RSS feed for this section

Archive | Knowledgebase

Phishing Attack Prevention: How to Identify & Avoid Phishing Scams in Office 365 Email

If you rely heavily on e-mail you will have to know the basics of phishing attack prevention.  Even if a message appears to come from someone you know, spoofing a senders address in an email allows hackers to gain your trust.  If you treat that email as a request from a reputable source you are more likely to click on an embedded link that takes you to a fake website that requests things like your username and password or other sensitive information.  A file attached to an e-mail message phishing scam could contain a virus.  NEVER open these or allow them to run on your computer!

Here is a little video I put together so when in doubt you can use this test.


If you are unsure, be sure to contact the sender by some other means to gain added assurance that the attachment is valid.  Also, NEVER reveal usernames or password or any personal or financial information in a response to an e-mail request, no matter who appears to have sent it; your office may be the target of a phishing scam.


Office 365: Co-Authoring/Collaborating on Documents using Word, Excel or PowerPoint online

Small businesses owners and employees are experiencing a new reality such that collaboration doesn’t always occur face to face.  Sharing ideas and data in real time can be challenging, especially when different people in different physical locations needing to work together. Office 365 brings us real-time co-authoring, that allows for multiple people to make changes to the same document at the same time.  You will also see other’s changes as soon as they are made.  You can use this feature on Word, Excel, PowerPoint online, the desktop apps of Word, Excel, PowerPoint 2016 with Office 365 and even Word , Excel, PowerPoint for Android and iOS. Collaborators can now work together to amend and finalize documents in real time.  This revolutionary new feature is a hidden gem!

Setting up real-time co-authoring in Microsoft Word Online for Office 365

Here is a little how-to on using real-time co-authoring with the online version of Microsoft Word

  1. Go to, Sign in and open your document with Microsoft word online.  On the top right you will see a Share button, click on it.

    Office365 Co-Authoring documents in word


  2. The share screen will appear as seen in the image below.  Make sure you see “Recipients can edit” so that recipients have access and can edit the document.  Enter the Recipients Email Address in the text box and click Share.  You can also add extra notes that will also be sent to the recipients email.

    Office365 Co-Authoring feature sharing invitation


  3. Once you press the “Share” button, a link will be sent to the person you wish to collaborate with on this document, and once they click the link they can immediately start editing the document.  If you and your collaborators are editing the document at the same time you will see a marker representing each collaborator.

    Office 365 Co-Authoring with word online.


This level of collaboration saves you and your colleagues from relaying document changes back and forth.  You and your colleagues can also work together on Excel Spreadsheets with Excel Online and work together on PowerPoint Presentations with PowerPoint Online.

Why do I need Office 365 for my business?

What is Microsoft Office 365?  Is it just a subscription-based cloud software system developed by Microsoft in 2011 to make more money from consumers?  No, Microsoft Office 365 much more.  It is powerful software that over 60 million commercial customers depend on.  With 50,000 small business customers migrating to Office 365 each month this is a product you just can’t ignore!  It includes various apps like Word, Power point, Excel, Outlook, OneDrive, etc. There are so many apps for business purposes that I won’t be able to cover all of them here.  But I will say Office 365 enhances your businesses productivity by providing these cloud based services to a wide variety of platforms like the web (Internet Explorer, Edge, Google Chrome, Firefox etc.), Apple and Android devices, Windows desktops and lot more. Office365 offers great ways to edit and modify documents, spreadsheets, presentations, etc locally or through an internet connection. These documents can be saved online by using OneDrive (Microsoft’s cloud service which provides 1TB of Cloud Storage) and can be accessed from anywhere you have a supported device and an active internet connection. Office365 web-based email with a familiar Outlook web app also comes with your subscription and provides anywhere access to email, contacts, tasks, and calendaring services using a supported web browser and internet access.

