Geeks in Phoenix

Geek Blog


My favorite left hand Windows keyboard shortcuts

Updated October 16, 2020

One of the most useful items I use daily is keyboard shortcuts. Especially shortcuts that I can perform with just my left hand, allowing me to keep my right hand on the mouse. You can use keyboard shortcuts to open frequently used files, folders, and programs like File Explorer. Windows has a ton of built-in keyboard shortcuts (see links at the bottom of this article), plus you can create your own custom keyboard shortcuts. Here are my favorite left-hand keyboard shortcuts:

Left hand Windows keyboard shortcuts
Press To
Windows logo key + E Open My Computer / File Explorer
Windows logo key + R Open the Run dialog box
Windows logo key + D Display the desktop
Windows logo key + F Search for a file or folder (Windows 7 / 8.1)
Windows logo key + S Search for a file or folder using Cortana (Windows 10)
CTRL + A Select all
CTRL + X Cut
CTRL + C Copy
CTRL+ V Paste
CTRL + ALT + (KEY) Custom keyboard shortcut (see below)

create your own Windows keyboard shortcuts

You can create keyboard shortcuts that use CTRL + ALT + (your choice of a key) for frequently used files, folders, and programs. You will need to have a shortcut to the file, folder, or program you want to open first. You can use an existing shortcut (on your desktop or the Start menu) or create a new one. Once you have a shortcut:

  1. Right-click on the shortcut
  2. From the context menu, click Properties
  3. On the Properties box, select the Shortcut tab
    The shortcut key box inside of a Windows shortcut
  4. Click inside the Shortcut key box and press the key in which you want to combine with CTRL + ALT

Note:
You can not use the following keys for keyboard shortcuts: ESC, ENTER, TAB, SPACEBAR, PRINT SCREEN, SHIFT, or BACKSPACE.

For more information on Windows keyboard shortcuts, follow the links below:

Windows logo key keyboard shortcuts

General keyboard shortcuts

Natural keyboard shortcuts

Dialog box keyboard shortcuts

Accessibility keyboard shortcuts

Windows Explorer keyboard shortcuts

Windows 10 keyboard shortcuts

Stitching panoramic images for the web with Microsoft Research HD View

A while back. I wrote an article about creating panoramic images with Microsoft Image Composite Editor (ICE) and Photosynth. With ICE and Photosynth, you can create panoramic images and then upload them to the Photosynth website. But what if you wanted to upload them to your website? That's where HD View comes into the picture.

Microsoft HD View is a new viewer to display large images (gigapixels) across the internet. It allows you to create panoramic images for web pages that do not take a lot of bandwidth. When someone views the image, they are only downloading what is required for that view. It is only when they pan or zoom that more of the image is downloaded. HD View / Deep Zoom is now included in ICE, also as a stand-alone command-line utility, and (here's the best), a Photoshop plug-in.

HD View / Deep Zoom export in Microsoft Image Composite Editor
HD View / Deep Zoom export in Microsoft Image Composite Editor

HD View / Deep Zoom export in Photoshop plug-in
HD View / Deep Zoom export in Photoshop plug-in

So if you're a Photoshop user, you can now export those panoramic images that Photoshop can create directly to HD View / Deep Zoom format. The Photoshop plug-in is available in both 32-bit and 64-bit. Here's a quote from the HD View website:

About HD View
HD View is a new viewer developed by Microsoft Research's Interactive Visual Media group to aid in the display and interaction with very large images. The HDView development team included Johannes Kopf, Matt Uyttendaele, Howard Good, and Michael Cohen along with Jonathan Fay of the Next Media group.

Recent advances in camera and sensor technology and software for stitching images together has led to the creation of images containing billions of pixels (gigapixels). These images are often panoramic, that is, they cover very wide fields of view. Since monitors typically contain only one to two million pixels, it is only possible to actually see 1/1000th of such image data at once. Also, viewing very wide fields of view require unwrapping of an image projected onto a curved surface (think of a map of the world) which can cause distortions.

HD View leverages current graphics hardware to allow smooth panning and zooming as well as the viewing transformation described below.

HD View was developed with a number of goals in mind. It should:

  • allow smooth panning and zooming on large images,
  • only download enough data to create the current view (and possibly look ahead to the next), and
  • always display the current field of view with an appropriate projection. This means that when zoomed way in you should be presented with a standard perspective projection providing a sense of immersion, and when zoomed out you experience a curved projection so that get a full overview of the scene. In between the projection should smoothly transition.
  • Finally, it should be easy to create your own HD View content and present it to the world via the web.

The HD View plug-in currently supports all major browsers on the Windows platform. The first time that you visit a page with HD View content you will be prompted to install the HD View plug-in.

For more information on HD View / Deep Zoom, follow the links below:

Microsoft Deep Zoom

HD View Utilities (32 bit)

HD View Utilities (64 bit)

Harden / Mitigate the security of your Windows programs with Microsoft EMET

Updated January 31, 2021. Microsoft's Enhanced Mitigation Experience Toolkit reached the end of its life on July 31, 2018, and is no longer available for download.

