Monday, June 18, 2012

Convert PowerPoint presentations into Video

click here to go to download page  
License model
Free to try
Limitations
Demo message
Operating systems
Windows 2000, Windows Vista, Windows XP
Additional requirements
Windows 2000/XP/2003 Server/Vista
Publisher's description
Presentations to Video Converter allows you to convert PowerPoint presentations into Video, Flash Movie, Animated GIF, DVD. The converting process allows human interaction on PowerPoint content during conversion. Version 5.9 includes unspecified updates.
 
 


--
rk@+94718080883
http://rkark.blogspot.com
http://hockalmunai.blogspot.com


Daily Hadith Online الحديث اليومي

  • Hadith on Rights: All people have a right to their basic needs of food, water, shelter, and clothing
  • Hadith on Reliance: If Muslims work for their provision like the birds do, then Allah will provide
  • Hadith on Trust: People who trust Allah like the birds will enter Paradise
  • Hadith on Reliance: Abraham and Muhammad relied upon Allah when the people gathered to harm them

Uthman ibn Affan reported: The Prophet, peace be upon him, said, "There is no right for the son of Adam except in these things: a house in which he lives, a garment to cover his nakedness, a piece of bread and water."
[Sunan At-Tirmidhi, Book of Asceticism, Number 2341, Sahih]
عَنْ عُثْمَانَ بْنِ عَفَّانَ أَنَّ النَّبِيَّ صَلَّى اللَّهُ عَلَيْهِ وَسَلَّمَ قَالَ لَيْسَ لِابْنِ آدَمَ حَقٌّ فِي سِوَى هَذِهِ الْخِصَالِ بَيْتٌ يَسْكُنُهُ وَثَوْبٌ يُوَارِي عَوْرَتَهُ وَجِلْفُ الْخُبْزِ وَالْمَاءِ
قَالَ أَبُو عِيسَى هَذَا حَدِيثٌ حَسَنٌ صَحِيحٌ
سنن الترمذي كتاب الزهد عن رسول الله صلى الله عليه وسلم باب منه
  

Umar ibn Al-Khattab reported: The Messenger of Allah, peace be upon him, said, "If you were to rely upon Allah with reliance due to Him, then He would provide for you just as He provides for the birds. They go out in the morning with empty stomachs but return full."
[Sunan At-Tirmidhi, Book of Asceticism, Number 2344, Sahih]
عَنْ عُمَرَ بْنِ الْخَطَّابِ قَالَ قَالَ رَسُولُ اللَّهِ صَلَّى اللَّهُ عَلَيْهِ وَسَلَّمَ لَوْ أَنَّكُمْ كُنْتُمْ تَوَكَّلُونَ عَلَى اللَّهِ حَقَّ تَوَكُّلِهِ لَرُزِقْتُمْ كَمَا يُرْزَقُ الطَّيْرُ تَغْدُو خِمَاصًا وَتَرُوحُ بِطَانًا
قَالَ أَبُو عِيسَى هَذَا حَدِيثٌ حَسَنٌ صَحِيحٌ
سنن الترمذي كِتَاب الزُّهْدِ عَنْ رَسُولِ اللَّهِ صَلَّى اللَّهُ عَلَيْهِ وَسَلَّمَ بَاب فِي التَّوَكُّلِ عَلَى اللَّهِ
  

Abu Huraira reported: The Prophet, peace be upon him, said, "People whose hearts are like the hearts of birds will enter Paradise."
[Sahih Muslim, Book 40, Number 6808]
عَنْ أَبِي هُرَيْرَةَ عَنْ النَّبِيِّ صَلَّى اللَّهُ عَلَيْهِ وَسَلَّمَ قَالَ يَدْخُلُ الْجَنَّةَ أَقْوَامٌ أَفْئِدَتُهُمْ مِثْلُ أَفْئِدَةِ الطَّيْرِ
صحيح مسلم كِتَاب الْجَنَّةِ وَصِفَةِ نَعِيمِهَا وَأَهْلِهَا بَاب يَدْخُلُ الْجَنَّةَ أَقْوَامٌ أَفْئِدَتُهُمْ مِثْلُ أَفْئِدَةِ الطَّيْرِ
  

Ibn Abbas reported: "Sufficient for us is Allah, and He is an excellent protector" was said by Abraham, upon him be peace, when he was thrown into the Fire; and it was said by Muhammad, peace be upon him, when they said, "Indeed, the people have gathered against you, so fear them; but it only increased them in faith and they said: sufficient for us is Allah, and He is an excellent protector." (3:173)
[Sahih Bukhari, Book 60, Number 86]
عَنْ ابْنِ عَبَّاسٍ حَسْبُنَا اللَّهُ وَنِعْمَ الْوَكِيلُ قَالَهَا إِبْرَاهِيمُ عَلَيْهِ السَّلَام حِينَ أُلْقِيَ فِي النَّارِ وَقَالَهَا مُحَمَّدٌ صَلَّى اللَّهُ عَلَيْهِ وَسَلَّمَ حِينَ قَالُوا إِنَّ النَّاسَ قَدْ جَمَعُوا لَكُمْ فَاخْشَوْهُمْ فَزَادَهُمْ إِيمَانًا وَقَالُوا حَسْبُنَا اللَّهُ وَنِعْمَ الْوَكِيلُ
صحيح البخاري كِتَاب تَفْسِيرِ الْقُرْآنِ سُورَةُ آلِ عِمْرَانَ بَاب إِنَّ النَّاسَ قَدْ جَمَعُوا لَكُمْ فَاخْشَوْهُمْ الْآيَةَ
  
