5 Mentors Every Entrepreneur Should Have

Entrepreneur. It's a tough word -- both to spell and to call yourself. Being an entrepreneur brings with it a love of leaping head first into the unknown. Life-long entrepreneurs love new challenges, and live their lives in a constant growth phase. One of the common resources an entrepreneur turns to is a mentor. Asking for advice and bouncing ideas off of others is essential to the success of an entrepreneur's journey.

I've been fortunate to have a variety of mentors over the years, and I can't imagine standing where I am if it wasn't for them. Despite all the challenges of running a business, the biggest constant in my life is those mentors, and their advice.
I also think it's important that mentors come from many different perspectives, as mine have. These are the five types of mentors I've had over the years, and the ones I think any entrepreneur can benefit from:


1. A friend that knew you before you started your own thing.
Perhaps no voice matters more than the one that knew you before you had a startup. They knew you when all this was just a dream, or when you didn't even know what a startup was. They can speak to your roots and ground you when you get lost in the startup haze.
For instance, when I go back home to the East Coast, my friends ask me about everything except tech and business. They tell me how impressed they are but remind me that I need to slow down, to live the life I want, doing what I love. No entrepreneur should lose sight of that.

2. A person with your similar skill set at your point of learning.
Having regular coffee dates or Skype chats with people who are in your similar phase of growth can lead to valuable relationships. I have a group like this, and we push each other and question each other's decisions. We have been there when things fell through and when our big days happened.
There is a confidence that can come with camaraderie like that. We understand what each of us is going through.


3. A colleague you don't love working with.
One of the biggest challenges that face any entrepreneur is justifying what you want to do and why it's going to disrupt the status quo -- whether it be to investors, future co-founders, team members, the press or others. It helps if you're good at talking to just about anyone. Fine tune your ability to take feedback and get good at turning it into positive results. There is no quicker way to do this than to push forward with a relationship that isn't particularly enjoyable or easy at first.

4. A person with the exact opposite skill set than yours.
Seek out mentors who are most unlike yourself. For me it's been coffees with product managers, and tech leads. I've met with chief operating officers and have standing chats with our office manager. Do I know much about any of that? Not really. Do I know more now than I did before I met with them? Sure as heck I do.
Having these types of mentors and encounters has motivated me to take classes in coding and financials, and it's humbling to see just how much you don't know. Life-long learning is critical to success in business, and particularly to those who have bought into an industry founded on innovation.

5. A friend who always knew you'd be an entrepreneur.
Meet often with someone who knows you as "your entrepreneurial self" and not in any other way. He or she is likely the one to say "you got this" and "this is what you do" -- even when you're doubting it yourself. That person can't imagine you ever taking the safe option or quitting. He or she would never tell you it's OK if you haven't given something your best effort, and will cheer every one of your accomplishments.

