156 Useful Run Command

To Access…Run Command
Accessibility Controls access.cpl
Accessibility Wizardaccwiz
Add Hardware Wizardhdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Toolscontrol admintools
Adobe Acrobat (if installed)acrobat
Adobe Designer (if installed)formdesigner
Adobe Distiller (if installed)acrodist
Adobe ImageReady (if installed)imageready
Adobe Photoshop (if installed)photoshop
Automatic Updateswuaucpl.cpl
Bluetooth Transfer Wizardfsquirt
Calculatorcalc
Certificate Managercertmgr.msc
Character Mapcharmap
Check Disk Utilitychkdsk
Clipboard Viewerclipbrd
Command Promptcmd
Component Servicesdcomcnfg
Computer Managementcompmgmt.msc
Control Panelcontrol
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Managerdevmgmt.msc
Direct X Control Panel (if installed)*directx.cpl
Direct X Troubleshooterdxdiag
Disk Cleanup Utilitycleanmgr
Disk Defragmentdfrg.msc
Disk Managementdiskmgmt.msc
Disk Partition Managerdiskpart
Display Propertiescontrol desktop
Display Propertiesdesk.cpl
Display Properties (w/Appearance Tab Preselected)control color
Dr. Watson System Troubleshooting Utilitydrwtsn32
Driver Verifier Utilityverifier
Event Viewereventvwr.msc
Files and Settings Transfer Toolmigwiz
File Signature Verification Toolsigverif
Findfastfindfast.cpl
Firefox (if installed) firefox
Folders Propertiesfolders
Fontscontrol fonts
Fonts Folderfonts
Free Cell Card Gamefreecell
Game Controllers joy.cpl
Group Policy Editor (XP Prof)gpedit.msc
Hearts Card Gamemshearts
Help and Supporthelpctr
HyperTerminalhypertrm
Iexpress Wizardiexpress
Indexing Serviceciadv.msc
Internet Connection Wizardicwconn1
Internet Exploreriexplore
Internet Properties inetcpl.cpl
Internet Setup Wizardinetwiz
IP Configuration (Display Connection Configuration)ipconfig /all
IP Configuration (Display DNS Cache Contents)ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)ipconfig /flushdns
IP Configuration (Release All Connections)ipconfig /release
IP Configuration (Renew All Connections)ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)ipconfig /registerdns
IP Configuration (Display DHCP Class ID)ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)ipconfig /setclassid
Java Control Panel (if installed)jpicpl32.cpl
Java Control Panel (if installed)javaws
Keyboard Propertiescontrol keyboard
Local Security Settingssecpol.msc
Local Users and Groupslusrmgr.msc
Logs You Out Of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access (if installed)msaccess
Microsoft Chatwinchat
Microsoft Excel (if installed)excel
Microsoft Frontpage (if installed)frontpg
Microsoft Movie Makermoviemk
Microsoft Paintmspaint
Microsoft Powerpoint (if installed)powerpnt
Microsoft Word (if installed)winword
Microsoft Syncronization Toolmobsync
Minesweeper Gamewinmine
Mouse Propertiescontrol mouse
Mouse Propertiesmain.cpl
Nero (if installed)nero
Netmeeting conf
Network Connectionscontrol netconnections
Network Connectionsncpa.cpl
Network Setup Wizardnetsetup.cpl
Notepadnotepad
Nview Desktop Manager (if installed)nvtuicpl.cpl
Object Packagerpackager
ODBC Data Source Administratorodbccp32.cpl
On Screen Keyboardosk
Opens AC3 Filter (if installed)ac3filter.cpl
Outlook Expressmsimn
Paintpbrush
Password Propertiespassword.cpl
Performance Monitorperfmon.msc
Performance Monitorperfmon
Phone and Modem Options telephon.cpl
Phone Dialerdialer
Pinball Gamepinball
Power Configuration powercfg.cpl
Printers and Faxescontrol printers
Printers Folderprinters
Private Character Editoreudcedit
Quicktime (If Installed)QuickTime.cpl
Quicktime Player (if installed)quicktimeplayer
Real Player (if installed)realplay
Regional Settings intl.cpl
Registry Editorregedit
Registry Editorregedit32
Remote Access Phonebookrasphone
Remote Desktop mstsc
Removable Storagentmsmgr.msc
Removable Storage Operator Requestsntmsoprq.msc
Resultant Set of Policy (XP Prof)rsop.msc
Scanners and Camerassticpl.cpl
Scheduled Taskscontrol schedtasks
Security Center wscui.cpl
Servicesservices.msc
Shared Foldersfsmgmt.msc
Shuts Down Windowsshutdown
Sounds and Audio mmsys.cpl
Spider Solitare Card Gamespider
SQL Client Configuration cliconfg
System Configuration Editorsysedit
System Configuration Utilitymsconfig
System File Checker Utility (Scan Immediately)sfc /scannow
System File Checker Utility (Scan Once At The Next Boot)sfc /scanonce
System File Checker Utility (Scan On Every Boot)sfc /scanboot
System File Checker Utility (Return Scan Setting To Default)sfc /revert
System File Checker Utility (Purge File Cache)sfc /purgecache
System File Checker Utility (Sets Cache Size to size x)sfc /cachesize=x
System Informationmsinfo32
System Properties sysdm.cpl
Task Managertaskmgr
TCP Testertcptest
Telnet Clienttelnet
Tweak UI (if installed)tweakui
User Account Managementnusrmgr.cpl
Utility Managerutilman
Windows Address Bookwab
Windows Address Book Import Utilitywabmig
Windows Backup Utility (if installed)ntbackup
Windows Explorerexplorer
Windows Firewallfirewall.cpl
Windows Magnifier magnify
Windows Management Infrastructurewmimgmt.msc
Windows Media Playerwmplayer
Windows Messengermsmsgs
Windows Picture Import Wizard (need camera connected)wiaacmgr
Windows System Security Toolsyskey
Windows Update Launcheswupdmgr
Windows Version (to show which version of windows)winver
Windows XP Tour Wizardtourstart
Wordpad write
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