--
rk@+94718080883


Tuesday, June 12, 2012

Love for one another

When a husband and wife look at each other with love, Allah looks at both with Mercy (Sahih Bukhari 6: 19 and Tirmidhi 14: 79) 

Successful Marriage - The missing link

“And among His signs is that He created for you mates from among yourselves that you may dwell in tranquility with them, and He has put love and mercy between you; verily, in that are signs for people who reflect.” (Qur’an, 30:21) 

We’ve all read this verse on countless marriage announcements. But how many have actualized it? How many of our marriages really embody that love and mercy described by Allah? What is going wrong when so many of our marriages are ending in divorce? 

According to Dr. Emerson Eggerichs, author of Love & Respect: The Love She Most Desires; The Respect He Desperately Needs, the answer is simple. In his book, Eggerichs explains that extensive research has found that a man’s primary need is for respect, while a woman’s primary need is for love.
He describes what he calls the “crazy cycle” - the pattern of argumentation that results when the wife does not show respect and the husband does not show love. He explains how the two reinforce and cause one another. In other words, when a wife feels that her husband is acting unloving, she often reacts with disrespect, which in turn makes the husband act even more unloving. 

Eggerichs argues that the solution to the “crazy cycle” is for the wife to show unconditional respect to her husband and for the husband to show unconditional love to his wife.
This means that a wife should not say that first her husband must be loving before she will show him respect. By doing so, she will only bring about more unloving behaviour. And a husband should not say that first his wife must be respectful before he will show her love. By doing so, he will only bring about more disrespectful behaviour. 

The two must be unconditional. When I reflected on this concept, I realized that looking at the Quran and prophetic wisdom, there are no two concepts more stressed with regards to the marital relationship.
To men, the Prophet, upon Him peace and blessings said,“Take good care of women, for they were created from a bent rib, and the most curved part of it is its top; if you try to straighten it, you will break it, and if you leave it, it will remain arched, so take good care of women.” (Bukhari and Muslim)
The beloved Prophet (Upon Him peace and blessings) has further stressed, “The most perfect believer in the matter of faith is one who has excellent behavior; and the best among you are those who behave best towards their wives.” (Al-Tirmidhi) 

The Prophet (Upon Him peace and blessings) has also said, “A believing man should not hate a believing woman; if he dislikes one of her characteristics, he will be pleased with another.” (Muslim)
Allah, Almighty says, “…Live with them in kindness. For if you dislike them - perhaps you dislike a thing and Allah makes therein much good.” (Qur’an, 4:19). In these jewels of wisdom, men are urged to be kind and loving towards their wives. Moreover, they are urged to overlook their wife’s faults when showing that kindness and love. 

On the other hand, when addressing the wife, the focus is different. Why are women not told again and again to be kind and loving towards their husbands? Perhaps it is because unconditional love already comes naturally to women. 

Few men complain that their wives do not love them. But many complain that their wives do not respect them. And it is this sentiment which is most stressed in the Quran and sunnah, with regards to wives.
Respect can be manifest in a number of ways. One of the most important ways to show respect is the respect of one’s wishes. When someone says, “I respect your advice,” they mean “I will follow your advice.” Respecting a leader, means doing what they say. Respecting our parents means not going against their wishes. 

And respecting one’s husband means respecting his wishes. The Prophet (Upon Him peace and blessings) has said, “When any woman prays her five, fasts her month, guards her body and obeys her husband, it is said to her, ‘Enter paradise from whichever of its doors you wish.’” (At-Tirmidhi)
Why are we as women told to respect and follow the wishes of our husbands?
It is because men are given an extra degree of responsibility. Allah says, “Men are the protectors and maintainers of women, because Allah has given the one more (strength) than the other, and because they support them from their means...” (Qur’an, 4:34). 

But won’t this unconditional respect towards one’s husband put us, as women, in a weak, submissive position? Won’t we set ourselves up to be taken advantage of and abused?
Quite the contrary. The Quran, the prophetic example, and even contemporary research have proven the exact opposite. 

The more respect a woman shows her husband, the more love and kindness he will show her. And in fact, the more disrespect she shows, the more harsh and unloving he becomes.
Similarly, a man may question why he should show kindness and love towards even a disrespectful wife. To answer this question, one only needs to look at the example of Omar Ibn ul-Khattab (May Allah be pleased with Him). 

When a man came to Hazrat Omar (who was Khalifah at the time) to complain of his wife, he heard Omar’s own wife yelling at him. While the man turned to leave, Hazrat Omar called him back.
The man told Hazrat Omar that he had come to complain of the same problem that Omar himself had.
To this Omar replied that his wife tolerated him, washed his clothes, cleaned his home, made him comfortable, and took care of his children. 

If she did all of this for him, how could he not tolerate her when she raised her voice?
This story provides a beautiful example for all of us - not only for the men.
This story is a priceless illustration of tolerance and patience, which is essential for any successful marriage. Moreover, consider the reward in the hereafter for those who show patience: Allah says, “Only those who are patient shall receive their reward in full without reckoning (or measure).” (Qur’an, 39:10)
Source: InFocus.

