Geeks in Phoenix

Geek Blog


Creating panoramic images with Image Composite Editor 2

One of the things I like to do when I go on vacation is taking panoramic photos. Since my camera doesn't take panoramic photos, I have to use software to stitch images together. One of the best image stitchers I have found yet is Image Composite Editor 2 from Microsoft Research Computational Photography Group.

Image Composite Editor 2

Image Composite Editor (ICE) can take photos taken from a single location that overlap and create stunning panoramic images from them. Using techniques from the field of computer vision, ICE scans the images for similarities to each other and then estimates the vantage point for each photo. ICE can even create panoramic images from videos too.

Sample ICE 2 panoramic image without auto complete
Sample ICE 2 panoramic image without autocomplete
Sample ICE 2 panoramic image with auto complete
Sample ICE 2 panoramic image with autocomplete

Microsoft Research Computational Photography Group recently released a new version of ICE. The following is a quote from the ICE website of changes included in ICE 2:

  • Redesigned user interface
    ICE has a new look that makes all the features more understandable and easier to use.
  • Automatic image completion
    ICE can now fill in any missing pixels around the edges of your panorama, making a smooth boundary even in cases where you missed a shot.
  • Improved workflow
    ICE now guides you through the steps required to make a great panorama. And you can back up a step to change settings, then see the effects of those changes without having to start over from scratch.
  • Full-resolution preview
    Panorama previews are no longer limited by your screen resolution. ICE now allows you to zoom in to see every detail of your stitched panorama, no matter how big, before you export.
  • Built-in Photosynth uploader
    ICE no longer requires the installation of a separate application to upload a panorama to the Photosynth web site. You can now upload and share your panorama directly from within ICE.

ICE will work on 32-bit or 64-bit versions of Windows Vista SP2, Windows 7, Windows 8.1, and Windows 10. For more information on Image Composite Editor from Microsoft Research Computational Photography Group, follow the links below:

ICE Homepage
ICE Support Forums

Toughen your computer security with EMET 5.1

Updated January 31, 2021. Microsoft's Enhanced Mitigation Experience Toolkit reached the end of its life on July 31, 2018, and is no longer available for download.

Keeping your computer secure has always been challenging. It seems like every week there is another exploit making the rounds. Nobody can predict what kind of attack hackers will use next. But you can protect your computer from the most common actions and techniques used with the Enhanced Mitigation Experience Toolkit 5.1 (EMET).

The main screen inside of EMET 5.1
The main screen inside of EMET 5.1

What is EMET? It monitors selected programs (Internet Explorer, Microsoft Office programs, etc.) for known attack actions and techniques. When one of the several pseudo mitigation technologies is triggered, EMET can block or even terminate the program in question. It will also validate digitally signed SSL certificates inside of Internet Explorer. Here's is the current list of mitigations EMET currently looks for.

  • Structured Exception Handler Overwrite Protection (SEHOP)
  • Data Execution Prevention (DEP)
  • Heapspray allocation
  • Null page allocation
  • Mandatory Address Space Layout Randomization (ASLR)
  • Export Address Table Access Filtering (EAF)
  • Export Address Table Access Filtering Plus (EAF+)
  • Bottom-up randomization
  • Return Oriented Programming (ROP)
  • Attack Surface Reduction (ASR)

The about screen inside of EMET 5.1
The about screen inside of EMET 5.1

EMET 5.1 includes the following improvements:

  • Attack Surface Reduction (ASR) has been updated to limit the attack surface of applications and reduce attacks.
  • Export Address Table Filtering Plus (EAF+) has been updated to improve and extend the current EAF mitigation.
  • 64-bit ROP mitigations have been improved to anticipate future exploitation techniques.
  • Several security, compatibility and performance improvements.

EMET can also be customized via the registry (see EMET manual for instructions). Here are a few of the items that can be modified:

  • Enable unsafe configurations.
  • Configuring custom message for user reporting.
  • Configuring certificate trust feature for third party browsers.
  • Configuring local telemetry for troubleshooting
  • Configuring EMET Agent icon visibility.

