FOR IMMEDIATE RELEASE
Business In The Black Receives 2013 Dallas Award
Dallas Award Program Honors the Achievement
DALLAS December 3, 2013 — Business In The Black has been selected for the 2013 Dallas Award in the Web Site Design & Development category by the Dallas Award Program.
Each year, the Dallas Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community. These exceptional companies help make the Dallas area a great place to live, work and play.
Various sources of information were gathered and analyzed to choose the winners in each category. The 2013 Dallas Award Program focuses on quality, not quantity. Winners are determined based on the information gathered both internally by the Dallas Award Program and data provided by third parties.
About Dallas Award Program
The Dallas Award Program is an annual awards program honoring the achievements and accomplishments of local businesses throughout the Dallas area. Recognition is given to those companies that have shown the ability to use their best practices and implemented programs to generate competitive advantages and long-term value.
The Dallas Award Program was established to recognize the best of local businesses in our community. Our organization works exclusively with local business owners, trade groups, professional associations and other business advertising and marketing groups. Our mission is to recognize the small business community’s contributions to the U.S. economy.
SOURCE: Dallas Award Program
Dallas Award Program
While the media panicked over the halting of NASDAQ stock trading due to a reported bug in the system (more on that shortly), one critical development went under-reported. In fact, it wasn’t reported at all.
If the following from France’s second largest newspaper Le Figaro is accurate, then we must assume that war is now a foregone conclusion.
While it is too early to rule out categorically the argument put forward by Damascus and Moscow, who blame the massacre on the Syrian opposition, it is already possible to provide answers to a troubling question. What benefit would have Assad to launch an unconventional attack at the precise moment when he had to allow UN inspectors – after being stranded for several months – to investigate the use of chemical weapons?
Operational logic first. According to information obtained byLe Figaro , the first trained in guerrilla warfare by the Americans in Jordan Syrian troops reportedly entered into action since mid-August in southern Syria, in the region of Deraa. A first group of 300 men, probably supported by Israeli and Jordanian commandos, as well as men of the CIA, had crossed the border on August 17. A second would have joined the 19. According to military sources, the Americans, who do not want to put troops on the Syrian soil or arming rebels in part controlled by radical Islamists form quietly for several months in a training camp set up at the border Jordanian- Syrian fighters ASL, the Free Syrian Army, handpicked.
Sense of impunity
As for the summer, their protection have begun to shake Syrian battalions in the south, approaching the capital. “Their thrust would now feel into the Ghouta, where formations of ASL were already at work, but really can make a difference on the outskirts of Damascus fortress,” says David Rigoulet-Roze, a researcher at the French Institute for Strategic Analysis (IFAS).
According to this expert on the region, the idea proposed by Washington would be the possible establishment of a buffer zone from the south of Syria, or even a no-fly zone, which would cause opponents safely until the balance of power changes. This is the reason why the United States has deployed Patriot batteries and F16 in late June Jordan.
Military recent pressure against al-Ghouta threatens the capital Damascus, the heart of the Syrian regime. In July, the spokesman of President al-Assad had publicly stated that the scheme would not use chemical weapons in Syria “except in case of external aggression.” The intrusion of foreign agents in the south, for example …
The other reason, if the army has actually committed a massacre in Damascus chemical is more diplomatic. Since August, 2012, when Barack Obama warned that the use of chemical weapons was a “red line” that, once crossed, could trigger a military intervention, thirteen smaller chemical attack have been identified without causing American reaction. Admittedly, the evidence is difficult to obtain, since Damascus routinely blocks the work of UN investigators. The sense of impunity felt by the Syrian regime is reinforced by the Russian protection afforded to the Security Council of the UN.Barack Obama, when he arrived at the White House, the Kremlin had proposed a “reset” of relations, not to break the link with Moscow. U.S. Chief of Staff, Martin Dempsey, the principal military adviser, justifies his opposition to intervention, even limited by the fragmentation of the Syrian opposition and the weight exerted by extremist groups.
What are the options?
If the Syrian regime is actually behind the chemical bombardment of Damascus, it will take a further degree is a conflict that has claimed more than 100,000 lives. “There is more of a small-scale test as before. Chemical weapons are now part of the war, where they play a deterrent role. This is a message to the Americans. It is also a challenge to Barack Obama, who risks losing its legitimacy with its allies in the world, “an expert analysis of the case.
