A blog for Website Managers ...

Why emailing your customers is important

When Jim Koch started Samuel Adams Brewing Company in the 1980s, everyone said he was crazy. Today, he is a billionaire who speaks about the importance of communicating with customers in ways that other businesses are failing.

"It was a long, slow process for the education of a consumer," Koch says. "Beer was sold on the advertising and the marketing of a brand, not the ingredients, brewing process, and the passion of a brewer."

Why emailing your customers is importantMarketing has changed significantly with widespread adoption of email and social media, not to mention the way customers expect to be educated on a business. The story, ideals and values of your business should be told by emailing your customers, mailing your customers, posting...

How Plumbing Business Software Works

Richard Kirby succinctly names the three biggest challenges for a small business: people, finances, and time. A good business software solution tracks the performance of each plumber while helping to address their shortcomings. Second, financial reporting, billing and payroll features are central to any business operation. Last (but certainly not least) is finding the time to administer the business, delegate responsibility and hold yourself and others accountable. Richard-Kirby-philsophy Plumbers don't miss their appointments and customer service is first class when an all-in-one plumbing business software runs on your desktop or cloud service. With the Thoughtful Systems Plumbing Business Software desktop or cloud service, managers can set automatic reminders for employees to purchase parts for certain customers or remind them of appointments. Task are...

Janitorial Business Software For You

Many of today’s most successfully businessmen got their start in the janitorial business, including Stewart Resnick, famous for building a successful cleaning business from scratch after his father won a floor scrubber in a raffle. Running a cleaning business was tough, labor-intensive work, he often said, and it taught him how to organize, schedule, estimate and grow a business with patience and acumen. He eventually acquired other businesses, applying the same discipline that he learned as a custodian. His labor, organization and employee management made him rich. Billionaire rich. Janitorial Software DemoCleaning and maintenance services are the most outsourced service in our economies. Janitorial services often require the cleaning and maintenance of buildings such as offices, restaurants, retail shops, hospitals, schools, residential accommodations and other types...

The Failed U.S. Conspiracy to Control Domains

The Failed U.S. Conspiracy to Control Domains
Oprah Sucks

Read Yahoo! Finance’s take …

The recent outcry over the new dot-sucks (.SUCKS) generic top-level domain (gTLD) portrays a U.S. government that has failed everyone, even as the bureaucracy divests control over the Internet Corporation for Assigned Names and Numbers (Icann).

Generic top-level domains were specifically purposed for websites in the beginning, or that’s the common misconception world-wide-web dinosaurs cherished about the same time Al Gore was inventing the Internet:

  • Popular DomainsDot-com (.COM) for business
  • Dot-net (.NET) for networking
  • Dot-org (.ORG) for non profits
  • Dot-edu (.EDU) for schools
  • Dot-gov (.GOV) for governments
  • Dot-mil (.MIL) for military
  • Dot-xxx (.XXX) for porn

The failed U.S. conspiracy to control domains has gone on for more than two decades, led by the U.S. Commerce Department’s efforts to bring order to Icann, the domain name management organization who has ignored calls from Congress to ban the proliferation of useless names again and again. There are currently approximately 850 gTLDs, or domains, for the market to consider.

An embarrassed Senate Congress chairwoman Edith Ramirez recently elucidated their failure to organize the destiny of domain names on the Internet:

“The Commission provided Icann with policy recommendations in which we highlighted a range of issues implicated by the impending rollout of the new gTLDs, including the increased risk of consumer confusion …. I therefore urge Icann to consider ways in which it can address the concerns raised with respect to .SUCKS, as well as to consumer protection issues more generally, on a broader basis.”
– Senate Congress chairwoman Edith Ramirez

Both free-market and libertarian minded pundits are disparaging over the .SUCKS debacle just the same, realizing the mean-spirited and offensive circumstances Icann unleashed in their efforts to enrich themselves with more revenue.