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

156 Useful Run Command

To Access…Run Command
Accessibility Controls access.cpl
Accessibility Wizardaccwiz
Add Hardware Wizardhdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Toolscontrol admintools
Adobe Acrobat (if installed)acrobat
Adobe Designer (if installed)formdesigner
Adobe Distiller (if installed)acrodist
Adobe ImageReady (if installed)imageready
Adobe Photoshop (if installed)photoshop
Automatic Updateswuaucpl.cpl
Bluetooth Transfer Wizardfsquirt
Calculatorcalc
Certificate Managercertmgr.msc
Character Mapcharmap
Check Disk Utilitychkdsk
Clipboard Viewerclipbrd
Command Promptcmd
Component Servicesdcomcnfg
Computer Managementcompmgmt.msc
Control Panelcontrol
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Managerdevmgmt.msc
Direct X Control Panel (if installed)*directx.cpl
Direct X Troubleshooterdxdiag
Disk Cleanup Utilitycleanmgr
Disk Defragmentdfrg.msc
Disk Managementdiskmgmt.msc
Disk Partition Managerdiskpart
Display Propertiescontrol desktop
Display Propertiesdesk.cpl
Display Properties (w/Appearance Tab Preselected)control color
Dr. Watson System Troubleshooting Utilitydrwtsn32
Driver Verifier Utilityverifier
Event Viewereventvwr.msc
Files and Settings Transfer Toolmigwiz
File Signature Verification Toolsigverif
Findfastfindfast.cpl
Firefox (if installed) firefox
Folders Propertiesfolders
Fontscontrol fonts
Fonts Folderfonts
Free Cell Card Gamefreecell
Game Controllers joy.cpl
Group Policy Editor (XP Prof)gpedit.msc
Hearts Card Gamemshearts
Help and Supporthelpctr
HyperTerminalhypertrm
Iexpress Wizardiexpress
Indexing Serviceciadv.msc
Internet Connection Wizardicwconn1
Internet Exploreriexplore
Internet Properties inetcpl.cpl
Internet Setup Wizardinetwiz
IP Configuration (Display Connection Configuration)ipconfig /all
IP Configuration (Display DNS Cache Contents)ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)ipconfig /flushdns
IP Configuration (Release All Connections)ipconfig /release
IP Configuration (Renew All Connections)ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)ipconfig /registerdns
IP Configuration (Display DHCP Class ID)ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)ipconfig /setclassid
Java Control Panel (if installed)jpicpl32.cpl
Java Control Panel (if installed)javaws
Keyboard Propertiescontrol keyboard
Local Security Settingssecpol.msc
Local Users and Groupslusrmgr.msc
Logs You Out Of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access (if installed)msaccess
Microsoft Chatwinchat
Microsoft Excel (if installed)excel
Microsoft Frontpage (if installed)frontpg
Microsoft Movie Makermoviemk
Microsoft Paintmspaint
Microsoft Powerpoint (if installed)powerpnt
Microsoft Word (if installed)winword
Microsoft Syncronization Toolmobsync
Minesweeper Gamewinmine
Mouse Propertiescontrol mouse
Mouse Propertiesmain.cpl
Nero (if installed)nero
Netmeeting conf
Network Connectionscontrol netconnections
Network Connectionsncpa.cpl
Network Setup Wizardnetsetup.cpl
Notepadnotepad
Nview Desktop Manager (if installed)nvtuicpl.cpl
Object Packagerpackager
ODBC Data Source Administratorodbccp32.cpl
On Screen Keyboardosk
Opens AC3 Filter (if installed)ac3filter.cpl
Outlook Expressmsimn
Paintpbrush
Password Propertiespassword.cpl
Performance Monitorperfmon.msc
Performance Monitorperfmon
Phone and Modem Options telephon.cpl
Phone Dialerdialer
Pinball Gamepinball
Power Configuration powercfg.cpl
Printers and Faxescontrol printers
Printers Folderprinters
Private Character Editoreudcedit
Quicktime (If Installed)QuickTime.cpl
Quicktime Player (if installed)quicktimeplayer
Real Player (if installed)realplay
Regional Settings intl.cpl
Registry Editorregedit
Registry Editorregedit32
Remote Access Phonebookrasphone
Remote Desktop mstsc
Removable Storagentmsmgr.msc
Removable Storage Operator Requestsntmsoprq.msc
Resultant Set of Policy (XP Prof)rsop.msc
Scanners and Camerassticpl.cpl
Scheduled Taskscontrol schedtasks
Security Center wscui.cpl
Servicesservices.msc
Shared Foldersfsmgmt.msc
Shuts Down Windowsshutdown
Sounds and Audio mmsys.cpl
Spider Solitare Card Gamespider
SQL Client Configuration cliconfg
System Configuration Editorsysedit
System Configuration Utilitymsconfig
System File Checker Utility (Scan Immediately)sfc /scannow
System File Checker Utility (Scan Once At The Next Boot)sfc /scanonce
System File Checker Utility (Scan On Every Boot)sfc /scanboot
System File Checker Utility (Return Scan Setting To Default)sfc /revert
System File Checker Utility (Purge File Cache)sfc /purgecache
System File Checker Utility (Sets Cache Size to size x)sfc /cachesize=x
System Informationmsinfo32
System Properties sysdm.cpl
Task Managertaskmgr
TCP Testertcptest
Telnet Clienttelnet
Tweak UI (if installed)tweakui
User Account Managementnusrmgr.cpl
Utility Managerutilman
Windows Address Bookwab
Windows Address Book Import Utilitywabmig
Windows Backup Utility (if installed)ntbackup
Windows Explorerexplorer
Windows Firewallfirewall.cpl
Windows Magnifier magnify
Windows Management Infrastructurewmimgmt.msc
Windows Media Playerwmplayer
Windows Messengermsmsgs
Windows Picture Import Wizard (need camera connected)wiaacmgr
Windows System Security Toolsyskey
Windows Update Launcheswupdmgr
Windows Version (to show which version of windows)winver
Windows XP Tour Wizardtourstart
Wordpad write
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