Enhanced Mitigation Experience Toolkit 5.5

Let's face it, some of the software we use on a daily basis has become subject to security vulnerabilities and exploits. Software manufacturers do their best to develop and test fixes / patches as fast as possible, but this can take time. A lot of users just cannot keep up with all of the updates and hotfixes. A few years ago Microsoft released the Enhanced Mitigation Experience Toolkit (EMET) to deal with just this issue.

View of the main screen inside EMET 5.5
View of the main screen inside EMET 5.5

So what is EMET? EMET monitors selected programs (Internet Explorer, Microsoft Office, etc.) for known attack actions and techniques. When one of the several pseudo mitigation technologies is triggered, EMET will either block the programs' access to the resource it is trying to reach or just terminate it. EMET expands on the technologies that Microsoft implemented with Data Execution Prevention (DEP), which has been included in the Windows operating system since Windows XP SP2. It will also validate digitally signed SSL certificates inside of Internet Explorer.

View of the application configuration screen inside EMET 5.5
View of the application configuration screen inside EMET 5.5

So how does EMET work? EMET acts as a shim between the program being monitored and the operating system. The monitored program thinks it's talking directly to the operating system, but it's actually talking to it through EMET. EMET comes with predefined profiles for some of the more common programs like Microsoft Office, Internet Explorer, Adobe Acrobat and Java. You can also add to the predefined profiles or create your own. I recommend that you monitor any program that can open files on or from the Internet.

What security exploits are currently covered

Here's is the current list of mitigations EMET 5.5 currently looks for.

  • Attack Surface Reduction (ASR) Mitigation
  • Export Address Table Filtering (EAF+) Security Mitigation
  • Data Execution Prevention (DEP) Security Mitigation
  • Structured Execution Handling Overwrite Protection (SEHOP) Security Mitigation
  • NullPage Security Mitigation
  • Heapspray Allocation Security Mitigation
  • Export Address Table Filtering (EAF) Security Mitigation
  • Mandatory Address Space Layout Randomization (ASLR) Security Mitigation
  • Load Library Check - Return Oriented Programming (ROP) Security Mitigation
  • Memory Protection Check - Return Oriented Programming (ROP) Security Mitigation
  • Caller Checks - Return Oriented Programming (ROP) Security Mitigation
  • Simulate Execution Flow - Return Oriented Programming (ROP) Security Mitigation
  • Stack Pivot - Return Oriented Programming (ROP) Security Mitigation
  • Windows 10 untrusted fonts

What programs should you harden / mitigate

You only want to harden / mitigate certain programs that are targeted on a regular basis. Web browsers like Chrome, Firefox and Internet Explorer, production / office programs like Microsoft Word, Excel and PowerPoint, e-mail clients like Outlook and Windows Live Mail are some of the few. I recommend that you harden any program that can open files on or from the Internet.

What programs should you not harden / mitigate

You should never configure EMET to monitor anti-virus, anti-malware, intrusion prevention / detection software, debuggers, software that handles Digital Rights Management (DRM) technologies or software that uses anti-debugging, obfuscation, or hooking technologies.

Installation notes

New installation: Just download EMET and install

Upgrade install: Since the registry keys for EMET changed with this version, you can either export your existing EMET settings using the method in the 'What's new' section below, download the converter or reconfigure all of the program settings. With the drastic change with the EMET data format inside of the registry, I think that it would be just easier to reconfigure EMET then try the export / import method. Either way, remember to uninstall any older version of EMET and restart your computer before you install this version.

What's new in EMET 5.5?

  • Full-featured GPO management, compatible with reporting and compliance requirements
  • Command line: new syntax and options
  • Implementation of certificate pinning now based on root CA thumbprints. Exceptions logic removed.
  • Export and Import now memorize path
  • EMET registry has been refactored. To convert settings from previous versions of EMET (including EMET 5.5 Beta), registry values must be saved in a file then imported back with the use of the converter PowerShell script after EMET 5.5 is installed. Here are the steps to follow:
  1. Export settings. With elevated PowerShell, run the following command:
    .\Migrate-EmetSettings.ps1 -RegFile .\NewEmetSettings.reg -MissingCertCsv .\MissingCerts.csv PowerShell script Migrate-EmetSettings.ps1 is provided with EMET 5.5 RTM. It includes documentation about its usage.
  2. Uninstall former version of EMET.
  3. Install EMET 5.5 RTM. When asked to choose between Use recommended settings and Configure manually later, chose option Configure manually later.
  4. Import settings. With elevated PowerShell, run the following command:
    reg.exe import .\NewEmetSettings.reg

Supported Operating Systems

Windows 10 , Windows 7, Windows 8.1, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2, Windows Vista

  • EMET 5.5 requires .NET Framework 4.5.
  • For Internet Explorer 10 on Windows 8 you need to install KB2790907 - a mandatory Application Compatibility update that has been released on March 12th, 2013 or any other Application Compatibility updates for Windows 8 after that

My five favorite Windows tips for maintaining your computer

Updated October 14, 2020

In this article, I am going to share my five favorite tips for maintaining Microsoft Windows.