“Developers, engineers and other Internet stakeholders were free to build the open Internet because ultimate U.S. control ensured its smooth operation. If Icann can’t fulfill its basic function of overseeing Internet names without U.S. oversight, there’s no way it can protect the Internet from authoritarian governments such as Russia and China trying to close down websites they don’t like.”
– L. Gordon Crovitz in The Wall Street Journal on June 1, 2015

The counterargument
Others conclude that by limiting domain names there simply is not enough inventory to supply the free market. Recent domain sales in the month of May demonstrate just how lucrative the market is when inventory is limited:


gTLD Domain Name
Sold For Where Sold
1. Mera.com $132,500 Private
2. Adopting.com $125,000 DomainHoldings
3. FBET.com €50,000 = $54,500 Sedo
4. MyFood.com $33,500 Sedo
5. WJM.com $33,000 Private
6. BD.net $29,500 Sedo
7. LILV.com $28,000 eNaming
8. Astrology.tv €25,000 = $27,250 Sedo
9. 8255.com $26,500 Sedo
10. EasyFundraising.co.uk $24,000 NoktaDomains
11. AttorneyGroup.com $20,000 Sedo
12. Bando.com $19,999 Sedo
13. 5227.com $18,000 DomainsNext
14. IMX.com $17,500 Sedo
15. Buji.com $16,000 NoktaDomains/4.cn
16. Macfarlane.com £10,000 = $15,300 Sedo
17. Hi.net $15,000 Sedo
18. Paris24.com $11,000 Sedo
19.
tie
CZ.cc €10,000 = $10,900 Sedo
19.
tie
Joy.eu €10,000 = $10,900 Sedo

DN Journal follows the domain market and gathers trends. Any 3-letter .coms have been selling very high in 2015, but what is also interesting is the number of .net and .tv sales documented during the month. It’s only a matter of time until four-letter .coms become as lucrative to buy and sell as the lesser number letters.

Even if there were enough domain names, freedom of expression should allow for any gTLD, right? Well, not exactly. Freedom of speech (at least in the United States) does not include the right to be a jerk. The .SUCK domain would directly incite those who are targeted. A visit to www.uscourts.gov suggests obscenity and hate is illegal:

  • [It is llegal] to incite actions that would harm others (e.g., “[S]hout[ing] ‘fire’ in a crowded theater.”). Schenck v. United States, 249 U.S. 47 (1919).
  • [It is llegal] to make or distribute obscene materials. Roth v. United States, 354 U.S. 476 (1957).

Slander seems peanuts where national security is concerned. Disrupting business over the Internet would be an act of war. DNS hijacking may seem an act of terrorism when done by a rogue perpetrator, but subversion by a country or large organization is something else. As recently reported in the New York Times Magazine, Russia employs hundreds of trolls and troublemakers who could easily be repurposed to disrupting gTLDs:

Several Russian media outlets have claimed that the agency is funded by Evgeny Prigozhin, an oligarch restaurateur called “the Kremlin’s chef” in the independent press for his lucrative government contracts and his close relationship with Putin …. One Russian newspaper put the number of employees at 400, with a budget of at least 20 million rubles (roughly $400,000) a month.
– Adrian Chen, The New York Times

There will be continued debate whether the U.S. government – or any independent oversight paradigm – has the ability to manage ICANN and the dynamics of the evolving domain markets given the failed U.S. conspiracy to control domains.

Better passwords to keep your junk in the trunk

Better passwords to keep your junk in the trunk

Chances are someone has naked photos of you or your family. A recent survey shows that 9 out of 10 Millennials have documented their own whoopie cakes, humpty dumplings or baloney ponies. But what precautions have they taken to keep their money makers private?

A unique method for choosing passwords is critical given that a typical lowercase six-character password can be guessed in less than 10 minutes. Choose multiple stategies when picking a better password and you’ll be protected.

