Top Paid Indian Company Executives





Nowadays everyone is running behind the money but some people are there where money is running behind them. Don't be surprised with in few minutes I will put cat out of the box. But we common people who always running behind the money are always curious to know what is the salary of executives, how much they are paid, who all are the top paid executives. So don't worry and no need to guess any more, today I am going to reveal the facts and figures of top paid executives of Indian Tech-companies. Due to technology revolution in India, these Indian company are getting more benefited and they are paying their executives a handsome salary and you can also see that-that's why they are becoming fat too.So I have listed down 12 executives of Indian companies, who are the highest paid among India.








14.)  Name :           Ramanan RV
       Company:        Hexaware Technologies
       Remuneration: Rs 1.95 crore
       About:            He is the Executive Director & President of Global Delivery of Hexaware Technologies Limited. This company has its Head office in Mumbai. His remuneration package constitutes salary and allowances, perquisites and Funds.






13.)  Name :           Suresh Senapathy
       Company:        Wipro
       Remuneration: Rs 1.96 crore
       About:            He is the executive director and CFO of Wipro. His Remuneration package constitutes salary, allowances, commission and funds. He is having slightly high enumeration then Ramanan RV.





12.)  Name :           Azim H Premji
       Company:        Wipro
       Remuneration: Rs 1.99 crore
       About:            He is the founder of Wipro. His Remuneration package constitutes salary, allowances, commission and funds.




11.)  Name :           Harsh Chitale
       Company:        HCL Infosystems
       Remuneration: Rs 2.9 crore
       About:            He is the CEO and whole time director of HCL Infosystems. He gets a remuneration package that constitutes-- salary and allowances, perquisites and performance-linked bonus. He creates the big difference of remuneration and holds 11th position in this list.





10.)  Name :            S Mahalingam
         Company:        Tata Consultancy Services
       Remuneration:  Rs  3.53 crore
       About:              He is the Chief Executive Officer and Managing Director of TCS. He gets a remuneration package that constitutes-- salary and allowances, perquisites and performance-linked bonus. He also creates the big difference of remuneration and holds 10th position in this list.




 9.)  Name :            Vineet Nayyar
       Company:        Tech Mahindra
       Remuneration: Rs  3.6 crore
       About:            He is the CEO, Vice Chairman and Managing Director of Tech Mahindra and the chairman of Mahindra Satyam. Note that Mahindra bought the Satyam in 2012 starting.He gets a remuneration package that constitutes-- salary and allowances, perquisites, commissions and performance-linked bonus.



 8.)  Name :            BVR Mohan Reddy

       Company:        Infotech Enterprises
       Remuneration: Rs  3.75 crore
       About:            He is the Chairman and Managing Director of Infotech Enterprises. This company is having Head office in Hyderabad. His Total pay includes  salary and allowances, perquisites, commissions and performance-linked bonus. 





                                                                
7.)   Name :            TK Kurien
       Company:        Wipro
       Remuneration: Rs  4.4 crore
       About:            He is the Chief Executive Officer of IT Business and Executive Director, Wipro Limited. He is also the member of Wipro's Corporate Executive Council. This company is having Head office in HyderabadHis Total pay includes  salary and allowances, perquisites, commissions and stock options granted.










6.)   Name :            BG Srinivas
       Company:        Infosys Ltd
       Remuneration: Rs  4.86 crore
       About:            He is the Head of Europe and Global Head of Financial Services & Insurance at Infosys Ltd. He is holding the sixth position with a salary of 4.86 crore. His package include  salary and allowances, perquisites, commissions and stock options granted.


                                                            


5.)   Name :            Ashok Vemuri
       Company:        Wipro
       Remuneration: Rs  4.88 crore
       About:            Ashok is the Global Head of Manufacturing and Engineering Services at Infosys. He is earning more than his other Infosys collegue. His package includes a combination of basic salary, perquisites, allowances, and bonus/incentives




4.)   Name :            Balu Ganesh Ayyar
       Company:        Mphasis
       Remuneration: Rs  6.7 crore
       About:            The CEO of Mphasis an independent unit of Hewlett-Packard gets his pay package through a combination of salary, bonus, benefits/perquisites, and PF and other funds. He made a high jump in terms of remuneration from 4.88 crores to directly 6.7 crores and get himself placed in 4th position.

                                                     
3.)   Name :            N Chandrasekaran
       Company:        Tata Consultancy Services
       Remuneration: Rs  8.01 crore
       About:            He is the Chief Executive Officer and Managing Director of TCS. His remuneration comes through a combination of salary, benefits, perquisites, allowances, and commission. Again a quite high jump in remuneration. he touched the figure 8 in enumeration and makes the way to 3rd position.