  1. Checkdisk. This is the first thing I do when I get a system here in the shop. Errors do occur, and files do get damaged. Best to take care of this first thing. And yes, this can take a while, so I always recommend leaving your system on and let Checkdisk run overnight. That way, your computer is ready to go first thing in the morning.

    For more information on how to perform a Checkdisk, select your operating system below:

    Windows 10 Checkdisk

    Windows 8.1 Checkdisk

    Windows 7 / Windows Vista Checkdisk

    Windows XP Checkdisk

  2. Delete Temporary files. This is the first place to look when you need to free up some hard disk space. These files served their purpose at one time, but the program that used them did not delete them for some unknown reason. When deleting temporary files, some may still be in use. I recommend deleting all files/folders that are over a week old. See below for the location of the temporary files folder on your version of Windows:

    Windows Vista / 7 / 8.1 / 10 - C:\Users\username\AppData\Local\Temp
    Windows XP - C:\Documents and Settings\username\Local Settings\Temp

  3. Delete the Internet Explorer cache. This is the second place to look when you need to free up some hard disk space. I have seen systems with over 9 Gb of temporary files. Open Internet Explorer and go to Tools > Internet Options and change the following settings:

    Internet Explorer Temporary Files
    Internet Explorer Temporary Files

  4. Pagefile optimization. This one often gets overlooked. There is a formula for calculating the correct pagefile size. Minimum pagefile size is one and a half (1.5) x amount of memory. Maximum pagefile size is three (3) x minimum pagefile size. Say you have 4 Gb (4,096 Mb) of memory. 1.5 x 4,096 = 6,144 Mb would be the min. pagefile size and 3 x 6,144 = 18,432 Mb would be the max. pagefile size.

    Windows Pagefile Settings

    To change the pagefile size, you need to access the System Properties dialog box. Press Windows logo key + Pause (Windows Vista / 7 / 8.1 / 10 users select 'Advanced' system settings). Then select the 'Advanced' tab and under 'Performance' click on Settings. Then select the 'Advanced' tab and under 'Virtual memory' click on Change.

    For more information on how to change the pagefile size, select your operating system below:

    Windows 10 Pagefile Settings

    Windows 8.1 Pagefile Settings

    Windows 7 Pagefile Settings

    Windows Vista Pagefile Settings

    Windows XP Pagefile Settings

  5. Disk Defragmenter. Probably the best single thing you can do to speed up your computer. Imagine a filing cabinet where all of the folders were out of order, and files were misplaced throughout the cabinet. How could you find anything? Same thing with your hard drive. Disk Defragmenter takes care of that for you. And you can run it as a scheduled task too.

    For more information on how to use Disk Defragmenter, select your operating system below:

    Windows 10 Disk Defragmenter

    Windows 8.1 Disk Defragmenter

    Windows 7 Disk Defragmenter

    Windows Vista Disk Defragmenter

    Windows XP Disk Defragmenter

Use DejaOffice to sync Outlook with your Android

In my recent change to the Google Android from a Palm, I required two main functions. The second one was to be able to synchronize my Android to Microsoft Outlook. I have been using Outlook as a PIM (Personal Information Manager) for years now, as it's the 'de facto' standard in the corporate world. I was pleasantly surprised to find DejaOffice by CompanionLink.

Being on the Palm platform for years, I became kind of pampered when synchronizing data with Outlook. This really was one of Palm Pilot's strong points. So when I found DejaOffice, it was just the perfect replacement for the conduits from Palm. With the ability to sync Contacts, Tasks, Calendar, and Notes, this is a 'must-have' if you use Outlook. Here's a quote from their site:

Data from the PC sync to DejaOffice, a mobile office application suite for Android. DejaOffice features robust contacts, calendar, tasks, and notes apps that provide enhanced functionality over the native Android applications. Contacts and calendar automatically sync with the native Android databases to allow for full functionality with other apps.

I highly recommend you give this program a try. It's available from the Android page at CompanionLink.

Free computer diagnostics

Repairing a PC can sometimes be expensive, and that is why we offer free basic in-shop diagnostics. Give one of our professional and experienced technicians a call at (602) 795-1111, and let's see what we can do for you.

Check out our reviews

Geeks In Phoenix LLC, BBB Business Review

Customer service is #1

Here at Geeks in Phoenix, we take pride in providing excellent customer service. We aim to give the highest quality of service  from computer repair, virus removal, and data recovery.

Bring your computer to us and save

Repairing a computer can be time-consuming. That is why we base our in-shop service on the time we work on your computer, not the time it takes for your computer to work! From running memory checking software to scanning for viruses, these are processes that can take some time.

Contact us

If you have any questions, please feel free to give us a call at (602) 795-1111  and talk with one of our Geeks. Or you can send us a message from our contact page contact page , and one of our Geeks will get back to you as soon as possible. Or you can stop by and see us. Here are our hours and location.

Like Geeks in Phoenix on Facebook

Follow Geeks in Phoenix on Twitter

Watch Geeks in Phoenix on YouTube