Wednesday, December 21, 2011

industrial training at netmax technologies

industrial training at netmax technologies in chandigarh



checkout this great place for industrial training in chandigarh

Amplify’d from www.netmaxtech.com















INDUSTRIAL TRAINING




New Featured
May 13, 2011
Comments Off




Industrial Training is very important in Career Shaping of Students. At this stage you will decide about the technology that you will choose to build your career. There are two industrial trainings that student has to join for B.tech or BE. First training is for 6 week and second is for 6 month.


Placement companies mostly look for the latest technologies used in market. Industrial Training is best place to master skills as needed by companies. Depending on student’s personal interest or according to his/her strength, one of the following option can be selected.



  • Networking

  • Software Development

  • Embedded System

  • PLC


6 Week Industrial Training is Available in:



  • Software Development:      JAVA, C Sharp, ASP .Net, Android, PHP

  • Network Administration: Cisco CCNA, Linux, Microsoft MCITP

  • Electronics & Embedded:  8051, PIC, AVR, ARM, OrCAD


6 Month Industial Training is Available in:



  • EMBEDDED:  PLC,  AVR,  ARM

  • CISCO:               CCNP,  CCVP,CCIP

  • .NET:                  C Sharp,  ASP .NET

  • PHP:                   Advance PHP & CMS

  • JAVA:                Advance Java, Andriod application development



















Comments are closed.






















Read more at www.netmaxtech.com
 

netmax technologies pvt ltd

Netmax Technologies Pvt Ltd

sco 118-120 , 3rd floor, Sec 34a, chandigarh, Chandigarh 160022, India

+91 172 434 6046 ()   +91 95 92 990517 (Mobile) ‎ netmaxtech.com



Categories:Software Company, industrial training, ccna training, ... Software Company, industrial training, ccna training, six months training, ccnp training chandigarh

Transit: Sec 34 Gurudwara Bus Stop (367 m SW)

Amplify’d from maps.google.com
Netmax Technologies Pvt Ltd
sco 118-120 , 3rd floor, Sec 34a, chandigarh, Chandigarh 160022, India
+91 172 434 6046 () +91 95 92 990517 (Mobile) netmaxtech.com
  • Directions
  • Search nearby
  • more
Categories: Software Company, industrial training, ccna training, ... Software Company, industrial training, ccna training, six months training, ccnp training chandigarh
Transit: Sec 34 Gurudwara Bus Stop (367 m SW)
2 reviews
Your rating:
 
20 minutes ago - register for industrial training - From the owner
Offers
10% off on six months training for btach ,mca students
Expires: Jan 4, 2012 - google.com
Ccna @ netmax technologies 5% off
Expires: Oct 24, 2012 - google.com
Your rating:
Liked: Disliked:
Your review has been deleted. Undo
Oct 24, 2011
excellent place for industrial training in cisco , ccna ,ccnp ,ccie
1 out of 1 people found this review helpful. Was this review helpful? Yes - No - Flag as inappropriate
Response from the owner
Netmax Technologies Pvt Ltd -
Verified owner
Oct 20, 2011
great place for 6 months industrial training.
1 out of 1 people found this review helpful. Was this review helpful? Yes - No - Flag as inappropriate
Response from the owner
Netmax Technologies Pvt Ltd -
Verified owner
{cid:"15332086882253235779",latitude_e6:30722174,longitude_e6:76768534,business_name:"Netmax Technologies Pvt Ltd",address:"sco 118-120 , 3rd floor, Sec 34a, chandigarh, Chandigarh 160022, India",country:"IN",phone_1:"0172 434 6046",phone_2:"095 92 990517",maps_auth_token:"cdee5f15:QtmkuBIj1-7G9SEAaogWey9RV8g"}
Responding to Google reviews
You can publicly respond to reviews written by Google users. If the review was posted by another provider, visit that site to respond.

Read more at maps.google.com
 

Sunday, December 18, 2011

All basics about Hacking

CyberGuard Security Expert (CGSE) is a designed especially for personnel interested in Vulnerability Assessment & Penetration Testing.The Program covers aspects of Information Security and Ethical Hacking, enabling one to become an Security Expert.

After completion of Course, a exam will be conducted after which you will be given Certification from CyberGuard.