Here's a quote from Microsoft's website:

The Enhanced Mitigation Experience Toolkit (EMET) helps raise the bar against attackers gaining access to computer systems. EMET anticipates the most common actions and techniques adversaries might use in compromising a computer, and helps protect by diverting, terminating, blocking, and invalidating those actions and techniques. EMET helps protect your computer systems even before new and undiscovered threats are formally addressed by security updates and antimalware software. EMET benefits enterprises and all computer users by helping to protect against security threats and breaches that can disrupt businesses and daily lives.

EMET should never monitor anti-malware and intrusion prevention or detection software, debuggers, software that handles digital rights management (DRM) technologies or software that uses anti-debugging, obfuscation, or hooking technologies.

How to safely remove external drives

External storage devices like flash drives or hard drives are so convenient for carrying data between computers. Just plug and play, as they say. But did you know it's not the same for when you unplug your drives? Here's how to safely remove external drives from your Windows computer.

How to safely remove external drives

Recently I was at a customer's location repairing her computer and needed some files from one of my USB flash drives. When I was done, I went through the process of ejecting the USB drive from her computer. She was surprised that I didn't just pull the flash drive out. You can, most of the time, unplug a USB device like a mouse or printer without having to do anything to your Windows-based computer. It's only when you have a storage device, like a flash drive or external hard drive, that you have to take an extra step to remove the device safely.

What is write caching?

By default, Windows enables write caching on storage devices for better performance, whether internal or external. Write caching allows programs to write to the device and continue without waiting for the data to be written. By properly ejecting a storage device, you ensure that the cache is getting written to the device before you disconnect it.

How to safely remove external drives

  1. Left-click on the Safely Remove Hardware icon on the Taskbar.
    Safely Remove Hardware icon on the Windows 8 Taskbar
  2. Left-click on the device you want to disconnect.
    List of removable drives ready to be ejected

or

  1. Open File Explorer (Windows logo key Windows logo key + E).
  2. Under This PC / Computer, right-click the drive you want to disconnect and select Eject.

Windows will display a notification when it's safe to disconnect the drive.

The correct ways to shut down your Windows based computer

Updated March 29, 2023

Doing computer repair, I see a lot of different issues. But there is one problem I see over and over again, start-up corruption. This most commonly occurs when the computer is not turned off properly. And laptops appear to be more prone to this issue than desktops. So here's how to properly shut down your Windows-based computer.

Which power button do you use to shut down your computer?

Logic dictates that if you use a button to turn on a device, you should also use it to turn it off (button on / button off). You use a button to turn your TV, audio/video components, and smartphone on and off. But this is only sometimes the case when it comes to your computer. It is always recommended that you allow the operating system to close down all applications and turn the computer off itself.

Using the Start menu / Start screen to shut down Windows

This may seem like a no-brainer, but you would be amazed at how many people don't use this method. It's mainly laptop users who instinctively close the lid or reach for the power button. But if you don't watch how long you hold the power button down, you could perform a hard shutdown. It's simpler and recommended to use the shut down button on the Start menu / Start screen.

Windows Vista

Shut down button location in Windows Vista
Start button > Power button > Shut down

Windows 7

Shut down button location in Windows 7
Start button > Shut down

Windows 8

Sign out button location in Windows 8
1. Start screen > Sign out
Shut down button location in Windows 8
2. Sign in screen > Power button > Shut down

Windows 8.1

Shut down button location in Windows 8.1
Start screen > Power button > Shut down

Or

Power users shut down button location in Windows 8.1
Power users menu (Windows logo key Windows logo + X) > Shut down or sign out > Shut down

Windows 10

Shut down button location in Windows 10
Start button > Power button > Shut down

Or

Power users shut down button location in Windows 10
Power users menu (Windows logo key Windows logo + X) > Shut down or sign out > Shut down

Windows 11

Shut down button location in Windows 11
Start button > Power button > Shut down

Or

Power users shut down button location in Windows 11
Power users menu (Windows logo key Windows logo + X) > Shut down or sign out > Shut down

Using the power button on the computer to shut down Windows

This method is acceptable for turning off your computer, as it performs the same command as the shut down button on the Start menu / Start screen. But you have to check and ensure that the power options inside the operating system are configured to shut down the system when the power button is pressed.