                                       

2.)   Name :            Vineet Nayar
       Company:        HCL Technologies
       Remuneration: Rs  8.52 crore
         About:            He is Vice Chairman and Chief Executive Officer of HCL Technologies Ltd. He earns his pay through a package that combines salary, allowances, perquisites, contribution to PF and salary, and perquisites from the subsidiaries of the company. He holds the second position and just behind his company's strategy officer Shiv Nadar.




                                         



1.)   Name :            Shiv Nadar
       Company:        HCL Technologies
       Remuneration: Rs  9.84 crore
       About:            He is the Chairman and Chief strategy Officer at HCL Technolgies Ltd. He captured the 1st place in this list by getting the income of 9.84 crores- a bit less them 10 crores. His pay package is a combination of salary, allowances, perquisites, contribution to PF and salary, and perquisites from the subsidiaries of the company.




If You are having any query, then mail me or comment here! 
If You like this post then Share and Like this on social Site. 
Keep Enjoying!

Recover Deleted Files in Mac, Windows and Linux

Have you Deleted something important from your computer, do not worry go through this post and explore the ways in which you can recover your deleted files on your Device, I sure this post will be of much help for you.
Yes it is possible to recover important data or file even when it is deleted from the Recycle bin in Windows/Linux or Trash in Mac.
Firstly, understanding what happens when you delete any file permanently. What your OS does is , it assign the space as free. It implies that your Data is still on your computer but part of disk on which your data is present is registered to be overwritten whenever the space is needed. You can recover the data which is not overwritten, it will be a good file and you can use it ( you can recover the overwritten data also but it will come in the category of Bad file so you cannot use it.). So when you realize that your have deleted something important and want to recover than stop doing things on your computer like copying files, intallling and uninstalling softwares etc. Take a breadth and search for the required software. It is better to have  recovery software pre-installed or Intall the software on USB media.


Second step : 

Windows: 

  For Windows lots of  free Recovery softwares are available. I am giving description of few which I myself has verified.

1. TOKIWA DataRecovery

It is a freeware software written by TOKIWA. It support following file systems : FAT12, FAT16, FAT32 and NTFS, for recovering deleted data. It can be used for both NTFS encryption and EFS encryption files. Its Zip size is very small only 198 KB. Main advantage is that it does not require intallation , it is portable. So it increase the chances of recovery.

Download: TOKIWA DataRecovery








2. Undeleted Plus

Using this software you can recover deleted data in quick and effective way. It support Win 95/98/Me/NT/2000/XP/2003/Vista/ 7 Operating systems. It supports all the all the Windows file system hard drives including FAT12/16/32,NTFS/NTFS5, and Image recovery from MultiMedia, SmartMedia, CompactFlash and Secure Digital cards.

Download: UndeletePlus

 

3. Recuva
 This recovery software is quite popular and support window 8/7/ vista/ xp/ 2000  both 32 bit and 64 bit. It can recover files permanent deleted files from your Windows Computer, USB flash drives, memory cards, MP3's etc. It is very easy to use.

Download: Recuva





LINUX

In linux or Unix there are no. of ways to recover deleted data but I going with Recovering deleted data with utilities. I am choosing utilities because these are quite effective, fast and also able to recover more a data in little time. Some of the Utilities which will be helpful are

PhotoRec

Its very good utility which can be used to recover large amount of data including videos, documents , music, pictures,etc on computer hard-drive, USB flash drives, memory card, etc . Main feature of this tool is that it can be used in Windows , Linux, or even in Mac.
This software does have nice user interface, its look like terminal or command prompt but you don't need to write commands, just use Arrow-keys and Enter ,to select and work.

Download: PhotoRec





TestDisk

Its also a nice utility which can be used to recover data from the crashed hard drive or it can be used to make non bootable drive to bootable drive. If you are using Unix, linux, Windows or  Mac, it does not matter you can recover them all. It is also very easy to use.

Download: TestDisk




Safecopy

When all other tool give up, one good tool you have Safecopy Recovery tool. It have good GUI as well as better function. When you are recovering some data and an error occurs than most of the utilities well tell you to restart the process but Safecopy keeps on going and recover the most.

Download: Safecopy





Mac

For Mac users some of the good utilities are Disk Drill, Mac Trash recovery, etc.