Getting Office 365 for Your Business

As an Office 365 partner, we’re authorized to sell a variety of small and mid-sized business (SMB) Office 365 subscriptions. We can offer Kiosk and stand-alone services as well. Customers can combine plans, add stand-alone services, and move between plans and services.  There are three kinds of business subscription one is “Business Essential” plan ($60.00/user) per year, second is “Business” plan based on annual subscription ($99.00/user) and the third is “Business Premium” ($150.00/user).  These are the subscription packages we recommend for most small businesses with 1 – 300 users within their organization.

How to sign up for Office 365 Business

  1. First visit our Office 365 page on our website.  Further information on the products, including details and included apps are listed here.Office 365 Boot Networks website signup plans
  2. Now choose a plan, on the next page you will see the details of your plan and sub-total.  Also, there will be a “delegated administrator” and select yes.  Selecting “Yes” simply means that you want to allow Boot Networks to assist with the setup and configuration of your Office 365 products.  Click on “next” to continue.Office 365 web sign-up partner delegation
  3. Now, fill in the details of your organization in form given and then create a user account to sign in as an admin.  This account will be the delegated global administrator for the account.Office 365 web sign-up-partner page
  4. Then select how you want to pay, monthly or annually depending upon your needs, using a credit card.Office 365 web sign-up-payment page
  5. After your payment has processed, log into with the username and password you created.  You’ll probably want to install the Office 365 desktop app included in your subscription.  To do this click on “Install Office 365” which will allow you to install all the office products included in your subscription on your computer or laptop.Office 365 website home screen

If you have any questions don’t hesitate to contact us and we will be happy to help!


Microsoft Outlook Tips and Tricks for Better Email Productivity

With many of us now receiving over 50-100+ emails per day a cluttered inbox can become a real problem real fast.  Relying only on the Search feature isn’t always the best way to being productive in email.

Flagging email messages For Follow Up

Flags make it easier to find and track email messages in Outlook. You can flag messages for yourself, as visual reminders to take action later. You can also flag messages that you send to other people, to direct their attention or track their responses.  Lets take a look at a simple way you can use this feature to your advantage and make you more focused on your most important clients and emails.

I find that many users are missing the For Follow Up search folder in OutlookThis little trick helps you easily locate items you have flagged for follow up.

  1. Open Outlook
  2. On the Folder tab, in the New group, click New Search Folder.Office365-Outlook-New-Search-Folder
  3. In the New Search Folder dialog box, under Reading Mail, select Mail flagged for follow up, select the account you want this to apply to and then click OK.Office365-Outlook-New-Search-Folder-Dialog-Box
  4. Now in the Folder Pane on the left find the new folder For Follow Up
  5. Right click on the For Follow Up folder and left click on Add to Favorites
  6. Now you can left click on the For Follow Up folder in the Folder Pane and see all your Followup Flagged Emails.


Uploading files to a secure FTP server (sFTP)

 Upload Files to Secure FTP Server (sFTP)

This guide contains a simplified description of uploading files to a sFTP server with WinSCP.
Before starting you should:

Have WinSCP or similar FTP client installed;

Connect to your account on FTP server.

Once you are connected to your account of FTP/SFTP server, you will see content of default remote directory (typically a home directory of your account) on remote file panel.

If you want to upload the files to different directory, navigate there first.

Now you can simply drag the local files and drop them on remote file panel. By default transfer settings dialog will appear. Typically you do not want to change any settings, so just press Copy.

Uploading will proceed. Once it finishes, you will see uploaded file in remote file panel.




In today’s digital world, it’s imperative to constantly set unique, and complex passwords for every website that requires a login. Setting the password is the easy part, remembering them is the hard part!

Lucky for you there is an APP for that. The premium password manager, LastPass. Create a LastPass account where you can store all of your passwords, automatically retrieve them, and improve your security. See what we mean and try it out for 1 month FREE!

