Category Archives: Support

windows xp logo

Microsoft Ending Windows XP Support

Microsoft is ending support for Windows XP on April 8, 2014, 12 years after its debut. wants our customers to understand what this means for the security of their computers and their personal information.


What does “end of support” mean?

  1. Microsoft will no longer patch security holes in the Operating System and related programs.
    • This means the security holes in the operating system hackers and criminals use to gain access to your computer will no longer be patched. Leaving your system permanently vulnerable to these exploits.
    • Office 2003 and older will no longer be supported either, again, leaving security holes un-patched.
    • Internet Explorer 8 is the last version of IE that works on XP. It will not be updated either, leaving you vulnerable when surfing the internet.
  2. Many Software and Hardware Vendors will no longer offer support 
    • This means your new phone, camera, printer, or other device likely will not work with your computer.
    • You will not be able to get phone or other support for your devices or software.
    • New versions of your favorite software will not work on your computer.

What it does not mean…

Your PC will continue to work, and you will still be able to access the internet, email, programs and  documents.

Will my Anti-Virus continue to work?

Below is information provided by about popular AV Software vendor support.

Note: Anti virus software is very important, but it will not protect you from all possible exploits.
Back To Top
Anti Virus Support by Vendor

Manufacturer Support Information
Agnitum No end of support announced; support available for at least 2 more years (1)
AVG No end of support announced; support available for at least 2 more years (1)
Avast No end of support announced; support available for at least 2 more years (1)
Avira Support will end on 8th April 2015 – further details…
Bitdefender Support for home-user products available until January 2016; support for corporate products available until January 2017 (2)
Bullguard No end of support announced; support available for at least 2 more years (1)
Check Point / ZoneAlarm No end of support announced; support available for at least 2 more years (1) – further details…
Comodo No end of support announced; support available for at least 2 more years (1)
Emsisoft Support available until at least April 2016 (2)
ESET Support available until at least April 2017 (2)
Fortinet No end of support announced; support available for at least 2 more years (1)
F-Secure No end of support announced; support available for at least 2 more years (1)
G Data Support available until at least April 2016 (2)
Ikarus No end of support announced; support available for at least 2 more years (1)
K7 Computing No end of support announced; support available for at least 2 more years (1)
Kaspersky Lab support will continue at least until 2018 for consumer and at least until 2nd part of 2016 for business products (2)
Kingsoft No end of support announced; support available for at least 2 more years (1)
McAfee No end of support announced; support available for at least 2 more years (1)
Microsoft (Security Essentials) Support will end on 14th July 2015 – further details…
Microworld No end of support announced; support available for at least 2 more years (1)
Norman Support available until at least January 2016 (2)
Panda Security No end of support announced; support available for at least 2 more years (1)
Qihoo 360 Support available until at least January 2018 (2)
Quickheal No end of support announced; support available for at least 2 more years (1)
Sophos Support will continue at least until 30th September 2015 (2) – further details…
Symantec / Norton Products support Windows XP, no end-of-life decision has been made yet
Tencent No end of support announced; support available for at least 2 more years (1)
ThreatTrack / Vipre Support available until at least April 2015 (2)
Trend Micro Support will end on 30th January 2017 – further details…
Webroot Support available until at least April 2019 (2)

Back To Top

What Browsers will be supported?

Some browser makers will continue to support updates for  Windows XP for a period of time. Below is the list of the most current information at the time of writing.

Internet Explorer 11 Not Supported
Internet Explorer 10 Not Supported
Internet Explorer 9 Not Supported
Internet Explorer 8 No Updates or Patches
Google Chrome Supported until April 2015
Firefox No Plans to discontinue support, although Service Pack 3 is required for updates

Back To Top Support Policy for Windows XP will extend Windows XP Support for 90 days, until July 8th, 2014. This includes Office XP, and Office 2003. After that date we will no longer support these products.

The Bottom Line

All major software and hardware vendors, security experts, and Internet Service Providers agree that the machines running Windows XP present a security risk to their owners, and the the internet eco-system as a whole. Therefore, advises that those running Windows XP take the computer offline for use, or replace or upgrade the operating systems on their computers.
Back To Top

MS Front Page

Microsoft Front Page Extensions No Longer Supported

As of February 2014, Webhosting no longer supports Microsoft Front Page Server Extensions.