Disk Drill

Disk Drill basic version comes free. It is quite flexible and very easy to use. It protect the data from accidental delection by its Recovery vault. This Vault contains the properties of the data like name, file type, etc, so it comes in handy to recover data by just few clicks.

Download: Disk Drill







Mac Trash Recovery

This tool is very flexible and handy to use. It can recover most of your data including videos, music, archives, documents, etc. It is also user-friendly and able to recover data  from Macbook, iPod and Mac desktop, USB drives, digital camera, mobile phones and other storage media.

Download: Mac Trash Recovery






If You are having any query, then mail me or comment here! 
If You like this post then Share and Like this on social Site.
 Keep Enjoying!

Download Best PDF Reader - Foxit


Adobe PDF Reader, I hope you have heard of it or might be you are the one of its user. But have you heard of Foxit PDF Reader, may or may be not. So no Problem here I am going to tell you the benefits and all important information about Foxit PDF Reader and also give you the downloading link.



 The Foxit Reader is a small, fast, and feature rich PDF Reader which allows you to open,  view, and print any PDF file. It has features like the ability to add annotations to PDF, fill   out PDF forms, and share information with social networks. Foxit Reader provides integration to DocuSign®, allowing users to easily send, sign and save PDF documents using the industry's most widely used eSignature solution. Foxit Reader also integrates into Microsoft®SharePoint® and Active Directory® Rights Management Services. It has a small footprint that starts up instantly, renders PDF files quickly and uses very little memory. With in a second the pdf will be in front of your eyes. The Foxit Reader is packed full of convenient and easy to use viewing, commenting and printing features that make document collaboration simple.It is very much secured. If you are using this then don't worry about the virus infections. Foxit Reader's PDF secure platform insures worry free operation against malicious virus and provides a secure and reliable digital signature verification platform for PDF documents without putting the user at risk from falsified documents.

Best things you should keep in mind about Foxit is-

  •  The Best PDF Reader – Over 130 Million Users.
  •  Have same look like Adobe, so no need to worry how to work on it.
  •  It is very fast. -It reads PDF files without waiting. It is very much fast if compared  to Adobe also.
  • Lightweight - PDF reader that is easily deployable and doesn't exhaust system resources.
  • Secure - so you don't get infected with viruses and can keep sensitive information safe within your PDF documents.
  • A Platform - so you can extend the Foxit Reader by creating your own value added capabilities for internal use or for resale.
  • Free spell checker for comments.
  • Multimedia Support: Add Images, movies, Links and file attachments to any PDF document.
  • Text Viewer & Text Converter
  • Safe Mode Settings in Installation.
  • Free

Security Aspects: It has 5 ways to tackle out security issues.


  • Security Warning Dialog:By standard operation default mode, the Foxit Reader will warn users if a PDF document attempts to call or run an external command. 

  • Trust Manager (Safe Mode):The Trust Manager allows users to select a safe mode operation. Safe Mode, once selected, prevents suspicious external commands to be executed by Foxit Reader. 

  • Verify the Digital Signature: This new verification process provides a secure and reliable platform for exchanging electronics documents without putting the user at risk from falsified documents.


  • Enhance Security with ASLR & DEP Support: Foxit Reader continues to add features that increase security by making it harder for hackers to compromise a PDF document. The current version of the reader includes Address Space Layout Randomization, ASLR, which uses a random algorithm to determine a memory address used to store key file data.

  • Disable JavaScript: Foxit Reader includes the option for turning off JavaScript entirely. 




Features Of Foxit PDF Reader:
  • Viewing PDF Files: You can view any PDF file very fast. It takes no time to load.

  • DocuSign® Integration: Foxit Reader provides integration to DocuSign, allowing users to easily send, sign and save PDF documents and forms using the industry's most widely used eSignature solution. New users can sign up for DocuSign services. Existing users can log into DocuSign to sign and send PDF documents and forms quickly and easily from the Foxit Reader toolbar.

  • Listening to PDF Files: If you have Speech Application Programming Interface 5 (SAPI 5) installed for text-to-speech, you can choose to have Foxit Reader read your PDF documents to you. In addition to normal text content, Read Out Loud can also read comments, image descriptions, and fill-able fields.

  • Social Networks Integration: Foxit Reader users can login to their account, select text (paragraph) from a PDF document, and share it as Facebook or Twitter status. Users can also take a snapshot of a region of a document and share it as a picture on Facebook or Twitter. 