How To Get Serial Key, Keygen, Crack, Patch Of Any Software

Here is simple, but useful google search hack that will help you to find serial key, keygen, patch of any software that you want :-
You can do this for any Antivirus, tool, software to gain access for long time

1. Go to www.google.com
2.Type this syntax in search bar "94FBR Product name with desired software" for example :
  e.g:-     94fbr Internet Download Manager
              94fbr Avast
              94fbr Microsoft Office 2013
              Windows 7 94fbr etc.






94FBR was part of a Microsoft Office 2000 product key that was released on the internet that bypassed Microsofts activation system.Because it is a relatively uncommon term, when you add it to your search queries, it will generally return results of pages listing illegal serial numbers.
Now you can register any software fakely....

This is only for knowledge not to misuse it.

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/
 

How To Hide Any Drive Through Command Prompt

Have you ever thought of hiding any drive from your system so that no one can knew about it. Yes Of-course.You may have heard or even used a lot of software’s that might be able to do that, but if you want to do things by your own without using any 3rd party software than this tutorial will show you how you can do it.
Well there are many ways of doing it, in this tutorial we are covering command prompt way of doing it.

Here is how to do it:

Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt
Step 2. In the Command Prompt, type Diskpart and hit enter key. If UAC (User Account
 Control), dialog-box prompts than click Yes.
Step 3. Then type List Volume and press enter, this will produce the list of all drives.



Step 4. Now select the drive which you want to hide, you can either do this by typing Select volume 2(i.e. Volume Number) or by typing Select Volume F(i.e. Drive letter)




Step 5. To hide a drive, type Remove Letter F. Here, F is the drive letter than you want to hide. You can use any drive letter you want.



Step 6. That’s it. You are done! F drive is now hidden


How to unhide hidden drive

Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.
Step 2. To show the hidden drive type Assign Letter F and hit enter, now you can view F: drive in explorer.

That’s it. This is the way of hiding and un-hiding drives from explorer.
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

Technology Trap!!!

1.Emails are the biggest culprit and probably single biggest reasons on your emotions variance in a day and most importantly how much impact it has on your transformational thinking/thoughts - It is very TRANSACTIONAL and makes you to a Transactional person - Repsond then and there and with same emotions , feel and thoughts that you read the mail just kills your own Individuality.

2.Most of the time the email is already colored in your mind based on your perception on sender !

3. I am happy to contribute on this research if some one can take it up - but my view is emotions, thoughts that erupt while reading mails on Blackberry ( or any handheld ) is different from the one that you feel and think when u read the same mail on your office work place. - on lighter side you can say Large Screen - larger view and Smaller Screen - Small view !!