Why Has support been Discontinued?

Microsoft stopped making new version of Front Page in 2003, this means that they no longer create new versions of the “Server Extensions” that allow the front page program to connect to the web server and allow publishing. The last release of MS Front Page Extensions was in 2002, more than 12 years ago,  the age of the extensions makes it incompatible with newer, more secure versions of the Web Server software. has to consider the security of all its customers, and Front Page Extensions constitute a threat to everyone.

How do I publish my website?

There are many methods available to update your website. The simplest would be to use Front Page with FTP, Instead of Front Page using Front Page Extensions.  Please See this Tutorial on using Front Page with FTP.

(please note: support does not have a copy of MS Front Page, and cannot help set up your software beyond providing you with lost usernames and passwords)

Are there any Alternate Programs I can use?

There are many freee WYSIWYG (what you see is what you get) web page editors available.

Here are a few…

  • Kompozer (Free) - KompoZer is a complete web authoring system that combines web file management and easy-to-use WYSIWYG web page editing.
  • Microsoft Expression Web ($125.00)- This is the replacement for Front Page that MS released.



How to Spot a Phishing Email Scam


Phishing is a form of social engineering scam, in which a spammer sends an email that appears to be from some institution that the user does business with such as a bank or internet service provider, with the intent of getting personal information. They often go to great lengths to give the appearance of legitimacy, including using company logos, and building look alike websites to extract information. Understanding the material in this post, especially the section on links, will allow you to successfully identify phishing attempts in almost all cases.

Many customers with email addresses received just such an email this last week. In this article, I will dissect this Phishing email to help our customers understand how to sniff out these scams. (If you visited the link in this email, or feel your password may have been compromised, please call support at 530-672-1078).

This scam email avoided many of the obvious mistakes scammers make in the Phishing emails they send. We will start with the most important and difficult part of the scam to pull off, the fake website, and the link to it.

1) The Link- This is how the phisher actually gets your information. They send you to a website that they set up, and have you enter your password, credit card number, or whatever they are looking to get. In this email, if you clicked on the link, you were taken to a website at It may not be immediately obvious that this is not the website, after all, it has in it. This is the spammer taking advantage of the fact that people don’t understand how web addresses work.

  We will start with a short explanation of how web addresses are structured.


Subdomains are not always used in a web address, but the domain and toplevel domain have to be there. Now lets examine the address of the scammers website, and see if we can identify the problem.

Now recall that the domain order is level domain

Site Subdomain Domain Top Level Domain
Scam directcon net ms
Real directcon net

As you can see from the table, the top level domain for the scam site is .ms, where the real site’s tld is .net. Because the scammer owns the domain name he can create a dummy site for any website who’s TLD is .net. As another example, lets say that you bank with Wells Fargo, and that their domain name is This same scam could be used for that site.

Site Subdomain Domain Top Level Domain
Scam wellsfargo net ms
Real wellsfargo net

This may seem like incomprehensible technobabble, but understanding this is the most important thing to glean from the article. If you pay attention to the web addresses of important sites, and are able to identify domains, subdomains, and top level domains, then it will be very difficult to trick you into giving up important information to a scam site.

Now a quick look at the domains you might be dealing with.

Site Subdomain Domain Top Level Domain * cal net * directcon net

2) The FROM field: Many spammers will neglect to change the from field in the email to something from the company the are imitating. The example here was done well by the criminal, they faked the from field to make it appear that it comes from support staff.

3) LOGO- Often the logo used in spam emails is a low quality copy, or different from the ones sent in email communications. The one in the example above is a very fuzzy copy from the website.

4) Grammar- Many phishing con artists come from outside the United States, and as a result, there will often be awkwardly worded sentences, or misspellings present in the text.

If ever in doubt about the validity of a communication, please call our support at 530-672-1078 to verify before exposing your account information.