How To Get Serial Key, Keygen, Crack, Patch Of Any Software

Here is simple, but useful google search hack that will help you to find serial key, keygen, patch of any software that you want :-
You can do this for any Antivirus, tool, software to gain access for long time

1. Go to www.google.com
2.Type this syntax in search bar "94FBR Product name with desired software" for example :
  e.g:-     94fbr Internet Download Manager
              94fbr Avast
              94fbr Microsoft Office 2013
              Windows 7 94fbr etc.






94FBR was part of a Microsoft Office 2000 product key that was released on the internet that bypassed Microsofts activation system.Because it is a relatively uncommon term, when you add it to your search queries, it will generally return results of pages listing illegal serial numbers.
Now you can register any software fakely....

This is only for knowledge not to misuse it.

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/
 

How To Hide Any Drive Through Command Prompt

Have you ever thought of hiding any drive from your system so that no one can knew about it. Yes Of-course.You may have heard or even used a lot of software’s that might be able to do that, but if you want to do things by your own without using any 3rd party software than this tutorial will show you how you can do it.
Well there are many ways of doing it, in this tutorial we are covering command prompt way of doing it.

Here is how to do it:

Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt
Step 2. In the Command Prompt, type Diskpart and hit enter key. If UAC (User Account
 Control), dialog-box prompts than click Yes.
Step 3. Then type List Volume and press enter, this will produce the list of all drives.



Step 4. Now select the drive which you want to hide, you can either do this by typing Select volume 2(i.e. Volume Number) or by typing Select Volume F(i.e. Drive letter)




Step 5. To hide a drive, type Remove Letter F. Here, F is the drive letter than you want to hide. You can use any drive letter you want.



Step 6. That’s it. You are done! F drive is now hidden


How to unhide hidden drive

Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.
Step 2. To show the hidden drive type Assign Letter F and hit enter, now you can view F: drive in explorer.

That’s it. This is the way of hiding and un-hiding drives from explorer.
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

Technology Trap!!!

1.Emails are the biggest culprit and probably single biggest reasons on your emotions variance in a day and most importantly how much impact it has on your transformational thinking/thoughts - It is very TRANSACTIONAL and makes you to a Transactional person - Repsond then and there and with same emotions , feel and thoughts that you read the mail just kills your own Individuality.

2.Most of the time the email is already colored in your mind based on your perception on sender !

3. I am happy to contribute on this research if some one can take it up - but my view is emotions, thoughts that erupt while reading mails on Blackberry ( or any handheld ) is different from the one that you feel and think when u read the same mail on your office work place. - on lighter side you can say Large Screen - larger view and Smaller Screen - Small view !!

4.In a typical day you check some 10 websites , 100s emails, read few articles etc -you take out that part from your daily life - less information , less stress , less variance on emotions - it is fairly calm and predictable

5. While we are learning to manage these technology invasion in our life - we are bombarded with Social Media - Facebook , Linkedin , Twitter - to help my cause have down loaded all the mobile compatible applications on mobile !!- so even if you are away from mails - your so called Social Online Network doesnt allow you to be away by sending regular tweets , msgs , texts etc ! - These again contribute to your emotional variance during the day.
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

Unlocking True Values.....

