How To Get Serial Key, Keygen, Crack, Patch Of Any Software

Here is simple, but useful google search hack that will help you to find serial key, keygen, patch of any software that you want :-
You can do this for any Antivirus, tool, software to gain access for long time

1. Go to www.google.com
2.Type this syntax in search bar "94FBR Product name with desired software" for example :
  e.g:-     94fbr Internet Download Manager
              94fbr Avast
              94fbr Microsoft Office 2013
              Windows 7 94fbr etc.






94FBR was part of a Microsoft Office 2000 product key that was released on the internet that bypassed Microsofts activation system.Because it is a relatively uncommon term, when you add it to your search queries, it will generally return results of pages listing illegal serial numbers.
Now you can register any software fakely....

This is only for knowledge not to misuse it.

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/
 

How To Hide Any Drive Through Command Prompt

Have you ever thought of hiding any drive from your system so that no one can knew about it. Yes Of-course.You may have heard or even used a lot of software’s that might be able to do that, but if you want to do things by your own without using any 3rd party software than this tutorial will show you how you can do it.
Well there are many ways of doing it, in this tutorial we are covering command prompt way of doing it.

Here is how to do it:

Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt
Step 2. In the Command Prompt, type Diskpart and hit enter key. If UAC (User Account
 Control), dialog-box prompts than click Yes.
Step 3. Then type List Volume and press enter, this will produce the list of all drives.



Step 4. Now select the drive which you want to hide, you can either do this by typing Select volume 2(i.e. Volume Number) or by typing Select Volume F(i.e. Drive letter)




Step 5. To hide a drive, type Remove Letter F. Here, F is the drive letter than you want to hide. You can use any drive letter you want.



Step 6. That’s it. You are done! F drive is now hidden


How to unhide hidden drive

Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.
Step 2. To show the hidden drive type Assign Letter F and hit enter, now you can view F: drive in explorer.

That’s it. This is the way of hiding and un-hiding drives from explorer.
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

Technology Trap!!!

1.Emails are the biggest culprit and probably single biggest reasons on your emotions variance in a day and most importantly how much impact it has on your transformational thinking/thoughts - It is very TRANSACTIONAL and makes you to a Transactional person - Repsond then and there and with same emotions , feel and thoughts that you read the mail just kills your own Individuality.

2.Most of the time the email is already colored in your mind based on your perception on sender !

3. I am happy to contribute on this research if some one can take it up - but my view is emotions, thoughts that erupt while reading mails on Blackberry ( or any handheld ) is different from the one that you feel and think when u read the same mail on your office work place. - on lighter side you can say Large Screen - larger view and Smaller Screen - Small view !!

4.In a typical day you check some 10 websites , 100s emails, read few articles etc -you take out that part from your daily life - less information , less stress , less variance on emotions - it is fairly calm and predictable

5. While we are learning to manage these technology invasion in our life - we are bombarded with Social Media - Facebook , Linkedin , Twitter - to help my cause have down loaded all the mobile compatible applications on mobile !!- so even if you are away from mails - your so called Social Online Network doesnt allow you to be away by sending regular tweets , msgs , texts etc ! - These again contribute to your emotional variance during the day.
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

Unlocking True Values.....

* Atrrition more than 20% in Indian IT industry
* 1 in 3 employee feels he is underpaid ( on relative scale - by comparing with others)
* However 1 out of 2 Employee is also over paid ( either due to lateral hire or urgent need , or background of his ex-co than any personal credentials)
* more than 10 companies founded either 2 or 3 decades old still continue to be under same promoters with combined value of promoters in excess of USD 30 Billion ??
* Top 5 are under huge margin pressure due to increased commoditised and competition
* Any further compromise on Margins in Tier 2 can put a huge risk to the sustainablity of business.