4.In a typical day you check some 10 websites , 100s emails, read few articles etc -you take out that part from your daily life - less information , less stress , less variance on emotions - it is fairly calm and predictable

5. While we are learning to manage these technology invasion in our life - we are bombarded with Social Media - Facebook , Linkedin , Twitter - to help my cause have down loaded all the mobile compatible applications on mobile !!- so even if you are away from mails - your so called Social Online Network doesnt allow you to be away by sending regular tweets , msgs , texts etc ! - These again contribute to your emotional variance during the day.
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

Unlocking True Values.....

* Atrrition more than 20% in Indian IT industry
* 1 in 3 employee feels he is underpaid ( on relative scale - by comparing with others)
* However 1 out of 2 Employee is also over paid ( either due to lateral hire or urgent need , or background of his ex-co than any personal credentials)
* more than 10 companies founded either 2 or 3 decades old still continue to be under same promoters with combined value of promoters in excess of USD 30 Billion ??
* Top 5 are under huge margin pressure due to increased commoditised and competition
* Any further compromise on Margins in Tier 2 can put a huge risk to the sustainablity of business.

These issues on employee base of more than a 8 /10 lacs employees and combined promoters market value of more than 30bUSD

Few radical ideas on
-- Employee cost management and in turn the increased accountablity on
employee ( Value for Competency and Output)
--- Regulation around Promoters stake beyond 10 years from the company start date

Let us look at radical idea on first point above

1. Employee Auction from Common Pool :
* Every co to have fixed Cost of Core /Asset Employees - 15 to 20% of employee base as fixed ( to start with higher % but over period of time reach the above no )
* the balance 70 -80 to come from Common Industry pool to be picked up in auction for a period of 3 to 5 years ( fixed )
* Base Price to be fixed based on Skill sets , Porven track record ( Various measurable indicators ), Market requirement ( relevance of the skill etc )
* Employees have an option of sticking to that base price and continuing in the same company for another period of 3 to 5 years or put themselves in auction ( at employees risk ). However Companies wont have option to say NO post base price finalisation if employee decides to stay. The base Price will be decided as per above mentioned benchamrk across Industry
* If not sold then same employee can revise the base price and be in the market to be picked up other employers.
* conservative employees can fix there base price freezed for 2 auctions - say 6 or 10 years with pre agreed inflation.

The above gives a general idea on this radical ( crazy ) thought...but the key is in detailing - if detailed out it can thrwo up a new model for employment

2.On 2nd point - regulating Founder's /promoters stake post 10 or 15 years
From 10 th to 15th year - promoter should dilute part of stake mandatory to employees/employee trust and part of it towards Market. In Summary no Individual/Group of promoters should hold more than 50% stake in a company after 10 or 15 years - This woudl enable unlocking the huge value sitting at one place and also brings valuation to realistic value for the benefit of market....

"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc.

Finding IP address in Gmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.

Note that this will not work if the sender uses anonymous proxy servers.

Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. However, if someone sends you a mail from his/her Gmail account using a client like Thunderbird, Outlook or Apple Mail, you can find the originating IP address.

Lets begin this. First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.132.1.4]
  • finding IP address in Gmail
  • finding IP address in Yahoo! Mail
  • finding IP address in Hotmail
  • finding IP address in AOL
  • finding IP address in Outlook/Outlook Express
1.Log into your Gmail account with your username and password.
2.Open the mail.
3.To display the email headers,
    Click on the inverted triangle beside Reply. Select Show Orginal.

4.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
5. Look for Received: from followed by the IP address between square brackets [ ].

Received: from [69.138.32.1] by web31804.mail.mud.hotmail.com

6.If you find more than one Received: from patterns, select the last one.
7.Track the IP address of the sender
 visit http://www.iplocation.net and put the IP address to find the location.