Along with clandestine operations from Jordanian soil, the international community, as each time the crisis is reaching a peak, reconsider the various military options. Arming the rebels? “If we do one day we will not say,” said a diplomatic source. Surgical air strikes? Possible, but the solution involves risk regionalization of the conflict. Special forces to secure and neutralize chemical weapons sites?Israel hit neighboring Syria repeatedly. But Western intelligence services did not want to risk that stocks of chemical weapons falling into the hands of jihadist groups. Last option, inaction. It is that which seems to have bet on Bashar al-Assad in Damascus.
Look at these original stories:
There’s a reason they call television the “idiot box.” Some believe that if you spend too much time watching television, it will negatively affect your ability to think. Let’s hope this isn’t true, since a recent study from Nielsen is showing that African Americans watch television more than any other group in the country.
According to EURweb, in November 2010, when the data were compiled, African Americans used their TVs an average of 7 hours, 12 minutes each day — above the U.S. average of 5 hours, 11 minutes. Asians watched TV the least, at just 3 hours, 14 minutes a day on average. African Americans used DVD players and video game consoles more than average, but whites were more likely to use DVRs. Some 40 percent of white families own DVRs, which is higher than average.
This has been the case for many years — blacks watching more television than any other group. If this is the case, why aren’t there more black television shows being produced? Why does it appear that we have more time than other groups to watch television? Perhaps we value television differently than other groups. If so, why? Whatever the case, too much of anything is rarely a good thing.
It would make sense to create Black channels of TV with great content for advertisers and well as educators with trends likes these.
There has been a massive global attack going on against WordPress, specifically the /wp-login.php (which is called by /wp-admin). Here is a very lengthy thread about the situation:
The attackers became very very aggressive overnight, to the point of shutting down 10s of thousands of servers running WordPress They were able to greatly affect the performance of a number of the servers.
As the quick band-aid, as recommended in the above thread, was to block access to /wp-login.php and whitelist IPs for those that need it. It’s not a long term fix, but it has allowed the servers to remain stable. My hosting folks are working on a procedure to allow automatic whitelisting of IP addresses.
This attack started up on April 8th or so, and has compounded itself 10-fold the past few days. The thought is the attackers are hacking into old WordPress installations, getting their code installed, which gives them more “bots” to continue the attack like a virus that is server side.
For now there is no real solution to this World Wide Attack on WordPress powered sites.
I thought I would heads up and let you be one of the first to know about some new technology I will be offering starting next week.
1- Video Based “Ninja” Lead Generation and Marketing: Where you allow others to market for you to a third party as a Viral form of Stealth marketing to get leads and traffic to your website.
2- Trust Marketing: You take a Trusted article on the internet and use it for marking a product or service of your own that is relative to your own topic. For “Social Shock Marketing” you take a Shocking or Emotionally Charged story and use it for marking a product or service of your own that has little to do with the topic.
3- You might already know that I own a Digital Billboard company called “A to Z Mini Billboards” under the “Digital Advertising Media” umbrella along with being 50% partner of “OPN TV Network” a IPTV Television Network for media distribution. This system will take a technological turn next week by introducing some new features and a different structure.
The OPN TV Network
Self Hosted Media provided by local communities all over the DFW area with an International delivery
Pre and Post Roll Advertisement / No commercials in the content / Very low cost Advertisement ($25 – $500 Max)
Content Providers can have their own shows for $99 a month with full VOD (Video on Demand)
No public sharing video system ads or commercials, we own the servers in house
After about a year of research and development OPN TV Network (On a Positive Note TV) will soon launch the first IPTV Station owned and operated by Minorities right here in the DFW Area. Marie Thompson (CEO) a Mexican American and me Darnell Smith (CTO) an African American are partners of OPN TV Network a Cloud Based Media network that will deliver Rich Media to Set Top Boxes like RoKu, Android TV and Google TV as well as Mobile Phones, Tablets and PCs.
This will be rolled out in 2 phases with unlimited channels that are web based and limited for Set Top Boxe delivery.