These issues on employee base of more than a 8 /10 lacs employees and combined promoters market value of more than 30bUSD

Few radical ideas on
-- Employee cost management and in turn the increased accountablity on
employee ( Value for Competency and Output)
--- Regulation around Promoters stake beyond 10 years from the company start date

Let us look at radical idea on first point above

1. Employee Auction from Common Pool :
* Every co to have fixed Cost of Core /Asset Employees - 15 to 20% of employee base as fixed ( to start with higher % but over period of time reach the above no )
* the balance 70 -80 to come from Common Industry pool to be picked up in auction for a period of 3 to 5 years ( fixed )
* Base Price to be fixed based on Skill sets , Porven track record ( Various measurable indicators ), Market requirement ( relevance of the skill etc )
* Employees have an option of sticking to that base price and continuing in the same company for another period of 3 to 5 years or put themselves in auction ( at employees risk ). However Companies wont have option to say NO post base price finalisation if employee decides to stay. The base Price will be decided as per above mentioned benchamrk across Industry
* If not sold then same employee can revise the base price and be in the market to be picked up other employers.
* conservative employees can fix there base price freezed for 2 auctions - say 6 or 10 years with pre agreed inflation.

The above gives a general idea on this radical ( crazy ) thought...but the key is in detailing - if detailed out it can thrwo up a new model for employment

2.On 2nd point - regulating Founder's /promoters stake post 10 or 15 years
From 10 th to 15th year - promoter should dilute part of stake mandatory to employees/employee trust and part of it towards Market. In Summary no Individual/Group of promoters should hold more than 50% stake in a company after 10 or 15 years - This woudl enable unlocking the huge value sitting at one place and also brings valuation to realistic value for the benefit of market....

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc.

Finding IP address in Gmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.

Note that this will not work if the sender uses anonymous proxy servers.

Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. However, if someone sends you a mail from his/her Gmail account using a client like Thunderbird, Outlook or Apple Mail, you can find the originating IP address.

Lets begin this. First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.132.1.4]
  • finding IP address in Gmail
  • finding IP address in Yahoo! Mail
  • finding IP address in Hotmail
  • finding IP address in AOL
  • finding IP address in Outlook/Outlook Express
1.Log into your Gmail account with your username and password.
2.Open the mail.
3.To display the email headers,
    Click on the inverted triangle beside Reply. Select Show Orginal.

4.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
5. Look for Received: from followed by the IP address between square brackets [ ].

Received: from [69.138.32.1] by web31804.mail.mud.hotmail.com

6.If you find more than one Received: from patterns, select the last one.
7.Track the IP address of the sender
 visit http://www.iplocation.net and put the IP address to find the location.

 

Finding IP address in Yahoo! Mail

  1. Log into your Yahoo! mail with your username and password.
  2. Click on Inbox or whichever folder you have stored your mail.
  3. Click on the Subject of the email you want to track and right-click. You should get a menu like this.
  4. You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to the next step.
  5. Look for Received: from followed by the IP address between square brackets [ ].
    That should most likely be the IP address of the sender.
    If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
  6. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

Finding IP address in Hotmail

Hotmail has been integrated with Windows Live, or vice-versa. And the format has changed. Here is how you find the IP address of the sender.
  1. Log into your Hotmail/Windows Live account with your username and password.
  2. Click on the Inbox link on the left.
  3. Under the column that says "Sort by", find the email that you want to track and right-click on it. You should get a menu that has something like Mark as read, Mark as unread, and so on. The last option in the menu should be View message source. Select it.
  4. You should see the email headers now.
  5. You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to step 6.
  6. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
  7. If that doesn't work, look for Received: from followed by IP address within square brackets[].
  8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
  9. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

Finding IP address in AOL

  1. Log into your AOL Mail AIM account with your username and password.
  2. Open the email that you want to track.
  3. On the top row, click on Action and in the drop-down menu, select View Message Source
  4. It opens a new page with the headers. Once you have the headers, look for the IP address that follows X-AOL-IP:. That should be the IP address of the sender.
  5. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

