Thursday, April 26, 2012

Al Quran (4:3)


4:3









 And if you fear that you will not deal justly with the orphan girls, then marry those that please you of [other] women, two or three or four. But if you fear that you will not be just, then [marry only] one or those your right hand possesses. That is more suitable that you may not incline [to injustice].

புண்ணியம்

لَّيْسَ الْبِرَّ أَن تُوَلُّوا وُجُوهَكُمْ قِبَلَ الْمَشْرِقِ وَالْمَغْرِبِ وَلَٰكِنَّ الْبِرَّ مَنْ آمَنَ بِاللَّهِ وَالْيَوْمِ الْآخِرِ وَالْمَلَائِكَةِ وَالْكِتَابِ وَالنَّبِيِّينَ وَآتَى الْمَالَ عَلَىٰ حُبِّهِ ذَوِي الْقُرْبَىٰ وَالْيَتَامَىٰ وَالْمَسَاكِينَ وَابْنَ السَّبِيلِ وَالسَّائِلِينَ وَفِي الرِّقَابِ وَأَقَامَ الصَّلَاةَ وَآتَى الزَّكَاةَ وَالْمُوفُونَ بِعَهْدِهِمْ إِذَا عَاهَدُوا ۖ وَالصَّابِرِينَ فِي الْبَأْسَاءِ وَالضَّرَّاءِ وَحِينَ الْبَأْسِ ۗ أُولَٰئِكَ الَّذِينَ صَدَقُوا ۖ وَأُولَٰئِكَ هُمُ الْمُتَّقُونَ
புண்ணியம் என்பது உங்கள் முகங்களைக் கிழக்கிலோ, மேற்கிலோ திருப்பிக்கொள்வதில் இல்லை; ஆனால் புண்ணியம் என்பது அல்லாஹ்வின் மீதும், இறுதி(த் தீர்ப்பு) நாளின் மீதும், மலக்குகளின் மீதும், வேதத்தின் மீதும், நபிமார்கள் மீதும் ஈமான் கொள்ளுதல்; (தன்) பொருளை இறைவன் மேலுள்ள நேசத்தின் காரணமாக, பந்துக்களுக்கும், அநாதைகளுக்கும், மிஸ்கீன்(ஏழை)களுக்கும், வழிப் போக்கர்களுக்கும், யாசிப்பவர்களுக்கும், (அடிமைகள், கடனாளிகள்) போன்றோரின் மீட்புக்காகவும் செலவு செய்தல்; இன்னும் தொழுகையை ஒழுங்காகக் கடைப்பிடித்து முறையாக ஜகாத் கொடுத்து வருதல்(இவையே புண்ணியமாகும்); இன்னும் தாம் வாக்களித்தால் தம் வாக்குறுதிகளை நிறைவேற்றுவோரும்; (வறுமை, இழப்பு போன்ற) துன்பத்திலும், (நோய் நொடிகள் போன்றவற்றின்) கஷ்டத்திலும், யுத்த சமயத்திலும், உறுதியுடனும், பொறுமையுடனும் இருப்போரும் தான் நன்னெறியாளர்கள்; இன்னும் அவர்கள் தாம் முத்தகீன்கள்(பயபக்தியுடையவர்கள்). 2:177

What we inhale ? ? ?



Nicotine
Nicotine is a powerful insecticide and poisonous for the nervous systems. Furthermore, there is enough (50 mg) in four cigarettes to kill a man in just a few minutes if it were injected directly into the bloodstream. Indeed, fatalities have occurred with children after they had swallowed cigarettes or cigarette butts. 
When diluted in smoke, nicotine reaches the brain in just seven seconds, it stimulates the brain cells and then blocks the nervous impulse. This is where addiction to tobacco arises. Nicotine also causes accelerated heart rate, but at the same time it leads to contracting and hardening of the arteries: the heart pumps more but receives less blood. The result is twice as many coronary attacks. Nicotine thus also increases the consumption of lipids (which is why it has a weight-loss effect) and induces temporary hyperglycaemia (hence the appetite suppressing effect). 