Setting Up Email on Android Phones

This is a step by step tutorial explaining  how to set up your or email account on your Android Device. This setup was tested on a Droid X, and given the wide array of Android Devices, you can expect that your screen will not look exactly the same, but should work in a very similar way.

1) Click on the Apps Menu on the lower right hand corner of the screen.













2) Tap  ”Settings”












3) Tap “Accounts”













4) Tap “Add Account”












5)Enter Your Email Address

5)Enter Your Password

7) Tap “Next”










8) Tap “Set Up Manually”













9) Tap “General Settings”











10) Enter a Name to identify the account to you (Example: “ Email account”)

11) Enter the name you want people to see in the “From” field in the email you send

12) Make Sure Your correct email address is shown in this box

13) Click “OK”







14) Tap “Incoming Server”












15) Choose “POP mail server” from the list

16) If your email address ends in enter

If your email ends with enter

17) This should be your email address

18) This should be the password for your account.

19) Click “Advanced Settings”





20) Port should be “110

21) Use Secure Connection should be unchecked

22) Choose “Auto” or Use Secure Password (TLS)

23) Choose “Password” for Authentication

24) Uncheck Verify Certificate (Choose YES from the pop up box)

25) Tap “OK






26) Tap “Ok”











27) Tap “Outgoing Server











28) If your email address ends with enter, if it ends with  use

29) This should be your email address

30) Password for your email

31) Tap “Advanced Settings







32) Port should be 587

33) Use Secure Connection should be unchecked

34) Choose “Auto” or Use Secure Password (TLS)

35) Choose “Auto” for Authentication

36) Uncheck Verify Certificate (Choose YES from the pop up box)

37) Click “OK





38) Click “OK”











40)  Click OK,  You are now done.




Setting up or email accounts on iPhone

This is a short tutorial showing and email users how to set up their email accounts on the iPhone.

Tap the Settings icon.

Choose “”Add Account”


Select “Other” from the List of account types.

Enter your account information

1) The name you wish others to see in the “From” line in emails you send.

2) Your entire email address (if your email is enter that here)

3) Enter the password for your email account…


Choose “IMAP” from the Options at the top of the screen, and fill in the fields as indicated.


Name: The name you want others to see in emails from you

Address: Your email address

Description: A description of the account (something like My email address)

Incoming Mail Server

Host name:

For email addresses use

For email addresses use

Username: Your email address

Password: the password for the email account

Outgoing Mail Server

Host name:

For email addresses use

For email addresses use

Username: Your email address

Password: The password for your email address

Tap “Save

You will get a screen stating it cannot verify server identity. Click “continue”

It will take a few minutes to verify the account info, and you see the above prompt again, simply hit “Continue”again .


Assuming all your information is correct, you should be ready to go (tested on iPhone 4).

Setting up or email on the iPad

This is a short tutorial showing and email users how to set up email on the iPad

1. If this is the first account you’re setting up on the iPad tap Mail.

Otherwise, from the Home screen tap Settings

Tap “Mail, Contacts, Calendars” then “Add Account


Tap “Add Mail Account

Fill out the “New Account” page as follows…

1) Enter the name you want others to see in the “From” line of the emails you send.

2) Enter your email address ( or

3) Enter the password for this email  account.

4) Enter a short description of the account (My email, or whatever makes sense to you).

Tap the “Next” button.

Fill in the required information on the next page as follows..

5) Item 5 will differ depending on whether your email ends with or Users use for (5) users use for (5)

6) Enter your email address here

7) Enter the password for your email account here.

8) Item 8 will differ depending on whether your email ends with of users use for (8) users use for (8)

9) Enter your email address here

10) Enter the password for your email here.

Hit enter or click “Save” . Your ipad will now try to retrieve other settings from the server.

You will get 2 pop ups during the verification process, click continue for both.

If you get any warning or errors, check the configuration above, and make sure passwords are correct. If all went as planned, you are now ready to send and receive email on your iPad.

Surviving a new computer purchase

As unlikely as it seems, it’s October.   October means that this month and the next, people will be gearing up for Black Friday, or Cyber Monday as deals on new computers, laptops and other electronic upgrades that are released.