IP Address Detection Script

I wrote a Perl script to automate this task for you. All you have to do is select your email service and copy your email headers in the box below.
You may do one of the following:
  • You can copy all the headers from your email and paste them in IP detection script
    In this case, the unnecessary headers (like Subject:) will be removed automatically.
  • You can remove all headers except those beginning with
    • X-Originating-IP:
    • Received:
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/
Posted by Shamshul
www.NetworkzPeritus.com

5 things you should never reveal online

You may love being online, but that doesn't mean you can reveal all. Here are somethings that should be kept under wraps: 

Intimate photos or videos
Something that you post in the heat of the moment may come back to haunt you many years later. Anything that's once posted online can never be deleted completely.So make sure that you don't post something that you may not want you colleagues, boss, siblings or parents to see.

Your phone number
And for that matter even your address. Even if you think that you can trust you e-friend, don't be naive. Similarly don't give out you address for some lucky draw. This very lucky draw may prove 'unlucky' for you.

Don't post any abuses
If you have some complaints against you boss or teachers don't write messages against them over the net. For starters, it can be easily traced back to you. Wouldn't you rather talk about your complaints face-to-face with your boss than miss out on that promotion you were vying for.

Bank details
It's one thing to pay your bills online over secure websites, but never ever can you give out your account number or your ATM pin-codes. Don't take such risk no matter what the emergency is. If someone asks you for such details be suspicious of them.

Minute-by-minute details
It's one thing to tell people how you feel or crack a joke a two over the net, but don't give out details like 'going out for groceries' or 'heading to the local bar'.


"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

Final touches to cyber security infrastructure in the works

NEW DELHI: The government is giving final touches to an elaborate cyber security infrastructure wherein the proposed overarching body, National Cyber Security Coordinator (NSCS)
, will act as the main edifice for securing cyber systems, supported by four pillars — the National Technical Research Organization (NTRO) along with constituent National Critical Information and Infrastructure Protection Center (NCIIPC), the Computer Emergency Response Team (CERT-In) and the ministry of defense (MoD).


While the CERT-In, located within the department of information technology, will take charge of assessing cyber threats and protecting systems in public as well as private sector, especially in crucial areas like civil aviation, power and oil refineries, the NTRO, along with NCIIPC, will devise strategies and technical solutions to protect critical infrastructure like atomic and space stations, intelligence/police systems and nuclear facilities. The MoD will be handling cyber security of defense systems at Army, Air Force and Navy installations, possibly through the defense intelligence agency (DIA) and the DRDO.

NSCS, the umbrella body proposed for coordinating the efforts of the NTRO, CERT-In, NCIIPC and MoD, will ensure that there is no overlapping in jurisdiction and functioning of the four agencies. The delineation in work of these agencies is considered crucial to an effective cyber security plan.

The Cabinet note for creation of the NSCS and extending legal backup to the proposed arms of the cyber security infrastructure has been finalized and may be put up for Cabinet approval soon. The new cyber security network will not only involve protection of government systems but also guard against cyber threats to private industry, especially in sensitive sectors like civil aviation, power and oil. The public-private sector cooperation to ensure security of their computers networks and systems is essentially an initiative of national security advisor (NSA).

Only recently, deputy NSA Vijay Latha Reddy had taken a close look at government-industry partnership in countering cyber challenges, and came up with a host of recommendations including setting up of institutional mechanisms and putting in place appropriate policy and legal frameworks to ensure compliance with cyber security efforts. Other recommendations of the Reddy-headed joint working group for cyber security cooperation were building capacity to overcome shortage of cyber security professionals, defining security standards and guidelines for high-risk sectors in both public and private sectors; making cyber security audit mandatory under the Companies Act and establishment of an independent government certification body for IT products.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

Cyber security: Kapil Sibal seeks global cooperation

NEW DELHI: India has stressed upon the need for greater cooperation and exchange of information among nations to enhance cyber security and to address issues related to the management 
of the internet.