* Atrrition more than 20% in Indian IT industry
* 1 in 3 employee feels he is underpaid ( on relative scale - by comparing with others)
* However 1 out of 2 Employee is also over paid ( either due to lateral hire or urgent need , or background of his ex-co than any personal credentials)
* more than 10 companies founded either 2 or 3 decades old still continue to be under same promoters with combined value of promoters in excess of USD 30 Billion ??
* Top 5 are under huge margin pressure due to increased commoditised and competition
* Any further compromise on Margins in Tier 2 can put a huge risk to the sustainablity of business.

These issues on employee base of more than a 8 /10 lacs employees and combined promoters market value of more than 30bUSD

Few radical ideas on
-- Employee cost management and in turn the increased accountablity on
employee ( Value for Competency and Output)
--- Regulation around Promoters stake beyond 10 years from the company start date

Let us look at radical idea on first point above

1. Employee Auction from Common Pool :
* Every co to have fixed Cost of Core /Asset Employees - 15 to 20% of employee base as fixed ( to start with higher % but over period of time reach the above no )
* the balance 70 -80 to come from Common Industry pool to be picked up in auction for a period of 3 to 5 years ( fixed )
* Base Price to be fixed based on Skill sets , Porven track record ( Various measurable indicators ), Market requirement ( relevance of the skill etc )
* Employees have an option of sticking to that base price and continuing in the same company for another period of 3 to 5 years or put themselves in auction ( at employees risk ). However Companies wont have option to say NO post base price finalisation if employee decides to stay. The base Price will be decided as per above mentioned benchamrk across Industry
* If not sold then same employee can revise the base price and be in the market to be picked up other employers.
* conservative employees can fix there base price freezed for 2 auctions - say 6 or 10 years with pre agreed inflation.

The above gives a general idea on this radical ( crazy ) thought...but the key is in detailing - if detailed out it can thrwo up a new model for employment

2.On 2nd point - regulating Founder's /promoters stake post 10 or 15 years
From 10 th to 15th year - promoter should dilute part of stake mandatory to employees/employee trust and part of it towards Market. In Summary no Individual/Group of promoters should hold more than 50% stake in a company after 10 or 15 years - This woudl enable unlocking the huge value sitting at one place and also brings valuation to realistic value for the benefit of market....

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc.

Finding IP address in Gmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.

Note that this will not work if the sender uses anonymous proxy servers.

Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. However, if someone sends you a mail from his/her Gmail account using a client like Thunderbird, Outlook or Apple Mail, you can find the originating IP address.

Lets begin this. First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.132.1.4]
  • finding IP address in Gmail
  • finding IP address in Yahoo! Mail
  • finding IP address in Hotmail
  • finding IP address in AOL
  • finding IP address in Outlook/Outlook Express
1.Log into your Gmail account with your username and password.
2.Open the mail.
3.To display the email headers,
    Click on the inverted triangle beside Reply. Select Show Orginal.

4.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
5. Look for Received: from followed by the IP address between square brackets [ ].

Received: from [69.138.32.1] by web31804.mail.mud.hotmail.com

6.If you find more than one Received: from patterns, select the last one.
7.Track the IP address of the sender
 visit http://www.iplocation.net and put the IP address to find the location.

 

Finding IP address in Yahoo! Mail

  1. Log into your Yahoo! mail with your username and password.
  2. Click on Inbox or whichever folder you have stored your mail.
  3. Click on the Subject of the email you want to track and right-click. You should get a menu like this.
  4. You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to the next step.
  5. Look for Received: from followed by the IP address between square brackets [ ].
    That should most likely be the IP address of the sender.
    If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
  6. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

Finding IP address in Hotmail

Hotmail has been integrated with Windows Live, or vice-versa. And the format has changed. Here is how you find the IP address of the sender.
  1. Log into your Hotmail/Windows Live account with your username and password.
  2. Click on the Inbox link on the left.
  3. Under the column that says "Sort by", find the email that you want to track and right-click on it. You should get a menu that has something like Mark as read, Mark as unread, and so on. The last option in the menu should be View message source. Select it.
  4. You should see the email headers now.
  5. You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to step 6.
  6. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
  7. If that doesn't work, look for Received: from followed by IP address within square brackets[].
  8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
  9. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