Some Features of OPN TV:
- VOD or Video on Demand
- Time Based Programming (Legacy Style TV)
- Mobile Distribution
- International Reach 24/7
- Interactive Advertisement (click through)
- Video and Music
- Digital Billboard Distribution
- Low Cost Programming (aimed at small business and entrepreneurs)
- Low Corporate funding with $1000 caps
- Social Media Connected
- Social TV Chat for Real-time integration during programming
- Analytics for programming provided by Google
A to Z will also be integrating the Media Distribution System to all of the existing Digital Billboard system across 27 states that are already in operation. Some of these systems will handle Static Billboards while others will use Rich Media like Videos and Music from OPN.
This is not a cheap endeavor and to fund this business we will be using a Crowd Funding technique used by many but with a set participation level as well as amount. My partner and I believe in a People First Profit Second approach to all our endeavors so we created a Base Market Funding structure that anyone can get involved in.
Here is how it works:
OPN is offering 5 types of Advertisements that will fund the business from day one but not be offered at any other time. These paid advertisers will be Base Advertisers and never have to pay again for ads that run across the OPN’s network of channels. This will give them an unlimited supply of advertisement for the life of the company no matter how big OPN becomes.
Banner Ads $25: will be sprinkled during programming slots above the Media Players on websites that are accessed by Mobile and PC type devices only. These are Static or Dynamic (flash based) banners. They are provided by the advertiser and are randomly displayed as users logon to watch or listen to content.
Static Snippet Ads $50: will be sprinkled before, after and during programming slots. These are Static Billboard style ads with no sound and no movement. They are provided by the advertiser and will last only 6 seconds when displayed.
Dynamic Snippet Ads $100: will be sprinkled before, after and during programming slots. These are Dynamic Flash style ads with no sound. They are provided by the advertiser and will last up to 15 seconds when displayed.
Video Snippet $250: will be sprinkled before, after and during programming slots. These are short video style ads with sound and movement. They are provided by the advertiser and will last up to 15 seconds when displayed.
Video Commercials $350: will be sprinkled before, after and during programming slots. These are standard video style ads with sound and movement. They are provided by the advertiser and will last up to 30 seconds when displayed.
All of these Funding Advertisers will be listed on the website and in marketing materials as the Base Advertisers for the life of OPN TV Network. They will never have to pay again to reap the benefits of ongoing marketing and advertisement.
That’s it for now and for more information on our systems, technology or base advertisement please hit me back anytime.
Phone: 214-509-6678 – Mobile: 214-815-9308 (text message ok)
Phone Hours: 10am to 10pm 7 Days a Week, office or mobile
Website development, Digital Signage, Internet Marketing and Print Media Creation
www.BusinessInTheBlack.com Website Development and Marketing
www.AtoZMiniBillboards.com Mini Electronic Billboard Systems
www.EmpowermentThursdays.com Business Networking for Entrepreneurs and Small Business
www.LoneStarIdol.com A Texas Artist Music Competition and movement
www.OPNTVNetwork.com A IP Streaming TV Network designed for Small Business (soon to be streaming on RoKu too)
Follow me on:
Contact Me via Instant Messenger:
Yahoo Instant Messenger: doctorsmith20000
Stuxnet: Anatomy of a Computer Virus
An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code.
By THOMAS ERDBRINK, Published: May 29, 2012 Original Article Here
TEHRAN — The computers of high-ranking Iranian officials appear to have been penetrated by a data-mining virus called Flame, in what may be the most destructive cyberattack on Iran since the notorious Stuxnet virus, an Iranian cyberdefense organization confirmed on Tuesday.
In a message posted on its Web site, Iran’s Computer Emergency Response Team Coordination Center warned that the virus was dangerous. An expert at the organization said in a telephone interview that it was potentially more harmful than the 2010 Stuxnet virus, which destroyed several centrifuges used for Iran’s nuclear enrichment program. In contrast to Stuxnet, the newly identified virus is designed not to do damage but to collect information secretly from a wide variety of sources.
Flame, which experts say could be as much as five years old, was discovered by Iranian computer experts. In a statement about Flame on its Web site, Kaspersky Lab, a Russian producer of antivirus software, said that “the complexity and functionality of the newly discovered malicious program exceed those of all other cyber menaces known to date.”
The virus bears special encryption hallmarks that an Iranian cyberdefense official said have strong similarities to previous Israeli malware. “Its encryption has a special pattern which you only see coming from Israel,” said Kamran Napelian, an official with Iran’s Computer Emergency Response Team. “Unfortunately, they are very powerful in the field of I.T.”