  • Standard and XFA Form Filling:There are two kinds of form files. First, is a PDF file with fill-able fields, which enables you to fill the form directly by clicking the form fields without using other features. This is called an interactive PDF form. The other kind of form is a plain PDF file with lines for text, which should be filled with the typewriter feature in Foxit reader. This is called a non-interactive PDF form.

  • Navigating Documents:You can navigate in PDF documents by paging through or by using navigational tools such as; bookmarks, page thumbnails, links and working with layers. 

  • Layer Panel:With Foxit Reader, you can control the display of PDF layers with the Layer panel. For example, you may divide background imagery, main content areas, and advertisements amongst their own top-level layers, and easily hide the layers that you don't want others to view.

  • Finding Text: Foxit Reader provides handy tools to find text. You can search text in PDF files, folders, disks, and also on the internet. Also, you can limit your search by choosing the options offered on the Find Text dialog box to find specific items.

  • Verifying the Digital Signature:This new verification process provides a secure and reliable platform for exchanging electronics documents without putting the user at risk from falsified documents.

  • E-mailing Documents:You may need to send a PDF file you are reading to a customer to speed up your daily work, or an interesting story that you want to recommend to your friends. This can be done easily in Foxit Reader.

  • Saving Documents: Foxit Reader provides you with the power to do more when saving PDF documents. You can save a PDF document without additional usage rights in many different ways.

  • Adding Comments: You can type a text message or add a line, circle, or other shape to make comments on PDF files you are reading with Foxit Reader commenting tools.

  • Microsoft® SharePoint® and Active Directory® Rights Management Service Integration:Key integration features include:
    • PDF File decryption, allowing users to decrypt AD RMS 2.0 complaint PDF files so users with the correct credentials can access them based on the permissions they have been granted.
    • Support Microsoft Office® Workflows - Provides a consistent user experience to protect PDF documents in a similar workflow as protecting Microsoft Office documents.
    • Works with SharePoint® - Decrypts and opens AD RMS 2.0 protected files on SharePoint servers.
    • SharePoint file check-in/check-out - Allows users to seamlessly checkout and check in PDF files located in SharePoint through the Foxit Reader.
    • AD RMS 2.0 Protect PDF Plug-in Module - This plug-in allows users to encrypt PDF files compliant with AD RMS 2.0.
    • IRM Compliant - Complies with Microsoft's IRM Protection for PDF Specification Supplement for ISO 32000.

  • JavaScript Support:With Foxit Reader, you can invoke JavaScript code using actions associated with documents, bookmarks, links, and pages.

  • Printing:This is a process for reproducing text and images. When you have finished reading a helpful article or designing a PDF form, you may need to send it to an inkjet or laser printer and print it out with custom page sizes.

  • Customization:Change your Reader's skin to choose the look of your Reader from the basic skins with a few simple clicks. 
Comparison Adobe Vs Foxit:

  • Also, in terms of portability, Foxit is excellent, some guest PC’s may not have a PDF reader installed, in that case, having the 1MB foxit in your portable device can come in very handy.
  • One of the differences is the memory consumed, Foxit consumes less memory than Adobe, and you can notice this by the time each application takes to startup, also while using the application, you’ll notice Foxit responds a lot faster. I guess this is onr of the reasons for Foxit’s success. Also Foxit is a simple application; you could also get the standalone version (no installer, just one EXE) of it, compared to Adobe’s 20 something MB installer which takes a considerable amount of time to install compared to Foxit’s standalone EXE.
Awards:
  • Foxit Reader gets "The Best Free Software of 2011" from PC Magazine .
  • CNET gives Foxit Reader a rating of 5 out of 5 stars.
  • Foxit Reader listed in PC World's "Special List Issues" as one of the "50 Tools to Speed Up Your PC".
  • Foxit Reader was named to PC World's '101 Fabulous Freebies' list in Tune Up (Utilities and System Tools.

Download Foxit PDF Reader From- 

System Requirements

1.Operating Systems
  • Microsoft Windows® XP Home, Professional,or Tablet PC Edition with Service Pack 2 or 3 (32-bit & 64-bit).
  • Windows Vista® Home Basic, Home Premium, Business, Ultimate, or Enterprise with or without Service Pack 1 (32-bit & 64-bit).
  • Windows 7 (32-bit & 64-bit).
  • For users utilizing the Active Directory Rights Management Service and SharePoint integration capability, Windows 7 or Windows Vista with Service Pack2 (SP2) is required.
2.Hardware requirements:
  • 1.3 GHz or faster processor.
  • 64 MB RAM (Recommended: 128 MB RAM or greater).
  • 52 MB of available hard drive space.
  • 800x600 screen resolution.
Are you having any query ?, then mail me or comment here!  
If You like this post then Share and Like this on social Site.
Keep Enjoying!