The Quran on deep seas and internal waves

God has said in the Quran: Or (the unbelievers’ state) is like the darkness in a deep sea. It is covered by waves, above which are waves, above which are clouds. Darknesses, one above another. If a man stretches out his hand, he cannot see it...(Quran, 24:40)
This verse mentions the darkness found in deep seas and oceans, where if a man stretches out his hand, he cannot see it. The darkness in deep seas and oceans is found around a depth of 200 meters and below. At this depth, there is almost no light (see figure 15). 


Figure 16: Internal
waves at interface
between two layers of water
of different densities. One is
dense (the lower one), the other one
is less dense (the upper one). (Oceanography,
Gross, p. 204.)

Below a depth of 1000 meters there is no light at all. Human beings are not able to dive more than forty meters without the aid of submarines or special equipment. Human beings cannot survive unaided in the deep dark part of the oceans, such as at a depth of 200 meters. Scientists have recently discovered this darkness by means of special equipment and submarines that have enabled them to dive into the depths of the oceans. We can also understand from the following sentences in the previous verse, “...in a deep sea. It is covered by waves, above which are waves, above which are clouds...”, that the deep waters of seas and oceans are covered by waves, and above these waves are other waves.
It is clear that the second set of waves are the surface waves that we see, because the verse mentions that above the second waves there are clouds. But what about the first waves? Scientists have recently discovered that there are internal waves which “occur on density interfaces between layers of different densities.” (See figure 16).
The internal waves cover the deep waters of seas and oceans because the deep waters have a higher density than the waters above them. Internal waves act like surface waves. They can also break, just like surface waves. Internal waves cannot be seen by the human eye, but they can be detected by studying temperature or salinity changes at a given location. 

Why do Westerners convert to Islam?

Transcript of part of an interview conducted by Dr. Tariq Ramadan with sister Batool al-Toma, director of the New Muslims project at the Islamic Foundation, UK, in the weekly TV programme Islam and Life.

In the interview, sister Batool, herself a convert to Islam, explains the different reasons that encourage Westerners to decide to become Muslim.

Tariq Ramadan: This week we are going to discuss the challenges facing people who convert to Islam. I have always held the religion of Mohammed in high estimation because of its wonderful vitality. It is the only religion which appears to me to possess that assimilating capacity to the changing phases of existence which can make itself appeal to every age." George Bernard Shaw

Famous Western Muslims


Dr. Tariq Ramadan with sister Batool al-Toma
People in the Western world have been converting to Islam for some time. Cassius Clay, the three times World Heavyweight boxing Champion, embraced Islam in 1965. He said, "The feelings I had while standing on Mount Arafat on the day of the Hajj was the most unique. I felt exalted by the indescribable spiritual atmosphere there as over one and a half million pilgrims invoked God to forgive them for their sins. It was an exhilarating experience to see people belonging to different colours, races and nationalities, Kings, heads of state and ordinary men from very poor countries all clad in two simple white sheets praying to God without any sense of either pride or inferiority. It was a practical manifestation of the concept of equality in Islam."
As we all know, such superficialities have very little to do with true happiness - Jemima Goldsmith, daughter of the British billionaire Sir James Goldsmith, converted to Islam when she was only 21 years old. She said, "It would seem that a Western woman's happiness hinges largely upon her access to nightclubs, alcohol and revealing clothes; and the absence of such apparent freedom and luxuries in Islamic societies is seen as an infringement of her basic rights. However, as we all know, such superficialities have very little to do with true happiness."

After a long search for meaning and a life of fame, drugs and rock 'n' roll, Cat Stevens embraced the Muslim faith. He said, "I realized that this was the true religion - religion not in the sense the West understands it, not the type for only your old age. We must follow the will of God (Allah). Then, we can rise higher than the angels. The first thing I wanted to do now was to be a Muslim."
What do the Westerners see in Islam that makes them decide to become Muslims? Did the wars in Afghanistan and Iraq or Western support for Israel encourage westerners to convert? In 2009, approximately 40,000 Brits, 70,000 French nationals and 100,000 Americans became Muslims. What reasons lie behind these astonishing rates of conversion? What attracts people to Islam?
Tariq Ramadan: So these are the questions: Why are so many people are coming to Islam? What is attractive about Islam?

We spoke about this, but still what we want to discuss today is really what is happening, and in which way people could be attracted to Islam. Still when they are within the Muslim communities in the west such as which kind of problems and challenges they are facing which is not always easy.
These are very critical and important questions. So, people are attracted to Islam, towards its simplicity, the very essence and principles of Islam, and then when they come within the community these are the problems that they have to face.

I think that something is happening in the West which is quite clear that the people are attracted to Islam. You have been involved in dealing with converted people coming to Islam for the last 15 years. You yourself are a convert so you came to Islam, so if you were to respond to this very simple question: Why is this move towards Islam so frequent in our societies in the West?
Batool al-Toma: Well, it's quite difficult really because the attractions are wide and very varied, and people come to Islam for all sorts of different reasons. Obviously, one of the reasons since time immemorial has been the fact that people meet other Muslims, and there is an attraction there. There is personal relationship, and so they want to get married. This is one reason and this will always be there. We should always sort of look at these kinds of situations when somebody converts to Islam for the sake of marriage, there has always been the suggestion that they are not quite a good Muslim because they converted to Islam for that specific reason. But you know, this is not for us to decide. Allah's plan is much greater than our plan. And so Allah may have brought them to this situation for a reason.