While Israel never comments officially on such matters, its involvement was hinted at by top officials there. “Anyone who sees the Iranian threat as a significant threat — it’s reasonable that he will take various steps, including these, to harm it,” said the vice prime minister and strategic affairs minister, Moshe Yaalon, in a widely quoted interview with Israel’s Army Radio on Tuesday.
In a speech Tuesday night, Prime Minister Benjamin Netanyahu did not mention Flame specifically, but he did include computer viruses as one of five critical types of threats Israel faces, saying: “We are investing a great deal of money in that, human capital and financial capital. I expect these investments to yield a great deal in the coming years.”
Mr. Napelian said that Flame seemed designed to mine data from personal computers and that it was distributed through USB sticks rather than the Internet, meaning that a USB has to be inserted manually into at least one computer in a network.
“This virus copies what you enter on your keyboard; it monitors what you see on your computer screen,” Mr. Napelian said. That includes collecting passwords, recording sounds if the computer is connected to a microphone, scanning disks for specific files and monitoring Skype.
“Those controlling the virus can direct it from a distance,” Mr. Napelian said. “Flame is no ordinary product. This was designed to monitor selected computers.”
Mr. Napelian said he was not authorized to disclose how much damage Flame had caused, but guessed the virus had been active for the past six months and was responsible for a “massive” data loss. Iran says it has developed antivirus software to combat Flame, something that international antivirus companies have yet to do, since they have just become aware of its existence.
“One of the most alarming facts is that the Flame cyberattack campaign is currently in its active phase, and its operator is consistently surveilling infected systems, collecting information and targeting new systems to accomplish its unknown goals,” Alexander Gostev, chief security expert at Kaspersky Lab, said on the company’s Web site.
Those close to Iran’s leaders said that the virus was tantamount to an attack.
“I am no virus expert, and my computer seems to be working,” said Sadollah Zarei, a columnist for the state newspaper, Kayhan, “but I know this is covert warfare, aimed at weakening us.”
Jodi Rudoren contributed reporting from Tel Aviv.
Original post from http://blogcastfm.com
Sid here. I want to warn you guys about a massive exploit that has hit a large number of Godaddy Hosted WordPress Blogs this weekend
This hack appears to redirect visitors upon arrival from Google and attempts to install malware on their computers. When I was visiting the site directly, whether logged in or as an Admin, even if I could see the malicious script in my view-source window I did not have any issues and it did not redirect me. This means your site could be hacked and infected and you may be unaware.
I noticed a couple key giveaways:
- In view source, you will see <script src=”http://cechirecom.com/js.php”> located just above the </body> tag on all .php files. If you view source and see this, that’s cause for alarm
- When logged in, you’ll have a screwed up WordPress dashboard. Basically it looks like it is messing up the loading of some CSS in the WordPress Admin area, causing everything to look like the image below:
(Click for larger view)
When arriving from Google, a hacked website will redirect to http://www2.burnvirusnow34.xorg.pl/
The good news is this attack appears to be based only on your actual files – not your database. That’s relatively easy to clean up. In GoDaddy you should be able to revert to an old version of your files (Go to April 23rd or before and you should be fine)
The bad news is we don’t know at this point how the hackers are gaining access.
So far, here’s what I’ve found out about Godaddy’s stance, from another blog that’s also covering this issue:
“Measures are in place to protect the overall security of the shared hosting server on which your website resides. The compromise of your account is outside of the scope of security that we provide for you. Virus scans are performed on the content that is hosted, but they may not pick up everything, largely due to the fact that hackers tend to upload custom scripts which are not picked up by traditional malware scanners. However, if a virus is detected, you will be notified. The overall security of your password and the content within your account is your responsibility, as password compromises and compromises due to scripting can only be prevented by you.”
Please forward this post to your friends, and help us get the word out. It looks like this has compromised a large number of blogs, and especially since it happened over the weekend, there’s a good chance many bloggers haven’t noticed it.
For more information on fixing the issue, please see this post : Cechriecom.com.js.php – WordPress Hacked on Godaddy
This is not your normal BlogcastFM blog post, but since we were hacked this weekend and unaware of the issue for a couple days, I felt we had to say something since our audience is bloggers – and help educate you guys in case you have the same problem. We’ll resume with our normal interviews tomorrow.