Passwords Manager Software Application LastPass


  • Store Your Password in a Secure Vault
    All of your passwords and notes are stored safely in a vault. Easy-to-use, searchable, and organized the way you like.
  • Auto Fill every Password
    Save passwords as you browse, and LastPass will autofill the login for you next time you sign into that account.
  • One Account or Many
    Have multiple email accounts? Save unlimited logins for websites, and easily switch between them.
  • Convenient Access
    Get started on any device, free. Your LastPass vault is backed up and synced automatically where you need it.


LastPass has the tools to help you follow best security practices, with a unique, strong password for every account.


LastPass does more than remember your passwords. Keep track of other important information & simplify your online life.

lastpass secure notes

  • Keep Digital Records with Secure Notes
    Store insurance cards, memberships, prescriptions, WiFi logins and more, so your information is backed up and encrypted.
  • Profiles for Online Shopping
    Create a profile for every credit card and address, so making a purchase is just a few clicks – no typing required.
  • Share Passwords, Securely
    Pay bills with a spouse? Send encrypted passwords to others, easily sync changes & remove access when they’re done.


Your passwords are always there, with extensions for Firefox, Chrome, Safari, IE and Opera, on every major platform.



Click Here For Your Free Trial



Apple TV port forwarding settings on router

Apple TV port forwarding settings on router

For a Linksys/Cisco router:

Click on “Applications and Gaming” tab
Select “Port Range Forward”
Enter 3689 in Start and End (External -Internal) also try instead UDP port 5353
Protocol should be both
IP Address should be AppTV
Save Settings and reboot

Outlook 2010 vcard multiple import script

Sub OpenSaveVCard()

Dim objWSHShell As IWshRuntimeLibrary.IWshShell
Dim objOL As Outlook.Application
Dim colInsp As Outlook.Inspectors
Dim strVCName As String
Dim fso As Scripting.FileSystemObject
Dim fsDir As Scripting.Folder
Dim fsFile As Scripting.File
Dim vCounter As Integer

Set fso = New Scripting.FileSystemObject
Set fsDir = fso.GetFolder(“C:\VCARDS”)

For Each fsFile In fsDir.Files

strVCName = “C:\VCARDS\” & fsFile.Name
Set objOL = CreateObject(“Outlook.Application”)
Set colInsp = objOL.Inspectors
If colInsp.Count = 0 Then
Set objWSHShell = CreateObject(“WScript.Shell”)
objWSHShell.Run strVCName
Set colInsp = objOL.Inspectors
If Err = 0 Then
Do Until colInsp.Count = 1
colInsp.Item(1).Close olDiscard
Set colInsp = Nothing
Set objOL = Nothing
Set objWSHShell = Nothing
End If
End If


End Sub

How do I uninstall Droping Savings?

If you installed the Chrome Extension (CRX):

Step 1: Open Chrome, click on the Settings icon, and navigate to Tools -> Extensions.

Step 2: Select the DropinSavings plugin from the list of extensions, and click Uninstall.

** That’s it, DropinSavings plug-in is now uninstalled!

If you installed the Firefox Addon (XPI):

Step 1: Open Firefox, and navigate to Tools -> Add-ons.

Step 2: Select the DropinSavings plugin from the list of add-ons, and click Uninstall.

** That’s it, DropinSavings plug-in is now uninstalled!

If you installed the plugin for other browsers:

Step 1: Click Start, and navigate to: Control Panel.

Step 2: Select “Add/Remove Programs” from the Control Panel. For Windows Vista/7 users, this will be called “Programs/Features”.

Step 3: Select the DropinSavings plugin from the list of software, and click Uninstall/Remove.

** That’s it, DropinSavings plug-in is now uninstalled!


How do I uninstall Drop Down Deals?

If there’s a single piece of functionality you no longer want, but still want to use others, consider disabling the specific Layers App individually.

Uninstall from Internet Explorer, Firefox or Google Chrome (PC): Go to the Windows Start Menu and then to Control Panel > Add/Remove(“Programs & Features” in Vista/Windows 7) and click “Remove” next to ‘Yontoo Layers’.