Carbon monoxide (CO)
This is the asphyxiating gas produced by cars, which makes up 1.5% of exhaust fumes. But smokers inhaling cigarette smoke breathe in 3.2% carbon monoxide – and directly from the source.
Oxygen is mostly transported in blood by haemoglobin. When we smoke, however, the carbon monoxide attaches itself to the haemoglobin 203 times more quickly than oxygen does, thereby displacing the oxygen; this in turn asphyxiates the organism. This causes the following cardiovascular complaints: narrowing of the arteries, blood clots, arteritis, gangrene, heart attack, etc. . . . but also a loss of reflexes and visual and mental problems. It takes between six and 24 hours for the carbon monoxide to leave the blood system. 

Irritants 
These substances paralyse and then destroy the cilia of the bronchial tubes, responsible for filtering and cleaning the lungs. They slow down respiratory output and irritate the mucus membranes, causing coughs, infections and chronic bronchitis. 

Tars
As the cilia are blocked (see paragraph above), the tars in the cigarette smoke are deposited and collect on the walls of the respiratory tract and the lungs, and cause them to turn black. So, just because a smoker is not coughing, it doesn't mean that he or she is healthy! And this fact merely serves to pour water on one of the most common and poorest excuses given by smokers. The carcinogenic action of the tars is well known: they are responsible for 95% of lung cancers. It takes two days at least after cessation of smoking for the cilia to start functioning properly again, albeit only gradually. By smoking one packet of cigarettes every day, a smoker is pouring a cupful of these tars into his or her lungs every year (225 grams on average)! 

Chemistry of Tobacco Smoke 
No less than 4000 irritating, suffocating, dissolving, inflammable, toxic, poisonous, carcinogenic gases and substances and even radioactive compounds (nickel, polonium, plutonium, etc.) have been identified in tobacco smoke. Some of these are listed hereafter: Benzopyrene, dibenzopyrene, benzene, isoprene, toluene (hydorcarbons); naphthylamines; nickel, polonium, plutonium, arsenic, cadmium (metallic constituents); carbon dioxide, methane, ammonia, nitric oxide, nitrogen dioxide, 
hydrogen sulphide (gases); methyl alcohol, éthanol, glycerol or glycerine, glycol (alcohols and esters); acetaldehyde, acrolein, acetone (aldehydes and ketones); cyanhydric or prussic acid, carboxyl derivatives (acids); chrysene, pyrrolidine, nicoteine, nicotinine, nicoteline, nornicotine, nitrosamines (alkaloids or bases); cresol (phenols), etc.

Wednesday, April 25, 2012

WHAT IS WHITE HAT

The term "white hat" in Internet slang refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing. White-hat hackers are also called "sneakers", red teams, or tiger teams.

History

One of the first instances of an ethical hack being used was a “security evaluation” conducted by the United States Air Force of the Multics operating systems for "potential use as a two-level (secret/top secret) system." Their evaluation found that while Multics was "significantly better than other conventional systems," it also had "... vulnerabilities in hardware security, software security, and procedural security" that could be uncovered with "a relatively low level of effort." The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Clearly, their audience wanted to know both results. There are several other now unclassified reports that describe ethical hacking activities within the U.S. military. The idea to bring this tactic of ethical hacking to assess security of systems was formulated by Dan Farmer and Wietse Venema. With the goal of raising the overall level of security on the Internet and intranets, they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools that they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program, called Security Analysis Tool for Auditing Networks, or SATAN, was met with a great amount of media attention around the world.

Tactics

While penetration testing concentrates on attacking software and computer systems from the start – scanning ports, examining known defects and patch installations, for example – ethical hacking, which will likely include such things, is under no such limitations. A full blown ethical hack might include emailing staff to ask for password details, rummaging through executive’s dustbins or even breaking and entering – all, of course, with the knowledge and consent of the targets. To try to replicate some of the destructive techniques a real attack might employ, ethical hackers arrange for cloned test systems, or organize a hack late at night while systems are less critical.

Some other methods of carrying out these include:
  • DoS attacks
  • Social engineering tactics
  • Security scanners such as:
    • W3af
    • Nessus
  • Frameworks such as:
    • Metasploit
Such methods identify and exploit known vulnerabilities, and attempt to evade security to gain entry into secured areas.