[private post]Welcome to LiveJournal




[info]distancelearing

December 14th, 0:00


Current Mood:
creative
Current Music:
FRNK Radio

Here are ways to help you customize your journal:





Ready to start writing? There are many ways in which you can post:



When you post an entry, you can use an "LJ-Cut" to hide
everything underneath it with a link. This is useful for really long
entries, hiding spoilers, and is usually done as a courtesy for your
friends' Friends page.



- Private: The eyeball by entries like this one means that only you can see it.



- Friends-Only: The lock means only people you've added as a friend can see this post. You can also create custom friend groups so only a select few can read your entry.



Other ways to post an entry:

Mobile Post - Post photos and text from your mobile phone.

Voice Post - Say your post over the phone and we'll magically post the audio to your journal.

TxtLJ - Interact and post via text message.

LJ Talk - Post to your journal with LiveJournal's instant messaging feature.



Discover LiveJournal's true sense of community:




Use LiveJournal for you mobile device:


Read more at distancelearing.livejournal.com
 

Cyberguard Security Experts

CyberGuard Security Expert (CGSE) is a designed especially for personnel interested in Vulnerability Assessment & Penetration Testing.The Program covers aspects of Information Security and Ethical Hacking, enabling one to become an Security Expert.

After completion of Course, a exam will be conducted after which you will be given Certification from CyberGuard.

hackingcyber










[private post]Welcome to LiveJournal




[info]hackingcyber

December 14th, 0:00


Current Mood:
creative
Current Music:
FRNK Radio

Here are ways to help you customize your journal:





Ready to start writing? There are many ways in which you can post:



When you post an entry, you can use an "LJ-Cut" to hide
everything underneath it with a link. This is useful for really long
entries, hiding spoilers, and is usually done as a courtesy for your
friends' Friends page.



- Private: The eyeball by entries like this one means that only you can see it.



- Friends-Only: The lock means only people you've added as a friend can see this post. You can also create custom friend groups so only a select few can read your entry.



Other ways to post an entry:

Mobile Post - Post photos and text from your mobile phone.

Voice Post - Say your post over the phone and we'll magically post the audio to your journal.

TxtLJ - Interact and post via text message.

LJ Talk - Post to your journal with LiveJournal's instant messaging feature.



Discover LiveJournal's true sense of community:




Use LiveJournal for you mobile device:



















[private post]How to Secure Windows XP, Windows 7 using Syskey Password




[info]hackingcyber

December 8th, 7:44


Syskey password protection is used to make you windows more secure as syskey password prompt open before windows login screen.


It is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key.


Check out the Video.



For more info. on Syskey.

















[private post]Trojan: Functionality & Behavior ( using Let me rule v2.0 )




[info]hackingcyber

December 8th, 7:29


Trojan, is malware that appears to perform a desirable function for the user prior to run or install, but ( perhaps in addition to the expected function) steals information or may take control over the system or harms the system.


Lets check out in the video how it works.


 



For more info. on trojan, Click Here.

















[private post]Scanning: How to Scan your network using N-Map and Advance IP Scanner




[info]hackingcyber

December 8th, 7:22


Scanning a network is used for checking or monitoring purpose, i.e how many systems are used in your network, which services are they running, which ports are open and closed. In Security field, Penetration testers job is to Secure the network and systems for that they  use to scan the network for checking  open ports and services which can be vulnerable and will help an attacker to exploit the network or machine.


Here is a video which shows how to use Nmap and Advance IP scanner.


















[private post]Google-ing




[info]hackingcyber

December 8th, 7:02


Google Hacking does not mean stealing data from Google or hacking Google’s databases, rather it means the art of using Google or using Google operators for enhancing your search. Through Google operators you can make the best use of Google’s Search engine so that you are provided with the most optimized result.


 The video shows some of the most commonly used Google keywords.



Basic Search Operators:


Phrase search (“”)

Used for Finding an Exact Match. For eg, a search for [“Wireless Hacking“] (with quotes)

will miss the pages that refer to WiFi Hacking.


Terms you want to exclude (-)

Use the Minus Sign to mention Negative Keywords. For example, when you search for

[Cyberguard -news - images] you will get a result of all pages which mentioned Cyberguard on

there page and no mention of the word “image & news”.


Fill in the blanks (*)

The *, or wildcard, is a little-known feature that can be very powerful. If you include *

within a query, it tells Google to try to treat the star as a placeholder for any unknown

term(s) and then find the best matches, like in Windows Search box.


The OR operator

As the Name suggests, if you place an OR operator between 2 keywords, it will find pages

which contain either of the keyword.