Power button options inside of Windows 8.1
Power button options inside of Windows 8.1 / Windows 10

The power button can be configured to put the system into sleep or hibernate. And if your system loses power while it's asleep, you will get an error when you restart it. This happens quite often with laptops when they are not using the ac adapter and the battery runs out.

Using the power button on the computer to force it to shut down

How do you turn off your computer when it freezes and has no reset button? This is where the Advanced Configuration and Power Interface (ACPI) specification comes into play. This spec has been built into every computer for well over a decade now. It mandates that when the power button is held down for 10 seconds or longer, the system performs a hard shutdown, turning off power to all components. This will most likely cause an error upon restart.

Strengthen your computer security with EMET 5

Updated January 31, 2021. Microsoft's Enhanced Mitigation Experience Toolkit reached the end of its life on July 31, 2018, and is no longer available for download.

It seems like every day, a new software exploit or vulnerability is found. Software vendors work hard at keeping their software secure, but it can take time to test and deploy patches. So what can you do to protect your computer? The Enhanced Mitigation Experience Toolkit (EMET) from Microsoft does just that.

The main window inside of EMET 5
The main window inside of EMET 5

EMET is designed to prevent attackers from taking control of your system. It works as 'shim' in-between your programs and the operating system. EMET looks for the most common attack techniques and will block and terminate any program it is monitoring. EMET works alongside your favorite anti-virus and anti-malware programs for layered security.

I have been using EMET as part of my layered security for years and have written a few blogs on it. With each version, Microsoft keeps improving it. Some of the improvements in EMET 5 include Attack Surface Reduction (ASR), Export Address Table Filtering Plus (EAF+), and 64-bit ROP mitigations. Here's is the current list of mitigations EMET currently looks for.

  • Structured Exception Handler Overwrite Protection (SEHOP)
  • Data Execution Prevention (DEP)
  • Heapspray allocation
  • Null page allocation
  • Mandatory Address Space Layout Randomization (ASLR)
  • Export Address Table Access Filtering (EAF)
  • Export Address Table Access Filtering Plus (EAF+)
  • Bottom-up randomization
  • Return Oriented Programming (ROP)
  • Attack Surface Reduction (ASR)

There are two (2) different ways to configure EMET, a Graphic User Interface (GUI) and a command-line tool. It is best to configure EMET through the GUI since the command-line tool doesn't allow access to all EMET's features. The built-in configuration wizard will enable you to use either the recommenced settings, keep previous settings (upgrade install), or manually configure EMET (new install).

Easily configure programs to monitor in EMET 5
Easily configure programs to monitor in EMET 5

Once you have EMET installed, it's pretty easy to add programs to monitor. Just open the program you want EMET to watch and then open EMET. On the lower part of the main window, you will see Running Processes. Just find the program you want to monitor in the list, right-click on it, and select Configure Process. You will have to restart any program you have just configured inside of EMET.

Free computer diagnostics

Repairing a PC can sometimes be expensive, and that is why we offer free basic in-shop diagnostics. Give one of our professional and experienced technicians a call at (602) 795-1111, and let's see what we can do for you.

Check out our reviews

Geeks In Phoenix LLC, BBB Business Review

Customer service is #1

Here at Geeks in Phoenix, we take pride in providing excellent customer service. We aim to give the highest quality of service  from computer repair, virus removal, and data recovery.

Bring your computer to us and save

Repairing a computer can be time-consuming. That is why we base our in-shop service on the time we work on your computer, not the time it takes for your computer to work! From running memory checking software to scanning for viruses, these are processes that can take some time.

Contact us

If you have any questions, please feel free to give us a call at (602) 795-1111  and talk with one of our Geeks. Or you can send us a message from our contact page , and one of our Geeks will get back to you as soon as possible. Or you can stop by and see us. Here are our hours and location.

Like Geeks in Phoenix on Facebook

Follow Geeks in Phoenix on Twitter

Watch Geeks in Phoenix on YouTube