"No nation can fight cyber-crime or secure its cyberspace in isolation. Increased and focused cooperation among key players, governments, industry and international bodies, is essential to create a secure cyber space," said an official statement quoting Communications and IT Minister Kapil Sibal's speech at global event on Internet.

Sibal is in Baku, Ajerbaijan for a High Level Ministerial Meeting at the Internet Governance Forum.

He said cyber security is a critical challenge being faced by stakeholders while exploiting the potential of the internet is cyber security.

Sibal proposed measures which included agreements on international technological standards and exchange of security related information across nations in order to achieve interoperability between Information and Communication Technology platforms.

"In the absence of global interoperability, critical data and information will not be available to all nations, when they require it most. Secondly, devising standardized and coordinated response strategies, in areas of cyber intelligence, generating alerts and execution of coordinated response in the event of cyber attacks," he said.

Sibal said that an informed response to a cyber attack is highly critical in case of crucial services infrastructure such as telecom, energy, finance, power and e-Government.

"Thirdly, devising a comprehensive Cyber Security Strategy, which harmonizes national criminal laws, ensures cyber justice to users and providers of cyber services, and enables cyber courts with international jurisdictions and to provide cyber justice in near real-time," he said.

The Minister said that internet provides a platform to empower human beings as never before in the history of mankind as it provides opportunities to the voiceless to be heard, communicate to the government and voiceless to connect among them.

"We are now on cusp of a new social contract which embraces all human beings. As a tool it enables empowerment of people. We will fall short of the optimum if this potential is not utilised," Sibal said.

The meeting was attended by global leaders including UNDESA's Under Secretary General, Wu Hongbo, ITU Secretary- General Hamadoun Toure, UNESCO Assistant Director-General Janis Karklins, ICANN Chief Executive Officer Fadi Chehade, as well as Ministers from Ajerbaijan UK, Japan, Tunisia, Egypt, Lithuania, Afghanistan, Albania, Slovenia among others.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

India, China likely successors to Silicon Valley by 2016: Survey

WASHINGTON: Close to half of Information and Communication Technology (ICT) leaders worldwide see India and China to be the likely successors of Silicon Valley as the globa
l technology innovation center within the next four years, a new survey has revealed.


More than two in five technology executives surveyed for KPMG's Technology Innovation Survey 2012 believe Silicon Valley is on the way out as the global technology hub, in which a plurality of 44% expect China to replace it by 2016.

However, if Silicon Valley does cede its position as the technology innovation capital but it isn't to China, it's most likely to be India that takes over, after it ranked second in the survey as the 'most likely new Silicon Valley', with 22% of the vote, followed by Japan (10%) and South Korea (9%).

The report notes that Asia is "leading the charge in mobile communications and commerce, skipping past the PC generation of the west."

According to Ho Wah Lee, KPMG Singapore head of advisory, part of the reason that China has emerged as a force to be reckoned with in global ICT is the government's financial and policy support for the nation's technology sector.

"The Chinese government is encouraging significant investment in three key areas - shared services and outsourcing, payments and cloud computing. The [government's] 12th Five-Year Plan is also driving innovation in these key areas," Ho said.

China has perhaps the strongest cloud potential of any market, which is already nearly ubiquitous in the nation. The Chinese Government has additionally allocated 154 billion dollars to boost the cloud industry over the next few years, and has designated five Cloud Computing Service Innovation Pilot Cities-Beijing, Shanghai, Shenzhen, Wuxi and Hangzhou, the survey said.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

Wanted: Ethical hackers

Recently, the website of Ankit Fadia, a well-known ethical hacker, was hacked by another group that goes by the name Team Grey Hat (TGH). The “hactivist” group entered Ankit Fadia’s official site and exposed his c
redentials, including sensitive data, student details, database credentials (like name, user name & password). In a blog message, TGH also rubbished Fadia as a hacker and his courses.