Tariq Ramadan: It's a very important point. You are saying that the reasons why you come to Islam say nothing about the sincerity and the in-depth of your faith. It could be a reason that's apparent to all as marriage, but at the end of the day your intention, your heart could change over the process of becoming a Muslim? They have found something which is peace and harmony in Islam, and it has drawn them further in.
Batool al-Toma: Indeed, very much so. And you will often find that people who have converted to Islam for marriage or have married a Muslim and not had to convert in the situation of women, the women often become Muslims and become extremely sincere and practicing people. And they actually become a lesson and an example to other Muslims.

Tariq Ramadan: So, this is one dimension and it could be the majority situation in fact when you have people coming to know each other and it's for marriage. But we also have people like Cat Stevens who became Yusuf Islam, it was something that was his relationship to the Quran. He read the Quran, he got the Quran from his brother, and he read the Quran. And you have other people like Cassius Clay for example coming to Islam without anything which has to do with being in a relationship with someone, but the very essence of the message which is there is one God and which is your life has a meaning.
Batool al-Toma: Of course people come to Islam for all sorts of different reasons as I said. People because of all the dreadful situations that had occurred around the world, and have happened because Muslims have interpreted the Quran in terms of wanting to carry out these catastrophes for religious reasons, have triggered many non-Muslims to want to look into Islam to see what this religion says about terrorism, peace, peaceful coexistence with other people from other faiths and so on, and have been shocked and surprised by what they found in the Quran and the teachings of the Prophet (PBUH).

And I have had people come to me saying "I want to convert to Islam but I'm more shocked, I'm surprised that I have come this distance because it is not a faith that I would ever wish to look into."
But somehow because they have read into Islam in order to try to understand what goes on in the mind of Muslims who use their faith in order to carry out these terrible atrocities around the world. And they have found something which is peace and harmony in Islam and it has drawn them further in. They were unable to unhitch themselves from what they are reading and eventually they become Muslims.

Again you could have a student who is doing a module in Art in university, and they are introduced to Islamic art as part of their university degree course. And then they begin to realize this connection between art and the Creator, and you know how the artist and the Creator, the artist manifests the Creator's beauty and spirituality around the world. So, again it could be so many different reasons.

Tariq Ramadan: Yes, and we had so many stories coming from Iraq, Afghanistan, soldiers coming to know people and to learn more about Islam. And what you said is quite important about these different ways, but once again I think it's quite important not to judge the way but our sincerity with a way because it's something which is quite important.

Batool al-Toma: Exactly, and to remember that Allah opens the way, lights the way, removes the veils for us to be guided. So it's not for us to judge others, which is quite important

--
regards

Mr. RK. Ahmadh Riffai Kariapper
Faculty of Applied Sciences
Sabaragamuwa University of Sri Lanka
+94718080883

Monday, June 11, 2012

ஷீயாக்கள் உஷார்

அப்துல்லாஹ் பின் ஸபா எனும் யூதனால் தோற்றுவிக்கப்பட்ட ஒரு அமைப்பே ஷீயாயிஷமாகும். ஆரம்பத்தில் அரசியல் ரீதியில் சிந்தித்த இவர்கள், பின்னர் தமது அரசியல் சிந்தனைகளுக்கெல்லாம் மதச்சாயம் பூசச் சென்றதால் இஸ்லாத்தை விட்டும் விலகிச் சென்றுவிட்டனர்.

நபியவர்களது மரணத்தின் பின்னர் அலி(ரழி) அவர்கள்தான் ஆட்சித் தலைமைக்குரியவர்கள் என்று ஆரம்பத்தில் சிந்தித்தனர். அன்று வாழ்ந்த சில நல்லவர்களிடமும் இந்த எண்ணம் இருந்தது. ஆனால் அவர்கள் ஏனையவர்களின் ஆட்சியை எதிர்க்கவில்லை. இந்த ஷீயாக்கள் தமது தவறான சிந்தனைகளையெல்லாம் இங்கிருந்துதான் ஆரம்பித்தனர்.
'நபியவர்களுக்குப் பின்னர், அலி(ரழி) அவர்கள்தான் ஆட்சிக்கு வரவேண்டும் என அல்லாஹ் குர்ஆனிலும் கூறியிருக்கின்றான். இவர்கள் அந்த ஆயத்துக்களை நீக்கிவிட்டனர். அபூபக்கர்(ரழி), உமர்(ரழி), உஸ்மான்(ரழி) ஆகிய மூவரும் அலி(ரழி) அவர்களுக்குத் துரோகம் செய்துவிட்டனர். அதற்கு ஏனைய ஸஹாபாக்கள் அனைவரும் உடந்தையாக இருந்தனர். எனவே, நபித்தோழர்கள் அனைவரும் காபிராகி விட்டனர்' என்று அவர்கள் கூறினார்.
இவ்வாறு இஸ்லாத்தில் இல்லாத இஸ்லாத்தை விட்டும் வெளியேற்றக்கூடிய பல கருத்துக்களைக் கொண்டவர்கள்தான் ஷீயாக்களாவர். எல்லா வகையான வழிகேடுகளும் இந்த ஷீயாக்களிடம் குடிகொண்டுள்ளன.