  












Phishing


As many people were curious to know How to hack Facebook account ? How to hack Gmail account ? etc.  One of the tool Hacker or Attacker can use to hack your account is Phishing.
Phishing is the illegal act of acquiring someone's personal information. Its a kind of forgery. Phishing is kind of social engineering techniques which is used to fool user by taking their private or personal information such as their username, password, credit card number, etc. Its a fraudulent use of Web technology, although sometimes it is performed using the phone.
Recently it is done by e-mail spoofing in which a hacker may send a legitimate looking mail which looks like to come from a trustworthy site. This mail will contain the link which will redirect you to the some page and ask you to fill the details like your personal information. These details on submission is sent to the hacker, who can use it in many ways like transferring your money, taking a property on your identity,etc.

Various techniques behind Phishing attack

1. Link Manipulation
Mostly, the Phishing methods uses link manipulation like misspelled links, which sometimes not look suspicious at first site but when you take the closer look you may identify it.
Some examples are:
www.facbook.com ,
www.microsoft.com/account-verifications123/
www.ebay.com/personalinfo-check/

2. Filter Evasion
Phishers are now using images instead of text which makes it harder to detect text by anti-phishing filters. This is the main reason Gmail or Yahoo , by default, disable the images of the incoming mails.

3. Phone Phishing
All the phishing do not required a fraudulent web-page. It can also be done by phone. Once it was reported that Phone call came to the user, person who called used fake details to convince the user that he was legitimate person and asked the user to user to send the account number with Pin, to verify there account.

How to identify the Phishing/fraudulent mail

The phishing mail generally contain the phrases which refers some urgency so that you response immediately without thinking. Example of such phrase is, "If you don’t respond within 48 hours, your account will be deactivated."
"Verify your account."
Phrases like this can be found in the mail. Legitimate sites never ask you to send your personal details through email.

Phishing mails are generally sent in bulk, so many-times it happen that the mail will not contain your first or last name, instead some other thing will be written like
"Dear Valued Customer.”
Generally some phrases or sentence are mentioned in the mail which ask you to click on the link like
“Click the link below to gain access to your account.” or "click here.", etc.When you move over the mouse pointer on this link it will reveal the actual link to which your will be redirected. On closer look it link can be identified as if something is wrong about the link.
Read the Email carefully, if it contains spelling or grammatical error than it is surely a spam because legitimate mail will not have these types of errors.


Security & Precautions
  • Change your password frequently, more advisable is that change your password in every three months  and never use the same password for more than one sites.
  • Use Phishing filter, today, most of the browser Ex: Mozilla firefox, Google Chrome, Internet explore, Safari, etc, already have phishing filters but you need to check your security settings.
  • Do not respond to unsolicited mail which ask for the details of financial information. Try to know whom you are dealing with.
  • When you are doing any financial transaction remember to see the address bar, the URL should start with the "https".
  • Report anything suspicious to the proper authorities. Immediately alert the company or government agencies through the mail or telephone using Email or calling the number which you know as legitimate.
  • If you think you have recieved a phishing Email or you are redirected to the "phishy looking" web-page than you can report it to the Internet Crime Complaint Center at  www.ic3.gov, it is a partnership between the FBI and the National White Collar Crime Center. You can also send the report to US-CERT which stands for "United States Computer Emergency Readiness Team", on the email id "phishing-report@us-cert.gov." They ensure the proper action is taken. If you cannot sent the report than at-least send the URL to them, they will look forward to it.
  • Department of Justice also advice the three terms to the consumer, that are "Stop, Look, Call"                    >> Stop: Resist your urge to respond immediately even when if it is asked in the mail.                          >> Look: Read the mail several times and yourself some questions like why the request information would really be needed.    >> Call : Telephone or Email the report to the authorities using the legitimate phone no. or Email Id.

You got Phished ('_')

Now I will tell you, what to do when you got phished.
  • Respond immediately and contact the organisation and your financial instute, also report the complete matter to them.
  • Contact the three major Credit card bureaus and request them to put fraud alert on your credit card.
  • The credit bureaus and phone numbers are:
    • Equifax, 1-800-525-6285;
    • Experian, 1-888-397-3742;
    • TransUnion, 1-800-680-7289.
  •   File a complaint with the Federal Trade Commission at  www.ftc.gov or 1-877-382-4357.





If You are having any query, then mail me or comment here!    Keep Enjoying!