We shred documents in office compactors and tell our children to avoid contact with strangers who ask questions – so advocating for good password policies in your office or home should be a no-brainer.

Keeping your junk in the trunk may depend on it.

Last year’s iCloud celebrity photo hack should be a wake up call for everyone. Nude and compromising photos of nearly 100 celebrities were published, without permission, on the imageboard called 4chan.

4chan Celebrity Scandal

The hackers simultaneously pulled the pants off victims and the world’s largest Big Tech Company by using a service called “iBrute” to gain access to those celebrities’ passwords – and ultimately stealing the photos stored on their phones and in the cloud. When TIME magazine accused Apple of negligence in allowing the vulnerability in Apple iCloud’s “Find My iPhone” service, which helps users locate a lost or stolen phone, Apple responded with this strongly worded statement rebuffing the accusation:

None of the cases we have investigated has resulted from any breach in any of Apple’s systems …. To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification. Both of these are addressed on our website at http://support.apple.com/kb/ht4232.

Blotter Password Reset

Business Insider butressed the liability argument from Apple’s accusers, reminding readers that the ability to gain access to Apple’s iCloud accounts would likely require the ability to identify the user or email address of each victim. Given the ease with which hackers find email addresses and usernames, however, Apple can’t be held fully responsible for users’ bad password choices.

What if those victims had been provided with guidance on setting up good passwords?

These five easy methods to choose passwords and keep your junk in the trunk could save your own tuckus from broad publication.

Again, use a combination of strategies, not just one! Choosing a password that’s both easy to remember and practically guess-proof is something to tell family and friends about, too. After all, the integrity of your jaybird may be at stake.

1. Parenthesis always

A lot of us forget that parenthesis can be used in passwords. That means that you should be utilizing the symbol – or any of the special characters – around EVERY password you ever choose, going forward from today.

  • Password Parenthesis Example: mypassword becomes (MyP4$$^^0rd)

2. Leetspeak is not so good

Leetspeak, an alternative alphabet that uses various combinations of ASCII characters to replace Latinate letters, can help. But foiling password guessing programs can be problematic if that’s your only strategy. For instance, Leetspeak will not keep your password safe if you’re using it in an obvious manner. (Pa$$word is one of the first combinations these password applications will attempt, for example.)

  • Password Leadspeak Example: IfYouCanReadThisYouAreOffToAGoodStart becomes 1fuc4nre4dth15ur0ff2ag00d$t4rt

3. Password Ebonics

Because password cracking applications rely on languages the criminal hackers have imported from open-source dictionaries, it’s best to utilize languages that are unformalized or entirely made up. Here are a few examples:

  • Password Ebonics Example: PeepsOffDaHizzleSup
  • Password Redneck Example: FoScoAnSevenYearsGo
  • Password Jive Example: IGotsSomeFeelinWesNotInNoKansasNoMo

4. Bigger is better

Experts suggest repetition of unique letters is good security when choosing a password. For instance, many, many letters arbitrarily inserted in your password phrase can pretty much prevent any password cracking application from guessing it. Of course, the downside is remembering the number of letters used.

  • Password Repetition Example: HoustonWeHaveAProbleeeeeeeeeeeeeeeeeeeem!

5. Special character substitutions

Special characters should go beyond standard punctuation to include all the SHIFT-NUMBER letters, albeit not necessarily at once. A novel way to do this is by including your anniversary date or another arbitrary date (preferably not your birthday or something that could be guessed by a hacker).

  • Password Password Example: September202008 becomes September@)@))*

 

Blotter Password Reset

Better passwords to keep your junk in the trunk also keeps your money safe!


Most hackers are interested in stealing unique identifiers for the purpose of theft, of course.

By utilizing a password strategy that is personal and unique, you’ll be more likely to remember the password and mitigate the possibility of brute force or other malicious attacks.

Creating good passwords to keep your junk in the trunk is the responsibility of everyone you’re close to. If those around you are not using good security strategy, neither are you!

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close