குர்ஆன் மாற்றப்பட்டு விட்டதாக நம்புகின்றனர்:
நபித்தோழர்கள் குர்ஆனை மாற்றிவிட்டனர் என்பது ஷீயாக்களின் நம்பிக்கையாகும். நம்மிடம் ஸஹீஹுல் புஹாரி பெற்றிருக்கும் அந்தஸ்தை அவர்களிடம் 'அல்காபீ' எனும் நூல் பெற்றுள்ளது. இந்த நூலில், 'நபி(ஸல்) அவர்களுக்கு அருளப்பட்ட ஆயத்துக்களின் எண்ணிக்கை பதினேழாயிரமாகும். எனக் கூறுகின்றனர்.
உண்மையான முழுக்குர்ஆனும் தமது இமாம்களிடம் இருப்பதாகவும் நம்புகின்றனர். தம்மிடம் முஸ்ஹபு பாத்திமா உள்ளது. அல்லாஹ்வின் மீது சத்தியமாக உங்களின் குர்ஆனில் இருக்கக்கூடிய ஒரு எழுத்துக்கூட அதில் இல்லை என அவர்களின் முக்கிய இமாம் ஜஃபர் ஸாதிக்(ரழி) கூறியதாகப் பதியப்பட்டுள்ளது.
குர்ஆனில் மாற்றங்கள் நடந்துள்ளன என்பதை விளக்கி 'பஸ்லுல் கிதாப் பி இஸ்பாதி தஹ்ரீபி ரப்பில் அர்பாப்' என்ற பெயரில் நூரி அத்தப்ரிஸீ என்பவர் தனி நூலையே எழுதியுள்ளார். ஷீயாக்களின் இஸ்னா அக்ஷரிய்யா பிரிவினரிடம் குர்ஆன் மாற்றப்பட்டு விட்டது என்ற கொள்கை பரவலாக உள்ளது.

ஹதீஸ் தொடர்பில் இவர்களது நம்பிக்கை:
அஹ்லுஸ் சுன்னத் வல் ஜமாஅத்தினர் ஹதீஸ் என நம்புவதை ஷீஆக்கள் ஹதீஸ் என நம்புவதில்லை. தாம் நம்பக்கூடிய தமது இமாம்கள் தொடர்பாக அறிவிக்கப்படும் செய்திகளையே இவர்கள் ஹதீஸ் என்று கூறுகின்றனர். ஆரம்ப காலத்திலிருந்தே ஷீயாக்கள் போலி ஹதீஸ்களை இட்டுக் கட்டுவதில் விற்பன்னர்களாகத் திகழ்ந்தனர். தமக்குத் தேவையானதை ஹதீஸ் என்ற பெயரில் புனைந்து அதற்கு ஸனத் எனும் அறிவிப்பாளர் தொடர்களையும் உண்டாக்கி வைத்துள்ளனர்.

ஸஹாபாக்கள்:
நபித்தோழர்கள் அல்லாஹ்வின் திருப்பொருத்தம் பெற்றவர்கள். இவர்களில் அதிகமானவர்கள் சுவனவாசிகள் என சுபசோபனம் சொல்லப்பட்டுள்ளனர். பைஅதுர் றிழ்வானில் பங்கு கொண்ட 1400 ஸஹாபாக்களும் நரகம் செல்லமாட்டார்கள் என நபி(ஸல்) அவர்கள் கூறினார்கள்.

ஷீயாக்கள் உஷார்
'முஹாஜிர்கள் அன்ஸார்களை அல்லாஹ் பொருந்திக் கொண்டான். அவர்களுக்கு சுவனம் தயார் பண்ணப்பட்டுள்ளது' என குர்ஆன் கூறுகின்றது. 'பத்ர் ஸஹாபாக்கள் சுவனவாசிகள்' என்றெல்லாம் ஹதீஸ் கூறுகின்றது.
ஆனால் ஷீயாக்களோ சுமார் 17 பேர்களைத் தவிர ஏனைய ஸஹாபாக்கள் நரகவாசிகள் என்று கூறுகின்றனர். அபூபக்கர், உமர் மீது அல்லாஹ்வின் சாபம் உண்டாகட்டும் என தொடர்ந்து சபித்து வருகின்றனர்.
அபூபக்கர்(ரழி) அவர்கள் ஷைத்தானின் கொம்பு என்றும் அவரும் அவரது தோழர் உமரும் முனாபிக்குகள், பொய்யர்கள், அநியாயக்காரர்கள். இவர்கள் இருவரின் இமாமத்தை யாரெல்லாம் ஏற்றுக் கொண்டார்களோ அவர்கள் ஜாஹிலிய்யத்தினதும், வழிகேட்டினதும் மரணத்தையே அடைவர் என்றும் கூறுகின்றனர். (அத்தராயிப் பீ மஃரிபதித் தவாயிப் 401)
உமர்(ரழி) அவர்கள் ஸிஹாக் எனும் விபச்சாரிக்குப் பிறந்தவர் என்றும் இதே நூல் கூறுகின்றது.
உஸ்மான்(ரழி) அவர்கள் சபிக்கப்பட்டவர். அசத்தியத்தில் இருந்தார் என 'தீகதுஷ் ஷீயா' என்ற நூல் கூறுகின்றது. ஈரானியப் புரட்சிக்குப் பின்னர் எழுதப்பட்ட 'தும்ம இஹ்ததைத்து' என்ற நூலும், 'அஷ்ஷீஆ ஹும் அஹ்லுஸ்ஸுன்னா' என்ற நூலும் நம்மிடம் நடைமுறையில் உள்ள ஹதீஸ்களைத் தப்பும், தவறுமாக விளக்கி முன்னைய மூன்று குலபாக்களையும் காபிர்கள் எனக் கூறும் விதத்தில் எழுதப்பட்டுள்ளமை குறிப்பிடத்தக்கதாகும்.

