With installation Office preferred use exclusively authorized reliable sources, reduce risk deployment somewhat safe software. Create profile Microsoft , if him not registered . To perform this action specify email address and create password . installation of the software package you can proceed exploit O