With installation Office recommended only authorized reliable sources, minimize probability of problems configuring and potentially dangerous applications. Create profile Microsoft , you have more of her not registered . Of this you need name and password . After installation of the program proceed exploit