தனி மனித வழிபாடு:
தனி மனித வழிபாட்டின் மொத்த வடிவமாக ஷீயாயிஷம் உள்ளது. அலி(ரழி) அவர்கள் மீதான வழிபாட்டின் மீதுதான் இந்த மதமே நிறுவப்பட்டுள்ளது. அலி(ரழி) அவர்களையும் தமது இமாம்களையும் எல்லை மீறிப் புகழ்வதுதான் இவர்களின் மதத்தின் சாரமாக உள்ளது. இவர்களில் சிலர் அலி(ரழி) அவர்களை அல்லாஹ்வின் இடத்திற்கே உயர்த்தினர். இவர்களது ஒரு பாடலில், 'லாஇலாஹ இல்லஸ் ஸஹாரா' பாத்திமா தவிர வேறு இறைவன் இல்லை என்றும் இடம்பெற்றுள்ளது.
தமது பன்னிரெண்டு இமாம்களும் மறைவானவற்றை அறிந்தவர்கள் என்றும், பாவங்களை விட்டும் பாதுகாக்கப்பட்ட மஃசூம்கள் என்றும் நம்புகின்றனர். தமது இமாம்களுக்கு முர்ஸலான தூதர்களோ, சங்கையான மலக்குகளோ அடைய முடியாத உயர்ந்த அந்தஸ்து உள்ளதாக நம்புகின்றனர்.

கப்று வழிபாடு:
முஸ்லிம் சமூகத்திற்குள் கப்று வழிபாட்டை நுழைத்ததில் இவர்களுக்கு அதிக பங்கு உள்ளது. ஹஜ்ஜிற்கு வந்தாலும் இவர்கள் கப்றுகளுக்குத்தான் முக்கியத்துவம் கொடுத்துக் கொண்டிருப்பதைக் காணலாம்.
ஹுஸைன்(ரழி) அவர்களது கப்ரை ஸியாரத் செய்பவர் அல்லாஹ்வை அர்ஷில் சந்தித்தவர் போலாவார் என்று இன்றுவரையும் பிரச்சாரம் செய்கின்றனர். கப்றுக்குச் செல்லும்போது தவழ்ந்து தவழ்ந்தும் இழுகியும் செல்லும் காட்சிகளை இன்றும் இணையத்தளங்களில் காணலாம்.
கர்பலா பூமி, மக்கா, மதீனா, பலஸ்தீனத்தைவிட இவர்களிடம் புனிதம் பெற்றதாகும். கர்பலா யுத்தம் நடந்த தினத்தை துக்க தினமாக இன்றும் அனுஷ்டிக்கின்றனர். தமது உடல்களில் காயத்தை ஏற்படுத்திக் கொள்கின்றனர். 'யா ஹுஸைன்! யா ஹுஸைன்!' என்று ஒப்பாரி வைக்கின்றனர்.

முத்ஆ திருமணம்:
தான் விரும்பும் பெண்ணை தற்காலிகமாகத் திருமணம் செய்து கொள்ளும் பழக்கம் இவர்களிடம் இருக்கின்றது. இதை ஆதரித்து இவர்கள் பிரச்சாரம் செய்கின்றனர். சின்னப் பிள்ளைகளையும் இதற்காகப் பயன்படுத்த முடியும் என்று நம்புகின்றனர். ஒரு முறை உறவு கொள்வதற்காகக் கூட வாடகைப் பெண்களை அமர்த்திக் கொள்ளலாம் என நம்புகின்றனர்.
'முத்ஆ என்பது எனதும் எனது முன்னோர்களினதும் தீனாகும். யார் அதைச் செய்தாரோ அவர் எமது மார்க்கத்தின்படி செயற்பட்டவராவார். யார் அதை மறுத்தாரோ அவர் எமது மார்க்கத்தை மறுத்தவராவார், வேறு மார்க்கத்தை நம்பியவராவார்' என அவர்களது இமாம் ஒருவர் கூறியதாக 'மன்லா யஹ்லுருஹுல் பகீஹ்' (3:3661) என்ற ஷீயாக்களின் நூலில் பதிவு செய்யப்பட்டுள்ளது.
இந்த அடிப்படையில் முத்ஆ என்பது ஷீஆ மதத்தின் முக்கிய அம்சமாகத் திகழ்கின்றது. ஷீஆ மத குருக்கள் பெண்கள் மத்தியில் ஒரு முறையேனும் நீங்கள் முத்ஆவில் ஈடுபடுங்கள் என்று போதிக்கும் காட்சிகளை இன்றும் நாம் இணையத்தளங்களில் காணலாம்.
இந்த விபச்சாரத்தின் மீது பெண்களைத் தூண்டும் விதத்தில் ஏராளமான செய்திகளை இட்டுக்கட்டியுள்ளனர்.
நபி(ஸல்) அவர்கள் இஸ்ரா சென்றபோது, 'முஹம்மதே உமது உம்மத்தில் உள்ள முத்ஆ திருமணம் செய்யும் பெண்களை நான் மன்னித்து விட்டேன் என அல்லாஹ் கூறுகின்றான்' என ஜிப்ரீல்(அலை) அவர்கள் கூறினார்கள். (மன்லாயஹ்லுருஹுல் பகீஹ்: 2:493) என்று ஹதீஸ்களை இட்டுக்கட்டியுள்ளனர்.
இன்னமும் ஈரான், பஹ்ரைன் ஷீயாக்களிடம் இந்தப் பழக்கம் இருப்பதையும், பாடசாலைச் சிறுமிகளைக் கூட இதற்கு சாதகமாகத் தூண்டுவதையும் இணையத்தளங்களில் காணலாம். ஷீயாக்களை ஆதரிப்பவர்கள் இதையும் ஆதரிப்பார்களா?