 

Finding IP address in Yahoo! Mail

  1. Log into your Yahoo! mail with your username and password.
  2. Click on Inbox or whichever folder you have stored your mail.
  3. Click on the Subject of the email you want to track and right-click. You should get a menu like this.
  4. You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to the next step.
  5. Look for Received: from followed by the IP address between square brackets [ ].
    That should most likely be the IP address of the sender.
    If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
  6. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

Finding IP address in Hotmail

Hotmail has been integrated with Windows Live, or vice-versa. And the format has changed. Here is how you find the IP address of the sender.
  1. Log into your Hotmail/Windows Live account with your username and password.
  2. Click on the Inbox link on the left.
  3. Under the column that says "Sort by", find the email that you want to track and right-click on it. You should get a menu that has something like Mark as read, Mark as unread, and so on. The last option in the menu should be View message source. Select it.
  4. You should see the email headers now.
  5. You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to step 6.
  6. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
  7. If that doesn't work, look for Received: from followed by IP address within square brackets[].
  8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
  9. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

Finding IP address in AOL

  1. Log into your AOL Mail AIM account with your username and password.
  2. Open the email that you want to track.
  3. On the top row, click on Action and in the drop-down menu, select View Message Source
  4. It opens a new page with the headers. Once you have the headers, look for the IP address that follows X-AOL-IP:. That should be the IP address of the sender.
  5. Track the IP address of the sender
     visit http://www.iplocation.net and put the IP address to find the location

IP Address Detection Script

I wrote a Perl script to automate this task for you. All you have to do is select your email service and copy your email headers in the box below.
You may do one of the following:
  • You can copy all the headers from your email and paste them in IP detection script
    In this case, the unnecessary headers (like Subject:) will be removed automatically.
  • You can remove all headers except those beginning with
    • X-Originating-IP:
    • Received:
"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/
Posted by Shamshul
www.NetworkzPeritus.com

5 things you should never reveal online

You may love being online, but that doesn't mean you can reveal all. Here are somethings that should be kept under wraps: 

Intimate photos or videos
Something that you post in the heat of the moment may come back to haunt you many years later. Anything that's once posted online can never be deleted completely.So make sure that you don't post something that you may not want you colleagues, boss, siblings or parents to see.

Your phone number
And for that matter even your address. Even if you think that you can trust you e-friend, don't be naive. Similarly don't give out you address for some lucky draw. This very lucky draw may prove 'unlucky' for you.

Don't post any abuses
If you have some complaints against you boss or teachers don't write messages against them over the net. For starters, it can be easily traced back to you. Wouldn't you rather talk about your complaints face-to-face with your boss than miss out on that promotion you were vying for.

Bank details
It's one thing to pay your bills online over secure websites, but never ever can you give out your account number or your ATM pin-codes. Don't take such risk no matter what the emergency is. If someone asks you for such details be suspicious of them.

Minute-by-minute details
It's one thing to tell people how you feel or crack a joke a two over the net, but don't give out details like 'going out for groceries' or 'heading to the local bar'.


"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

Final touches to cyber security infrastructure in the works

NEW DELHI: The government is giving final touches to an elaborate cyber security infrastructure wherein the proposed overarching body, National Cyber Security Coordinator (NSCS)
, will act as the main edifice for securing cyber systems, supported by four pillars — the National Technical Research Organization (NTRO) along with constituent National Critical Information and Infrastructure Protection Center (NCIIPC), the Computer Emergency Response Team (CERT-In) and the ministry of defense (MoD).


While the CERT-In, located within the department of information technology, will take charge of assessing cyber threats and protecting systems in public as well as private sector, especially in crucial areas like civil aviation, power and oil refineries, the NTRO, along with NCIIPC, will devise strategies and technical solutions to protect critical infrastructure like atomic and space stations, intelligence/police systems and nuclear facilities. The MoD will be handling cyber security of defense systems at Army, Air Force and Navy installations, possibly through the defense intelligence agency (DIA) and the DRDO.

NSCS, the umbrella body proposed for coordinating the efforts of the NTRO, CERT-In, NCIIPC and MoD, will ensure that there is no overlapping in jurisdiction and functioning of the four agencies. The delineation in work of these agencies is considered crucial to an effective cyber security plan.

The Cabinet note for creation of the NSCS and extending legal backup to the proposed arms of the cyber security infrastructure has been finalized and may be put up for Cabinet approval soon. The new cyber security network will not only involve protection of government systems but also guard against cyber threats to private industry, especially in sensitive sectors like civil aviation, power and oil. The public-private sector cooperation to ensure security of their computers networks and systems is essentially an initiative of national security advisor (NSA).