What this usually means for is that starting up in November we get calls from customers looking for assistance: Lost files, missing emails, address books etc.  The great feeling of having a new computer has been diminished by the fact that they now can’t find what they are looking for. We have narrowed down these calls to 5 key items; in fact you could say that this is:

Cal. Net’s Top 5 things you need to do to survive your new computer purchase

Export your web browser Favorites and Bookmarks, and other Media

While some computer manufacturers have software with new computers that assist you in transferring your files, it is a good idea to make manual backups just in case.  As you’ve probably spent years gathering your bookmarks or favorites, before you plug in your new computer, make sure to back these up to a thumb drive or external hard drive. This also applies to any music you’ve purchased online or pictures you’ve transferred to your computer from your camera.

Backup your email

As stated above, some computer manufacturers provide you with software designed to provide a seamless move but just in case, most email programs also have a backup feature: Use this to make sure you don’t lose years of important email in the transition to your new PC.

Find the Installation CD’s of programs you’ll need to reinstall

Most computers do not come with Microsoft Office or your favorite games etc pre installed. Also, there is no way for you to transfer the installation of these from your old computer to the new computer, and so you will need to reinstall them. Now is a good time to make a mental checklist of those programs you have on CD and have them ready for install once you have setup your new computer.

Create a list of programs you will need to download

If you use any programs like Mozilla Firefox, iTunes, or any other software you installed that required an internet download you will need to re download these as well. Having this list in hand after you’ve setup your new computer prevents delays in the full use of your new computer.

Don’t forget your Anti Virus Software!

While most computers do not come preloaded with Microsoft Office, some of them are pre loaded with Anti Virus software.  For full protection of your new computer make sure you run your Anti Virus update tool! Your new computer may be a month or two behind on updates and you’ll want to get caught up ASAP. If your computer did not come preloaded with one, it is a good idea to re install your anti-virus software first before transferring over files to prevent any possible infections from the old computer.


In closing, your new computer will be quite an adventure to learn and use, and we hope that our 5 tips can help you alleviate any headaches that may crop up at the start of your journey. 


Tech Support Hours Expanding

Tech Support Hours Expanding!

A few months ago we wrote that we were exploring expanding our support hours to be open 7 days a week. We are proud to announce our new support hours!

You can now reach us:

Monday through Friday: 8:00 AM to 7:00 PM

Saturday: 9:00 AM to 6:00 PM

Sunday: 12:00 PM to 5:00 PM

We would encourage you to reach out to us during these hours to address any service related issues you may be having! You can also reach us by emailing us :

As well as expanded Customer Service hours, we are in the process of adding extensively to our online knowledgebase found at  Do you have a problem that you experience frequently with your email? Is there a setting you’ve been looking for in Internet Explorer? Let us know! Email us at and your question may become a topic for our Frequently Asked Questions page!

Configuring Outlook 2010 for your E-mail Address


These instructions will work for and e-mail addresses. The only difference will be the name of the Incoming and Outgoing servers.

1) Open your Outlook 2010

2) On the top-left menu click on File > Add Account.







3) Select “E-mail Account” and click Next (Some of you may not get this screen; You can skip to next step).

4) Select “Manually configure server settings” and click Next


5) Select “Internet E-mail” and click Next. (Some of you may not get this screen; You can skip to next step)

6) Type your full name and e-mail address. Change “Account Type” to “POP3″, if necessary.
If your e-mail address ends with, enter for both Incoming and Outgoing mail servers.
For addresses, enter for both.
Enter your username and password and then click on the “More Settings …” button on the bottom right.

7) Click on the “Outgoing Server” tab and make sure “My outgoing server (SMTP) requires authentication” is checked. You don’t need to change anything else on this screen.











8) Next you want to click on the “Advanced” tab. Change your incoming server port to 995 and check “This server requires an encrypted connction (SSL)”.
For the Outgoing server, make sure it uses port 587 and TLS for encrypted connection.











9) You may now click OK to go back to the same screen seen in step 6 and click on “Test Account Settings” to make sure all settings are working. Here you may see a screen like the one below. This is a certificate warning that will create the encrypted transfer of data between your computer and the e-mail server. Click “Yes” to accept and you should be good to go!