தகிய்யா:
பொய் பேசுதல், உள்ளொன்று வைத்து வெளியில் அதற்கு மாற்றமாக வேஷம் போடுதல் என்பது இதன் அர்த்தமாகும்.
இவர்கள் அபூபக்கர்(ரழி) அவர்களைக் காபிர் என்று கூறுவர். ஆனால் அலி(ரழி) அவர்கள் அபூபக்கர்(ரழி) அவர்களை மதித்து நடந்துள்ளார்கள். உமர்(ரழி) அவர்களைக் காபிர் என்பார்கள். ஆனால் அலி(ரழி) அவர்கள் தமது மகள் உம்மு குல்தூமை உமர்(ரழி) அவர்களுக்கு மணமுடித்துக் கொடுத்தார்கள். இந்த முரண்பாட்டை நீக்குவதற்காக இந்தத் 'தகிய்யா' கோட்பாட்டை உருவாக்கினார்கள்.
உள்ளொன்று வைத்து அதற்குப் புறம்பாக நடப்பது மார்க்கக்கடமை. அந்த அடிப்படையில்தான் அலி(ரழி) அவர்கள் நடந்து கொண்டார்கள் என்று கூறுவர். இன்றும் இவர்களது எல்லா வழிகேடுகளையும் இதை வைத்தே பாமர மக்களிடம் மூடி மறைத்து வருகின்றனர்.
தகிய்யா என்ற நயவஞ்சகத்தனம் இல்லாதவனுக்கு தீனே இல்லை என இவர்களது உஸுலுல் காபீ (2:217, 223) கூறுகின்றது.
இவர்களது ஒரு அறிஞர் அல் இஃதிகாதாத் (114 – 115) என்ற நூலில் 12 ஆம் இமாம் வரும் வரை தகிய்யா (எனும் நயவஞ்சகத்தனம்) வாஜிபாகும். அதனை நீக்கிட முடியாது. 12 ஆம் இமாம் வருவதற்கு முன்னர் யார் அதனை விட்டு விடுகின்றாரோ அவன் அல்லாஹ்வின் மார்க்கத்தையும், இமாமிய்யத் மதத்தையும் விட்டவனாவான். அவன் அல்லாஹ்வுக்கும், இமாம்களுக்கும் மாறு செய்தவனாவான் என்று எழுதியுள்ளனர்.
இவர்களது 12 ஆம் இமாம் வந்து நீதியை நிலைநாட்டுவார் என்றும், அபூபக்கர்(ரழி) உமர்(ரழி) அவர்களை எழுப்பி சிலுவையில் அறைவார் என்றும், அவர்களை அறைவதற்கு முன்னர் பச்சை மரமாக இருந்த அந்த (சிலுவை மரம்) இவர்களை அடித்ததும் காய்ந்துவிடும் என்றெல்லாம் நம்புகின்றனர்.
இவ்வாறு இந்த ஷீஆக்களிடம் இல்லாத வழிகேடே இல்லை எனலாம். ஷீயாயிஸம் பரவுகின்ற பகுதிகளில் பரவலாக வன்முறைகள், குண்டுத் தாக்குதல்கள் இடம்பெற்று வருவதையும் காணலாம். இந்த சீரழிந்த சிந்தனைகளை இலங்கையில் பரப்புவதற்குப் பெருத்த முயற்சிகள் முன்னெடுக்கப்படுகின்றன.
இன்றைய அரசியல் உலகில் ஈரான் ஒரு ஹீரோவாகப் பார்க்கப்படுவதால் சிலர் ஷீயாயிஸத்தை ஆதரிக்கின்றனர். மற்றும் பலரும் அவர்களது பிரச்சார முயற்சிகளுக்குப் பலியாகி ஷியாயிஸத்தையும் ஒரு மத்ஹபு போன்று, சாதாரண ஒரு இயக்கம் போன்று பார்க்கின்றனர். இது தவறாகும். ஷீயாயிஸம் என்பது இஸ்லாத்துக்கு முற்றிலும் முரணான ஒரு தனியான மதமாகும். அவர்கள் நம்பும் குர்ஆன் வேறு, அவர்கள் நம்பும் ஹதீஸ் வேறு, அவர்களது அகீதா கோட்பாடு வேறு, அவர்கள் முன்வைக்கும் ஈமானிய அம்சங்கள் வேறு. எனவே, இவர்களது பிரச்சாரம் குறித்து விழிப்பாக இருப்பது அவசியமாகும்.
இவர்கள் குறித்து பொதுமக்களுக்கு விழிப்புணர்வை ஊட்டுவது அறிஞர்களின் அடிப்படையான கடமையாகும். அல்லாஹ்வால் புகழப்பட்ட ஸஹாபாக்களைத் தூற்றுபவர்களுடன், நபியவர்களின் மனைவியர்களான ஆயிஷா(ரழி), ஹப்ஸா(ரழி) ஆகியோரைக் கேவலப்படுத்துபவர்களுடன் நட்புறவுக்கோ அல்லது சமரசத்திற்கோ அறவே இடமில்லை என்பதை உணர்ந்து கொள்ள வேண்டும். ஷீயாக்கள் குறித்து விழிப்புணர்வுடனும், தெளிவுடனும் இருக்குமாறு இலங்கை வாழ் மக்களைக் கேட்டுக் கொள்கின்றோம்.

