Tuesday, June 19, 2018

About Google adwords

This comes right from Google about using the right keywords  when using your AdWords campaigns:

Keywords are words or phrases you choose when you set up your AdWords campaign. These are terms you think your potential customers are likely to use when searching for products or services like yours.
By matching your keywords with the ads you create, you make it possible for your ad to show when someone searches for similar terms or visits a website with related content.
For example, if you deliver fresh flowers, you could use fresh flower delivery as one keyword paired with an ad promoting fresh flower delivery. When someone searches Google using the phrase fresh flower delivery or a similar term, your ad might appear above or below Google search results, or on other websites related to fresh flower delivery.
Did you know that you can:
reach people who have visited your website or used your app. Previous visitors or users can see your ads as they browse websites that are part of the Google Display Network, or as they search for terms related to your products or services on Google.
Touch base with me if you have an interest in getting more leads!

Talk more soon.


Monday, June 18, 2018

Free webinar presented by WERC and Siggins

A free WERC webinar presented by Siggins on Wednesday, June 20, 2018
2:00 PM ET / 1:00 PM CT / 11:00 AM PT
The webinar will talk about Better Solutions for the New World of Technology-Driven Distribution. Presented by Steve Wilson, Systems Engineer, Analyst and Warehouse Design Consultant, Siggins. ...
See More

Cyber security

The Time for Cybersecurity is Now.  

Cybersecurity threats are more prevalent than ever. Has your organization taken the necessary steps to ensure it is protected from the next malware or ransomware attack? Emerson has put together a comprehensive Cybersecurity Guidebook for Process Control aimed at providing practical solutions to help you assess and reduce your organization’s risk level.

  Adopt a Risk-based Approach to Cybersecurity
A risk-based approach to cybersecurity can help you make strategic decisions based on the likelihood and impact of each vulnerability.
  Tighten System Access
Building a culture of security by creating and enforcing security best practices will help your employees realize they are a crucial part of keeping your operations safe and secure.
  Go Beyond Perimeter Protection
Hackers count on organizations forgetting the backdoors they’ve left open. Using the tools at your disposal, you can shut those doors and lock them tight.
 Attack after attack be prepared!

HIDDEN COBRA, virus from Korea this is important

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this bulletin or otherwise.
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see http://www.us-cert.gov/tlp.


This Malware Analysis Report (MAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. Government partners, DHS and FBI identified Trojan malware variants used by the North Korean government. This malware variant is known as TYPEFRAME. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra.

DHS and FBI are distributing this MAR to enable network defense and reduce exposure to North Korean government malicious cyber activity.

This MAR includes malware descriptions related to HIDDEN COBRA, suggested response actions and recommended mitigation techniques. Users and administrators should flag activity associated with the malware, report the activity to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation.

This malware report contains analysis of 11 malware samples consisting of 32-bit and 64-bit Windows executable files and a malicious Microsoft Word document that contains Visual Basic for Applications (VBA) macros. These files have the capability to download and install malware, install proxy and Remote Access Trojans (RATs), connect to command and control (C2) servers to receive additional instructions, and modify the victim's firewall to allow incoming connections.
For a downloadable copy of IOCs, see:

A cheap SEO company may not be your best choice

This is a great article:


Tuesday, May 1, 2018

Privacy and the new Echo and other devices!

You really should read this article it is a bit scary!


A lot is happening on line and you should try to keep up or have a specialist lead you and guide you. We at Rossini.com can help you!


Wednesday, April 25, 2018

Bilt Industries and industrial shelving

In the fall of 2004, Bilt Industries, Inc. purchased the Klip-Bilt II® and Quick-Bilt® shelving lines from the Frick-Gallagher Manufacturing Company. Designed at inception to be the leanest viable business in the shelving industry, Bilt is structured to rapidly adjust so as to insulate its customers from market forces.
Galvanized by a stalwart business model, Bilt immediately began carving out a place for itself and earning the loyalty of significant customers. It has since proven more than capable of preserving the high-quality specification that Frick-Gallagher first offered over 70 years ago. The fledgling company proved so successful, in fact, that by 2007 it had already introduced a new line of box shelves. An impressive rate of growth continued to afford Bilt opportunities to diversify. As the decade drew to a close, this manifested in the launch of both an HD modular drawer line and mezzanine construction services.
Today, Bilt Industries has two state-of-the-art roll formers, modernized tooling, and a painting process, known as powder coating, that mitigates its environmental impact. With a new 40,000 sq ft. corporate office/distribution center in the greater Kansas City area, Bilt is well poised to continue realizing its ambitions.

Our Mission: Maintain excruciatingly high product standards, develop personal relationships with our customers, perfect our ability to adjust to market forces, and continue investing capital in cost-abating technology.
The Klip-BILT II® combines rugged industrial strength with powerful ease of assembly. Optimized for both open and closed shelving, this unit is equipped with strongbox front posts that free up space and bolster its load-bearing capabilities. Lickety-Klip shelf clips secure each corner and allow for effortless reconfiguration as your needs change.
A sturdy, dependable compression clip, the Lickety-Klip is designed for holes pre-punched on 1 1/2" centers. Lickety-Klips can be readily deployed at whatever height you desire and, as they're independent of those in adjacent units, can be adjusted without hassle. 
Shelves can be assembled and reorganized quickly using four clips and nothing else; no bolts or tools are required.
Starting with a basic post and shelf arrangement, shelf dividers and drawers can then be added according to your needs. From there you decide on whether you want an open or closed configuration. The former employs side and back cross braces, the latter side panels, back panels, and if requested doors.