Beware of Spyware


Spyware


Has your computer ever become so slow that you can fix yourself a snack in the time it takes your word processor to open? Perhapsspyware is to blame.
Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power. They're designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. According to some estimates, more than 80 percent of all personal computers are infected with some kind of spyware [source: FaceTime Communications]. But before you chuck your computer out the window and move to a desert island, you might want to read on. In this article we'll explain how spyware gets installed on your computer, what it does there and how you can get rid of it.
Some people mistake spyware for a computer virus. A computer virus is a piece of code designed to replicate itself as many times as possible, spreading from one host computer to any other computers connected to it. It usually has a payload that may damage your personal files or even your operating system.
Spyware, on the other hand, generally isn't designed to damage your computer. Spyware is defined broadly as any program that gets into your computer without your permission and hides in the background while it makes unwanted changes to your user experience. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.
At present, most spyware targets only the Windows operating system. Some of the more notorious spyware threats include Trymedia, Nuvens, Estalive, Hotbar and New.Net.Domain.

How Your Computer Gets Spyware

Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to buttons that say "cancel" when they really install spyware.Here are some of the general ways in which spyware finds its way into your computer:
Internet Explorer security warning
  • Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get would be your browser's standard message telling you the name of the software and asking if it's okay to install it. If your security settings are set low enough, you won't even get the warning.
  • Piggybacked software installation - Some applications -- particularly peer-to-peer file-sharing clients -- will install spyware as a part of their standard installation procedure. If you don't read the installation list closely, you might not notice that you're getting more than the file-sharing application you want. This is especially true of the "free" versions that are advertised as alternatives to software you have to buy. As the old saying goes, there's no such thing as a free lunch.
  • Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they'll do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware themselves. Particularly nasty add-ons are considered browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.
  • Masquerading as anti-spyware -- This is one of the cruelest tricks in the book. This type of software convinces you that it's a tool to detect and remove spyware.
When you run the tool, it tells you your computer is clean while it installs additional spyware of its own.

What Spyware Can Do

Spyware can do any number of things once it's installed on your computer.
At a minimum, most spyware runs as an application in the background as soon as you start your computer up, hogging RAM and processor power. It can generate endless pop-up ads that make your Web browser so slow it becomes unusable. It can reset your browser's home page to display an ad every time you open it. Some spyware redirects your Web searches, controlling the results you see and making your search engine practically useless. It can also modify the dynamically linked libraries (DLLs) your computer uses to connect to the Internet, causing connectivity failures that are hard to diagnose. At its very worst, spyware can record the words you type, your Web browsing history, passwords and other private information.
Certain types of spyware can modify your Internet settings so that if you connect through dial-up service, your modem dials out to expensive, pay telephone numbers. Like a bad guest, some spyware changes yourfirewall settings, inviting in more unwanted pieces of software. There are even some forms that are smart enough to know when you try to remove them in the Windows registry and intercept your attempts to do so.
The point of all this from the spyware makers' perspective isn't always clear. One reason it's used is to pad advertisers' Web traffic statistics. If they can force your computer to show you tons of pop-up ads and fake search results, they can claim credit for displaying that ad to you over and over again. And each time you click the ad by accident, they can count that as someone expressing interest in the advertised product.
Another use of spyware is to steal affiliate credits. Major shopping sites like Amazon and eBay offer credit to a Web site that successfully directs traffic to their item pages. Certain spyware applications capture your requests to view sites like Amazon and eBay and then take the credit for sending you there.


Other "WARE"
  • Malware -- a general term for any program that makes changes (does malicious or "bad" things) without your express permission
  • Adware -- programs designed specifically to deliver unrequested advertising
  • Stealware -- specific spyware designed to capture clicks or Web-site referral credits
  • Browser hijacker -- a malicious program that becomes deeply embedded in your browser's code and core functionality


Legality

So is it legal to install difficult-to-remove software without the user's permission? Not really. There's an increasing body of state legislation that explicitly bans spyware, including the Spyware Control Act in Utah and the Consumer Protection Against Computer Spyware Act in California. But even without these new state laws, federal law already prohibits spyware. The Computer Fraud and Abuse Act covers any unauthorized software installations. Deceptive trade practices of any kind also violate the Federal Trade Commission Act. Additionally, the Electronic Communications Privacy Act makes it unlawful for companies to violate the security of customers' personal information.
Just like anti-spam legislation, these spyware laws can be very difficult to enforce in practice, and the perpetrators know it. It can be tough to find hard evidence connecting individual companies to their spyware products, and, as with all Internet-related lawsuits, there are often battles over which court's jurisdiction applies to the case. Just because it's illegal doesn't mean it's easy to stop.
How can you protect yourself against spyware, and what can you do if you think you already have some on your computer? Here are a few suggestions.