Uninstall from Firefox or Google Chrome (Mac): In the top menu, go to Tools > Add-ons. Select the Yontoo Layers logo and then click Uninstall. Note: You cannot uninstall from PC with these steps, see instructions above for PC.



DNSChanger removal instructions

 Is my computer Infected with DNSChanger?

The best way to determine if your computer or SOHO router has been affected by DNSChanger is to have them evaluated by the Boot Networks computer professionals.  

To determine if a computer is using rogue DNS servers, it is necessary to check the DNS server settings on the computer. If the computer is connected to a wireless access point or router, the settings on those devices should be checked as well.

Checking the Computer:

If you are using a Windows computer:

Open a command prompt.

This can be done by selecting Run from the Start Menu and entering cmd.exe or starting the command prompt application, typically located in the Accessories folder within Programs on your Start Menu.

At the command prompt, enter:

ipconfig /all

Look for the entry that reads “DNS Servers……….”

The numbers on this line and the line(s) below it are the IP addresses for your DNS servers. These numbers are in the format of nnn.nnn.nnn.nnn, where nnn is a number in the range of 0 to 255. Make note of the IP addresses for the DNS servers and compare them to the table of known rogue DNS servers listed later in this document. If the IP addresses of your DNS server appear in the table below, then the computer is using rogue DNS.

You can also look for your DNS servers without using the command prompt.

For windows XP machines, click on Start and select My Network Places. Then select Network Connections. In this example, the wireless connection is used.

Click on the connection that is active. This will bring up the Network Connection Status screen. Click on Support and then Details. Check for the values that correspond to the DNS servers.

If you are using an Apple computer, click on the Apple in the top left corner and choose System Preferences. Then, from the Apple System Preferences window, choose Network.

The Apple Network pane will show a number of possible connections on the left side. Choose the one that is active for you and click on the advanced button in the right lower corner. Then choose DNS from the options to show the DNS servers you are using.

Compare whether your computer has DNS servers listed in the number ranges listed below.

Rogue DNS Servers through

To make the comparison between the computer’s DNS servers and this table easier, start by comparing the first number before the first dot. For example, if your DNS servers do not start with 85, 67, 93, 77, 213, or 64, you can move on to the next step. If your servers start with any of those numbers, continue the comparison. through through through through through

If your computer is configured to use one or more of the rogue DNS servers, it may be infected with DNSChanger malware.

Home computers with high-speed Internet connections and office computers typically obtain their IP settings via DHCP from a device on the network. In these cases, the computers are provided with an IP address, default gateway, and DNS server settings. The IP addresses usually fall into one of three ranges of private addresses— to; to; and to In most homes, computers are assigned an IP address in the range to, and the default gateway and DNS servers are set to To determine if your computer is utilizing the rogue DNS servers, read the next section, Checking the Router.

If you are unable to locate your DNS server settings, obtain assistance from Boot Networks or a trusted professional.

Checking the Router

Small office/home office routers connect your network of computers and devices to your Internet service provider. The SOHO router may have been purchased and installed by you or installed by your ISP. Linksys, D-Link, Netgear, and Cisco are common SOHO router brands, but there are many others.

The DNSChanger malware is capable of changing the DNS server settings within SOHO routers that have the default username and password provided by the manufacturer. If you did not change the default password at the time the SOHO router was installed, you must check the SOHO router settings.

The procedure to access your SOHO router setting varies by manufacturer, so consult your product documentation. Once you have access to the SOHO router configuration, compare the DNS servers listed to those in the rogue DNS servers table above. If your SOHO router is configured to use one or more of the rogue DNS servers, a computer on your network may be infected with DNSChanger malware.

What Should I Do?

