to clone the drive. The following article has details on how to clone your hard drive, including links to the cloning software.

How to upgrade the hard drive in your computer

Note: An issue not addressed in the article above is the form factor; the existing SATA HDD is 3.5" form factor, and SATA SSD's are 2.5" form factor.
A desktop hdd and an ssd with adapter brackets
This can easily be resolved by using a pair of 2.5" to 3.5" adapter brackets.

Once the drive cloning is complete, and the system is running again, we need to expand the boot partition to use any free space available. Open Computer Management, expand the Storage section in the left column, and select Disk Management. In the right column, right-click on the partition mark as Boot (usually C:) and select Expand. Once the boot partition has been resized, you can now enable the Windows swap file.

For more information on upgrading computer drives. click on the following links.

How to clone the drive in your Windows computer

How to upgrade the hard drive in your computer

How to use layered security to protect your computer

Updated June 22, 2023

It seems whenever I tell someone that I repair computers for a living, I almost always get asked the question, "What do you recommend for anti-virus software?". I tell them I use a layered approach to security, not relying on just one program for protection. I'm not particularly eager to use all-in-one security suites. It's not that I don't trust any particular software; I don't like having only one piece of software protecting my computer. Here's how to use layered security to protect your computer.

How to use layered security to protect your computer

Software firewall

Windows has had a good firewall built-in since Windows Vista, and it's turned on by default. It comes pre-installed inside of Windows and is ready to go. There are also some great free and paid firewall products. And you will also find software firewalls included in most security suites, like McAfee or Norton. It's your choice.

Always remember that when you connect to the Internet, do it through a router or hotspot. Never connect a wired network connection directly to the Internet jack on your modem. With a router or hotspot, some form of Network Address Translation (NAT) happens, so you are not directly connected to the Internet.

Anti-virus software

This one is a no-brainer. Microsoft has included a built-in anti-virus program inside of Windows since Windows 8.1 and has worked hard to make it a top-rated program. And if you install a different anti-virus program, Windows Security will detect it and turn its real-time protection off. But you can still have it run periodic scans.

There are plenty of free and paid anti-virus programs on the market, and I have used quite a few different ones over the years. Some internet service providers like Cox Communications even offer free security suite software.

The only thing to remember when picking an anti-virus program is the system's performance you're installing it on. I would not install a full-blown security suite like Norton or McAfee on a laptop.

Anti-malware / anti-adware software

Anti-virus software typically looks for, you guessed it, viruses. I've cleaned out several pieces of malware and adware that anti-virus programs missed because it wasn't a virus. Quite a few anti-malware programs are meant to be run side-by-side with anti-virus software.

When it comes to anti-malware programs, Malwarebytes is the most popular. If you want real-time scanning, you will need a license. If you want to periodically manually scan your computer, the free version will work just fine.

Now with the rise of pop-up bogus security warnings, adware is becoming the biggest threat to consumers. Malwarebytes has a great program called AdwCleaner for finding and removing adware in all popular browsers (Chrome, Edge, Firefox, etc.).

Using anti-virus software together with anti-malware and anti-adware programs creates excellent layered security. As the old saying goes, "Never put all of your eggs in one basket.".

Creating stunning documents, spreadsheets and slide-shows with OpenOffice 4

With the cost of Microsoft Office going up, not to mention the subscription / non-subscription thing, it's nice to know there are alternatives out there. One of the best office alternatives has to be OpenOffice. And it just so happens that the Apache Software Foundation recently released a new version of their free productivity software, OpenOffice 4.

The main screen inside of OpenOffice 4
The main screen inside of OpenOffice 4

For those who are not familiar with it, OpenOffice is a suite of office productivity programs that rivals Microsoft Office. It has everything you could need for creating great-looking documents, spreadsheets, and slideshow presentations. Here's a complete list of all of the programs included in OpenOffice 4.

Program Equivalent to Program type
Writer Microsoft Word Word processor
Calc Microsoft Excel Spreadsheet
Impress Microsoft PowerPoint Multi-media slideshow presentation
Draw Microsoft Paint Graphic design
Base Microsoft Access Database
Math Design Science Mathtype Formula creation

OpenOffice 4 has some significant improvements over previous versions. A new Sidebar contains the most commonly used functions for that program, which can be docked, floating, or completely hidden. There is also much improved compatibly with Microsoft Office documents. The drawing, graphics, and gallery functions have also been enhanced, along with the copy & paste and drag & drop functionality.

The new Sidebar inside of OpenOffice 4 shown docked and floating
The new Sidebar inside of OpenOffice 4 shown docked and floating

OpenOffice does use Java, but it's not required for installation, as it can be added later on. Compatibility with other document formats is pretty impressive, but Star Office is no longer supported. OpenOffice can automatically load/convert and convert/save Microsoft Office (Word, Excel, and PowerPoint) and Design Science Mathtype documents. The only file types that it cannot save to is the Microsoft Office 2007 - 2019 .???x formats.