Use a spyware scanner.

There are several applications you can turn to for trustworthy spyware detection and removal, including Ad-awareSpybot and Microsoft AntiSpyware, which is currently in beta. All three are free for the personal edition. These work just like your anti-virus software and can provide active protection as well as detection. They will also detect Internet cookies and tell you which sites they refer back to.
Note - Once you know which spyware is on your computer, in some cases you'll need to seek specific instructions on how to remove it. Links to some of those instructions are listed in the "Spyware Help" box to the right, and more are included in the Lots More Information section at the end of this article. Here are a few more solutions:

Use a pop-up blocker.

Many of the current browsers, including Internet Explorer 6.0 and Mozilla Firefox 1.0, have the ability to block all Web sites from serving you pop-up windows. This function can be configured to be on all of the time or to alert you each time a site wants to pop up a new window. It can also tell you where the pop-up is coming from and selectively allow windows from trusted sources.

Disable Active-X.

Most browsers have security settings in their preferences which allow you to specify which actions Web sites are allowed to take on your machine. Since many spyware applications take advantage of a special code in Windows called Active-X, it's not a bad idea to simply disable Active-X on your browser. Note that if you do this, you will also disallow the legitimate uses for Active-X, which may interfere with the functionality of some Web sites.

Be suspicious of installing new software.

In general, it pays to be suspicious when a site asks to install something new on your computer. If it's not a plug-in you recognize, like Flash, QuickTime or the latest Java engine, the safest plan of action is to reject the installation of new components unless you have some specific reason to trust them. Today's Web sites are sophisticated enough that the vast majority of functionality happens inside your browser, requiring only a bare minimum of standard plug-ins. Besides, it never hurts to reject the installation first and see if you can get on without it. A trustworthy site will always give you the opportunity to go back and download a needed component later.

Use the "X" to close pop-up windows.

Get to know what your computer's system messages look like so that you can spot a fake. It's usually pretty easy to tell the difference once you get to know the standard look of your system alerts. Stay away from the "No thanks" buttons if you can help it, and instead close the window with the default "X" at the corner of the toolbar. For an even more reliable option, use the keystroke combination for "close window" built into your software. You can look in your browser's "File" menu to find it.



Crop Circles

Crop Circle Image Gallery­
Crop circles are patterns that appear in fields. The pattern is created when certain areas of the crops are tamped down, but others are left intact. The edge is so clean that it looks like it was created with a machine. Even though the stalks are bent, they are not damaged. Most of the time, the crop continues to grow as normal.
Sometimes, the patterns are simple circles. In other instances, they are elaborate designs consisting of several interconnecting, geometric shapes.
Farmers have reported finding strange circles in their fields for centuries. The earliest mention of a crop circle dates back to the 1500s. A 17th century English woodcut shows a devilish creature making a crop circle. People who lived in the area called the creature the "mowing devil."
In an 1880 issue of the journal Nature, amateur scientist John Rand Capron reported on a formation near Guildford, Surrey, in the south of England. He described his finding as "a field of standing wheat considerably knocked about, not as an entirety, but in patches forming, as viewed from a distance, circular spots." He went on to say, "... I could not trace locally any circumstances accounting for the peculiar forms of the patches in the field ... They were suggestive to me of some cyclonic wind action ..."
Mentions of crop circles were sporadic until the 20th century, when circles began appearing in the 1960s and '70s in England and the United States. But the phenomenon didn't gain attention until 1980, when a farmer in Wiltshire county, England, discovered three circles, about 60 feet (18 meters) across each, in his oat crops. UFO researchers and media descended on the farm, and the world first began to learn about crop circles.
By the 1990s, crop circles had become something of a tourist attraction. In 1990 alone, more than 500 circles emerged in Europe. Within the next few years, there were thousands. Visitors came from around the world to see them. Some farmers even charged admission to their mysterious attractions.

Tuesday, April 24, 2012

This is to my parents

 رَّبِّ ارْحَمْهُمَا كَمَا رَبَّيَانِي صَغِيرًا