In addition to directing your computer to utilize rogue DNS servers, the DNSChanger malware may have prevented your computer from obtaining operating system and anti-malware updates, both critical to protecting your computer from online threats. This behavior increases the likelihood of your computer being infected by additional malware. The criminals who conspired to infect computers with this malware utilized various methods to spread the infections.

Individuals who do not have a recent back-up of their important documents, photos, music, and other files should complete a back-up before attempting to clean the malware or utilize the restore procedures that may have been packaged with your computer.

What Does DNSChanger Do to My Computer?

DNSChanger malware causes a computer to use rogue DNS servers in one of two ways. First, it changes the computer’s DNS server settings to replace the ISP’s good DNS servers with rogue DNS servers operated by the criminal. Second, it attempts to access devices on the victim’s small office/home office (SOHO) network that run a dynamic host configuration protocol (DHCP) server (eg. a router or home gateway). The malware attempts to access these devices using common default usernames and passwords and, if successful, changes the DNS servers these devices use from the ISP’s good DNS servers to rogue DNS servers operated by the criminals. This is a change that may impact all computers on the SOHO network, even if those computers are not infected with the malware.

Subnet Masks and Subnets

Subnet Masks and Subnets:

notation resulting subnet
netmask shorthand number of addresses /24 [8-bit] 28 = 256 = 254 hosts + 1 bcast + 1 net base /25 [7-bit] 27 = 128 = 126 hosts + 1 bcast + 1 net base /26 [6-bit] 26 = 64 = 62 hosts + 1 bcast + 1 net base /27 [5-bit] 25 = 32 = 30 hosts + 1 bcast + 1 net base /28 [4-bit] 24 = 16 = 14 hosts + 1 bcast + 1 net base /29 [3-bit] 23 = 8 = 6 hosts + 1 bcast + 1 net base /30 [2-bit] 22 = 4 = 2 hosts + 1 bcast + 1 net base /31 [1-bit] 21 = Invalid (no possible hosts) /32 [0-bit] 20 = 1 Host Route

Email Signature in Outlook 2003


Create an Email Signature in Outlook 2003


To set up an email signature in Outlook:


  1. Select Tools | Options… from the menu in Outlook
  2. Go to the Mail Format tab
  3. Click Signatures… under Signatures
  4. Click New or select an existing one

Security Advisory: Fake DHL Emails Distribute New Trojan

A potential threat to email users in the form of a new spam campaign that masquerades as a shipping notification from DHL. Currently, none of the major anti-virus providers are capable of catching and quarantining this message. As such, this scam has the potential to be successful and can have serious consequences. We have manually updated our virus definitions to stop future incoming messages and are working with our providers to ensure protection against this virus.

We recommend that you take the following action: • Notify all your email users about this threat • Caution your users not to open any attachments from DHL or any unknown sender • Be aware that this is a rapidly-changing virus. Even if your anti-virus provider lists it as covered, you may still be at risk.

More information about this threat: The messages have their “From” field spoofed to appear as originating from an DHL email address. The subject is “DHL Tracking Number ########” (where # stands for a random letter or digit) and unlike most spam, the content of these emails is relatively well-spelled. The message, signed by DHL Delivery Services, reads: “Hello! The courier company was not able to deliver your parcel by your address. You may pickup the parcel at our post office personally. The shipping label is attached to this email. Please print this label to get this package at our post office. The attached archives are called and contain a trojan installer. “The file in the ZIP archive uses a double file extension in the form of DHL_INVOICE_23.xls______________<plenty of underscores>______.exe,” the Avira researchers explain. This naming scheme as well as the file Excel document icon, have the purpose of deceiving the users into believing that they are actually opening a document. The series of underscores pushes the .exe extension out of the view when the archive file is opened in an unpacking program. At the same time the .exe part will not be visible in Windows Explorer either, since file extensions are hidden by default.

Solution: wv4_disp.dll blue screen error problem

wv4_disp.dll blue screen error problem solution

Nvidia Video card fan had failed.  Replaced video card and problem was solved.