Only recently, deputy NSA Vijay Latha Reddy had taken a close look at government-industry partnership in countering cyber challenges, and came up with a host of recommendations including setting up of institutional mechanisms and putting in place appropriate policy and legal frameworks to ensure compliance with cyber security efforts. Other recommendations of the Reddy-headed joint working group for cyber security cooperation were building capacity to overcome shortage of cyber security professionals, defining security standards and guidelines for high-risk sectors in both public and private sectors; making cyber security audit mandatory under the Companies Act and establishment of an independent government certification body for IT products.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

Cyber security: Kapil Sibal seeks global cooperation

NEW DELHI: India has stressed upon the need for greater cooperation and exchange of information among nations to enhance cyber security and to address issues related to the management 
of the internet.


"No nation can fight cyber-crime or secure its cyberspace in isolation. Increased and focused cooperation among key players, governments, industry and international bodies, is essential to create a secure cyber space," said an official statement quoting Communications and IT Minister Kapil Sibal's speech at global event on Internet.

Sibal is in Baku, Ajerbaijan for a High Level Ministerial Meeting at the Internet Governance Forum.

He said cyber security is a critical challenge being faced by stakeholders while exploiting the potential of the internet is cyber security.

Sibal proposed measures which included agreements on international technological standards and exchange of security related information across nations in order to achieve interoperability between Information and Communication Technology platforms.

"In the absence of global interoperability, critical data and information will not be available to all nations, when they require it most. Secondly, devising standardized and coordinated response strategies, in areas of cyber intelligence, generating alerts and execution of coordinated response in the event of cyber attacks," he said.

Sibal said that an informed response to a cyber attack is highly critical in case of crucial services infrastructure such as telecom, energy, finance, power and e-Government.

"Thirdly, devising a comprehensive Cyber Security Strategy, which harmonizes national criminal laws, ensures cyber justice to users and providers of cyber services, and enables cyber courts with international jurisdictions and to provide cyber justice in near real-time," he said.

The Minister said that internet provides a platform to empower human beings as never before in the history of mankind as it provides opportunities to the voiceless to be heard, communicate to the government and voiceless to connect among them.

"We are now on cusp of a new social contract which embraces all human beings. As a tool it enables empowerment of people. We will fall short of the optimum if this potential is not utilised," Sibal said.

The meeting was attended by global leaders including UNDESA's Under Secretary General, Wu Hongbo, ITU Secretary- General Hamadoun Toure, UNESCO Assistant Director-General Janis Karklins, ICANN Chief Executive Officer Fadi Chehade, as well as Ministers from Ajerbaijan UK, Japan, Tunisia, Egypt, Lithuania, Afghanistan, Albania, Slovenia among others.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com 

India, China likely successors to Silicon Valley by 2016: Survey

WASHINGTON: Close to half of Information and Communication Technology (ICT) leaders worldwide see India and China to be the likely successors of Silicon Valley as the globa
l technology innovation center within the next four years, a new survey has revealed.


More than two in five technology executives surveyed for KPMG's Technology Innovation Survey 2012 believe Silicon Valley is on the way out as the global technology hub, in which a plurality of 44% expect China to replace it by 2016.

However, if Silicon Valley does cede its position as the technology innovation capital but it isn't to China, it's most likely to be India that takes over, after it ranked second in the survey as the 'most likely new Silicon Valley', with 22% of the vote, followed by Japan (10%) and South Korea (9%).

The report notes that Asia is "leading the charge in mobile communications and commerce, skipping past the PC generation of the west."

According to Ho Wah Lee, KPMG Singapore head of advisory, part of the reason that China has emerged as a force to be reckoned with in global ICT is the government's financial and policy support for the nation's technology sector.

"The Chinese government is encouraging significant investment in three key areas - shared services and outsourcing, payments and cloud computing. The [government's] 12th Five-Year Plan is also driving innovation in these key areas," Ho said.

China has perhaps the strongest cloud potential of any market, which is already nearly ubiquitous in the nation. The Chinese Government has additionally allocated 154 billion dollars to boost the cloud industry over the next few years, and has designated five Cloud Computing Service Innovation Pilot Cities-Beijing, Shanghai, Shenzhen, Wuxi and Hangzhou, the survey said.





"For more information about NetworkzPeritus, you may visit our website at http://www.NetworkzPeritus.com/ & blog at http://networkzperitus.blogspot.in/

www.NetworkzPeritus.com