Advanced Operators:


Cache:

Used to Fetch the Google’s Cache of the Webpage.


Link:

Finds All the Web Pages which link to the Web Page in question.


Related:

Displays Web Pages which are related to the Web page in question.


Info:

Displays all the Information Google has about the website.


Site:

Used to conduct Site Specific Queries.


Intitle:

Searches for the Keyword in Titles of All Web Pages.


Inurl:


Searches for the keyword in URL.


 


There are numerous Google operators, you can find their actual working in Google Advanced Search option.


 


 

















[private post]Steganography using Windows Command Prompt (cmd)




[info]hackingcyber

December 6th, 10:59


In this video we are going to show you how to use command prompt as your steganographic tool, i.e. you can hide a important piece of information behind an image without letting anyone know.


Lets check out in  the video !.


 


















[private post]Sniffing: Hacking telnet password using Backtrack 5 – Ettercap-GTK




[info]hackingcyber

December 6th, 7:16


In this video we will show you how to sniff or hack the telnet passwords using ettercap in Backtrack Operating System.

For this we require two machines for telnet communication, and a third system i.e Hacker’s System using Backtrack, Blackbuntu or any other modified linux OS having ettercap installed.

See the Video Tutorial…




For info. on sniffing..Click here.


For info. on Telnet..Click here.


For Downloading Backtrack.


For Downloading Ettercap for Linux users only.

















[private post]Steganography using S-Tools : Hiding a Text file behind an Image




[info]hackingcyber

December 5th, 13:35


Steganography means art of hiding information. Eg. A very common usage of steganography is hiding text behind an image.


This can be done with the help of S-Tools, you can download them from Here.


The video Demonstrates how to use S-Tools for hiding a text file behind an Image.


















[private post]Metasploit: Hacking Windows XP professional SP1,SP2,SP3 using ms087_067_NETAPI Exploit




[info]hackingcyber

December 5th, 13:12



This video demonstrates how to create a new user on windows machine remotely with the help of metasploit.


Before watching this video you should be familiar with basics of metasploit & Linux.


However the video has been made in a way that is very much easy to understand for beginners.



Metasploit is a open source framework which comes with preloaded exploits, that is used by penetration testers and computer security experts for vulnerability assessment and penetration testing.


For downloading  metasploit for windows. Click Here


For any queries contact us @ cybrguard@gmail.com


 

















[private post]Distance Learning




[info]hackingcyber

December 2nd, 6:27


CyberGuard’s Computer Based Training (CGCBT) is a Distance Learning Programme from CyberGuard which comes with a series of best video tutorials, tools and documentation on Ethical Hacking & Network Security.


Salient Features



  • Covers tutorials from beginners to experts.


Our tutorials contains video for all kind of learners, i.e. from beginners to experts.



  • Top quality training and tutorials.


Our video training technology and techniques are made by professional editors for showing our content in the best manner for successful learning.



  • A wide selection of latest topics and Softwares.


You will be provided with the latest software’s in the DVD’s and current topics on security loopholes and vulnerabilities etc.



  • Learn at your own pace: Play, pause, rewind.


You can watch our tutorials on Desktop, Laptop, TV and even on mobile phones.



  • Searchable closed captions.


Videos will be played with subtitles n captions for people with hearing impairments and for easy understanding.



  • Stay up to date and keep your skills sharp.


Up to date latest ethical hacking and security techniques. Latest videos on our website and  YouTube channel every week.



  • Learn from Experienced instructors.


Tutorials are made by expertise in field of  Network Security, Vulnerability Assesment and Penetration testing. We have CCIE, MCITP and RHCE experts in our Team.



  • Gain Confidence and Marketability.


Be an IT Security analyst with complete knowledge of Computer security.



  • Economic training.


The price you pay here is very much less than career growth in this feild.



  • Online Technical support.


You will be provided technical support staff for any doubt and queries, you can have a telephonic conversation or for practical problems you can connect us remotely with team viewer.



  • Online Chat option with our faculties.


This option is for having chat with our faculty regarding any technical doubts and queries.



  • Socially available


You can connect with us on our website with SOCIAL+ or any social networking media, i.e Facebook, Twitter, Google+,YouTube,LinkedIn.



  • Certification of Completion


You will be given a certificate of completion after the course is complete and you clear our online examination whose value will be globally recognized.


 


Computer Based Training for Ethical Hacking.


Computer Based Training for Network Security.


Read more at hackingcyber.livejournal.com