Industry watchers, however, claim that the small (but growing community) of ethical hackers in India usually do not parade their skills against each other. “This incident of hacking into Fadia’s website is more out of the need to rubbish someone’s claims and not to show off skills against one another,” points a security expert, who do not wish to be identified.

Ethical hackers are fast becoming a valued tribe in India. According to data from Indian Computer Emergency Response Team (Cert-In), in November last year more than 800 “.in” websites and nearly 700 “.com” websites in India were defaced by miscreants. A good number of Indian sites, including a few government ones, are hacked by cyber criminals every year. This has spurred the demand for security professionals and white-hat hackers.

Global market intelligence firm IDC predicts the requirement of 188,000 security professionals by 2012. At present, the number of certified security professionals in India is estimated at 22,000 by Cyber Security and Anti Hacking Organization, while another report by Nasscom says that India needs about 77,000 ethical hackers every year.

As corporations and government organizations turn to ethical professionals who think and act like their black-market counterparts, there’s a steady rise in professionals like Mumbai-based Yash Kadakia, who started his experiments with ethical hacking in junior college. The 24-year-old though has not done any college or degree course on ethical hacking went on to launch Security Brigade, an IT security solutions company, in 2006.

Professionals like Kadakia are called blue-hat hackers, typically from outside the company like a computer security consulting firm that bug test a system or software looking for exploits so they can be closed.

The industries most vulnerable to cyber-attacks, according to security experts, include BFSI, telecom, IT services and e-commerce which have started hiring ethical hackers. “Many organizations are being forced by their clients to take security more seriously. Security is a very dynamic industry and the solutions need to be constantly tweaked. There is nothing known as a 100 per cent secure system. You may be very secure right now, but that does not mean you are always going to be secure,” says Fadia, who came into limelight when a classified intelligence agency sought his help to break an encrypted message sent by one of Osama Bin Laden’s men in 2001.

K K Mookhey’s Institute of Information Security, for example, has clients from banking and financial institutions, insurance and investment, software, telecom and even petroleum. Some of them include Axis Bank, Bank of India, Bharti Airtel, Wipro, BPCL, ICICI Prudential and Tata AIG and Standard Chartered.

“Though BFSI sector hires more ethical hackers than others, because of the nature of transactions other sectors have also started having small teams. The teams usually consist of four to five people or even more, depending on the size of the company. This is because cyber attacks have become more prominent now,” said another security expert.

Becoming an ethical hacker is a multistage process. Interested candidates need to have a network background, either a vendor certification or experience working in a networking environment.

Shomiron Das Gupta, founder member of Netmonastery, a company that provides solutions for monitoring and networking network attacks, acknowledges that the domestic market for ethical hacking has evolved over the years. “Yes, while only a few names like Ankit Fadia have come out in the public domain because of some good work accomplished at a very young age but the importance of this industry can be gauged by the fact that even the Indian government now recognizes this field,” he says.

Security experts like Vijay Mukhi emphasize the lack of awareness around corporate data espionage that is hurting ethical hacker as a profession. “Most Indian corporations do not even register cyber crime cases. As a country, data gets lost at several points in India, but cases are not registered against the offenders. I believe that most individuals interested in ethical hacking are moving out, as there is neither a market nor any money in this profession in India,” he reasons.

The Institute of Information Security run by K K Mookhey and Cyber Security and Anti-Hacking Organization offer short term courses in ethical hacking for both corporations and students. Besides, Ankit Fadia also runs certified ethical hacker programmes and PG Diploma courses in cyber security.

Quality is what is lacking in the industry, according to industry experts. Dominic K, director, Technitics Consulting, a Delhi- based information security training and consulting firm says, “There is tremendous scope for information security professionals, penetration testers and other computer security specialists in India. But for that we need to produce a much better quality of certified professionals across various domains of information security.”

Gupta of Netmonastery also adds that information security is one of the hardest industries for a long-term career, because of the need to be always on the front edge of whatever technology curve there is.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com