And since OpenOffice is open-source, there are hundreds of third-party extensions to expand on the functionality of the applications. Add in a copy of GIMP or Paint.NET, and you have a complete and free desktop publishing package.

OpenOffice 4 is available for Windows, Linux, and Mac operating systems. For more information on OpenOffice 4, just follow the links below:

Apache OpenOffice Open Source Project

Download OpenOffice 4

How to securely erase all of the data from your Windows based computer

Do you have an old Windows-based computer you would like to get rid of but want to make sure that all of your data is securely erased? Or maybe you would like to wipe all of the data from your hard drive and perform a clean Windows installation? Either way, you'll want to make the data is completely wiped out. Here's how to securely erase all of the data from your Windows-based computer.

Back-up all folder(s) and file(s) you want to save

This is the time to double and triple-check for any folder(s) and file(s) you may want to keep. If you plan on reinstalling Windows, make sure that you have all of the installation media available. If you need to create the recovery media stored on your computer, this is the time to do it. Once the hard drive is wiped clean, the recovery media images will be gone too.

Windows XP Backup

Windows 7 / Windows Vista Backup

Windows 8 Backup

Download and create bootable media with disk wiping software

The best way to completely wipe clean a hard drive is by booting the computer up on a CD/DVD or USB drive. This way, you can erase all of the space on the hard drive. There are several free utilities for doing this, including Darik's Boot And Nuke, CMRR - Secure Erase, and PC Disk Eraser. I recommend the Ultimate Boot CD (UBCD), which has all of these and more already built-in. Just download the image file (.ISO) and use your favorite disk burning software or Windows built-in disk burning to create the bootable media. You can even create a UBCD bootable USB drive.

Encrypt the contents of your hard drive

This step may seem unnecessary, but it makes data recovery virtually impossible on the drive you will wipe. Windows has a feature called Encrypting File System (EFS) built-in, but it's disabled by default. It allows files to be encrypted transparently with a File Encryption Key (FEK). For more on EFS, check out this Wikipedia article. So even if someone could recover the data on the drive after the wiping, it would be in deplorable condition. After that, the data would have to be unencrypted, and being in such a bad condition, would be hard, if not impossible.

  1. Open File Explorer / Windows Explorer (Windows logo key Windows logo key + E).
  2. Select the file(s) and/or folder(s) you want to encrypt.
  3. Right-click on the items selected and then left-click on Properties from the context menu that appears.
  4. On the General tab, left-click on Advanced.
  5. Left-click the check box for Encrypt contents to secure data.
  6. Left-click on OK. Be patient; encrypting the folders and files may take some time.

Insert bootable media and restart the system

When you restart your system, it should boot up on the media you created. Follow the on-screen instructions. If using the UBCD, navigate to HDD > Disk Wiping for the list of utilities. Each program will have similar data destruction settings. I always look for the latest Department of Defense standard (currently DOD 5220.22-M). If you really want to clean your hard drive, just run two or more of the disk wiping programs included on the UBCD.

If your system does not boot up on the media you just created, you may have to change the computer's boot order. Check the 'splash' screen that first appears when you start your computer. Sometimes there is an option for boot device or menu, usually an F key. If not, you will have to change it manually inside the BIOS (Basic Input Output System). The BIOS can generally be accessed by pressing the DEL or F2 key when the 'splash' screen appears. It's always recommended to check your motherboard documentation on which keys are used to access the BIOS and where in the BIOS to change the boot order.

Free computer diagnostics

Repairing a PC can sometimes be expensive, and that is why we offer free basic in-shop diagnostics. Give one of our professional and experienced technicians a call at (602) 795-1111, and let's see what we can do for you.

Check out our reviews

Geeks In Phoenix LLC, BBB Business Review

Customer service is #1

Here at Geeks in Phoenix, we take pride in providing excellent customer service. We aim to give the highest quality of service  from computer repair, virus removal, and data recovery.

Bring your computer to us and save

Repairing a computer can be time-consuming. That is why we base our in-shop service on the time we work on your computer, not the time it takes for your computer to work! From running memory checking software to scanning for viruses, these are processes that can take some time.

Contact us

If you have any questions, please feel free to give us a call at (602) 795-1111  and talk with one of our Geeks. Or you can send us a message from our contact page contact page , and one of our Geeks will get back to you as soon as possible. Or you can stop by and see us. Here are our hours and location.

Like Geeks in Phoenix on Facebook

Follow Geeks in Phoenix on Twitter

Watch Geeks in Phoenix on YouTube