Finding IP address in AOL

  1. Log into your AOL Mail AIM account with your username and password.
  2. Open the email that you want to track.
  3. On the top row, click on Action and in the drop-down menu, select View Message Source
  4. It opens a new page with the headers. Once you have the headers, look for the IP address that follows X-AOL-IP:. That should be the IP address of the sender.
  5. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

IP Address Detection Script

I wrote a Perl script to automate this task for you. All you have to do is select your email service and copy your email headers in the box below.
You may do one of the following:
  • You can copy all the headers from your email and paste them in IP detection script
    In this case, the unnecessary headers (like Subject:) will be removed automatically.
  • You can remove all headers except those beginning with
    • X-Originating-IP:
    • Received:
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/
Posted by Shamshul
www.NetworkzPeritus.com

5 things you should never reveal online

You may love being online, but that doesn't mean you can reveal all. Here are somethings that should be kept under wraps: 

Intimate photos or videos
Something that you post in the heat of the moment may come back to haunt you many years later. Anything that's once posted online can never be deleted completely.So make sure that you don't post something that you may not want you colleagues, boss, siblings or parents to see.

Your phone number
And for that matter even your address. Even if you think that you can trust you e-friend, don't be naive. Similarly don't give out you address for some lucky draw. This very lucky draw may prove 'unlucky' for you.

Don't post any abuses
If you have some complaints against you boss or teachers don't write messages against them over the net. For starters, it can be easily traced back to you. Wouldn't you rather talk about your complaints face-to-face with your boss than miss out on that promotion you were vying for.

Bank details
It's one thing to pay your bills online over secure websites, but never ever can you give out your account number or your ATM pin-codes. Don't take such risk no matter what the emergency is. If someone asks you for such details be suspicious of them.

Minute-by-minute details
It's one thing to tell people how you feel or crack a joke a two over the net, but don't give out details like 'going out for groceries' or 'heading to the local bar'.


"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

Final touches to cyber security infrastructure in the works

NEW DELHI: The government is giving final touches to an elaborate cyber security infrastructure wherein the proposed overarching body, National Cyber Security Coordinator (NSCS)
, will act as the main edifice for securing cyber systems, supported by four pillars — the National Technical Research Organization (NTRO) along with constituent National Critical Information and Infrastructure Protection Center (NCIIPC), the Computer Emergency Response Team (CERT-In) and the ministry of defense (MoD).


While the CERT-In, located within the department of information technology, will take charge of assessing cyber threats and protecting systems in public as well as private sector, especially in crucial areas like civil aviation, power and oil refineries, the NTRO, along with NCIIPC, will devise strategies and technical solutions to protect critical infrastructure like atomic and space stations, intelligence/police systems and nuclear facilities. The MoD will be handling cyber security of defense systems at Army, Air Force and Navy installations, possibly through the defense intelligence agency (DIA) and the DRDO.

NSCS, the umbrella body proposed for coordinating the efforts of the NTRO, CERT-In, NCIIPC and MoD, will ensure that there is no overlapping in jurisdiction and functioning of the four agencies. The delineation in work of these agencies is considered crucial to an effective cyber security plan.

The Cabinet note for creation of the NSCS and extending legal backup to the proposed arms of the cyber security infrastructure has been finalized and may be put up for Cabinet approval soon. The new cyber security network will not only involve protection of government systems but also guard against cyber threats to private industry, especially in sensitive sectors like civil aviation, power and oil. The public-private sector cooperation to ensure security of their computers networks and systems is essentially an initiative of national security advisor (NSA).

Only recently, deputy NSA Vijay Latha Reddy had taken a close look at government-industry partnership in countering cyber challenges, and came up with a host of recommendations including setting up of institutional mechanisms and putting in place appropriate policy and legal frameworks to ensure compliance with cyber security efforts. Other recommendations of the Reddy-headed joint working group for cyber security cooperation were building capacity to overcome shortage of cyber security professionals, defining security standards and guidelines for high-risk sectors in both public and private sectors; making cyber security audit mandatory under the Companies Act and establishment of an independent government certification body for IT products.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com