Thanks for எஸ்.எச்.எம். இஸ்மாயில் (ஸலபி)
rk@+94771274488
rk@+94718080883

Stupid Techonolgy


 
Stupid Techonolgy. If u cant use it, have a look at it.
 
Digital Cyborg Hammer.
With unbreakable & high density Lens Technology this hammer also counts nails its drills plus fingers. CAREFUL.
 
 
 
 
 
--------------------------------------------------------
MotoVac-Cleaner.
Vaccum Cleaner for Real Men.
 
--------------------------------------------------------
 
Pic Auto Eraser-o-matic
Erase with awesome RPM meter, control the speed of eraser, angle. AWESOME.
 
--------------------------------------------------------
 
NexGen 3D Keyboard
Bored with flat desktop keyboards. Use 3D cuboidal Keyboard. WOW.
 
 
--------------------------------------------------------
 
SpaX Sticky Tape.
Somebody uses ur lucky sticking tape, now they wont. Gr8.
 
 
 
 
 
--------------------------------------------------------
Finger Graft
Never worry about refill. Careful only writes in RED INK. Kinda a Scary.
 
 

      
 
Kariapper. RKAR


Tragic Comedy

Thursday, June 7, 2012

Free E Books

See the free e-books over here.

http://www.kk.org/cooltools/archives/006170.php?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+CoolTools+%28Cool+Tools%29&utm_content=Google+Reader

--
regards

Mr. RK. Ahmadh Riffai Kariapper
Faculty of Applied Sciences
Sabaragamuwa University of Sri Lanka
+94718080883

A Five-Minute Routine to Keep Your Bathroom Clean

A Five-Minute Routine to Keep Your Bathroom Clean

Cleaning the bathroom may very well be the worst of all the household chores, but Apartment Therapy has put together a quick five minute daily routine that can save you the suffering of scrubbing for hours on end.
The basic idea of Apartment Therapy's routine is to break bathroom cleaning into five 60 second chunks that you can do at any point in the day. Here's the basic breakdown:
  • Minute one: clearing off surfaces.
  • Minute two: surface cleaning.
  • Minute three: straightening.
  • Minute four: wipe down mirrors and fixtures.
  • Minute five: assess and wipe down anything else.
You can mix things up a bit to fit your needs. For instance, my bathroom is the size of a small closet so clearing off surfaces is pretty much non-existant, but I could spend that minute sweeping instead. The important part to remember is to keep it short and do it daily so you don't have to do a deep scrub down the line. Head over to Apartment Therapy for a breakdown of each minute and more cleaning suggestions.

Thanks for www.lifehacker.com
 

Monday, June 4, 2012

Splitting of the moon

The splitting of the moon (Arabic: انشقاق القمر‎) was a miracle attributed to Muhammad in Islamic tradition.It derives from the Qur'anic verse "Sura Al-Qamar, verse 1-3"54:1-2: The HOUR (of Judgment) is nigh and the moon did split. And if they see a sign they turn away, and say: "This is transient magic." Sura Al-Qamar Qur'an verse in Arabic: بِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيم اقْتَرَبَتِ السَّاعَةُ وَانشَقَّ الْقَمَرُ وَإِن يَرَوْا آيَةً يُعْرِضُوا وَيَقُولُوا سِحْرٌ مُّسْتَمِرٌّ


File:Splitting of the moon.jpg

--
rk@+94718080883
http://rkark.blogspot.com
http://hockalmunai.blogspot.com


10 Worst Computer Viruses of All Time

Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you've never had a machine fall victim to a computer virus, you may wonder what the fuss is about. But the concern is understandable -- according to Consumer Reports, computer viruses helped contribute to $8.5 billion in consumer losses in 2008 [source: MarketWatch]. Computer viruses are just one kind of online threat, but they're arguably the best known of the bunch.

Computer viruses have been around for many years. In fact, in 1949, a scientist named John von Neumann theorized that a self-replicated program was possible [source: Krebs]. The computer industry wasn't even a decade old, and already someone had figured out how to throw a monkey wrench into the figurative gears. But it took a few decades before programmers known as hackers began to build computer viruses.

While some pranksters created virus-like programs for large computer systems, it was really the introduction of the personal computer that brought computer viruses to the public's attention. A doctoral student named Fred Cohen was the first to describe self-replicating programs designed to modify computers as viruses. The name has stuck ever since.

­In the good­ old days (i.e., the early 1980s), viruses depended on humans to do the hard work of spreading the virus to other computers. A hacker would save the virus to disks and then distribute the disks to other people. It wasn't until modems became common that virus transmission became a real problem. Today when we think of a computer virus, we usually imagine something that transmits itself via the Internet. It might infect computers through e-mail messages or corrupted Web links. Programs like these can spread much faster than the earliest computer viruses.

We're going to take a look at 10 of the worst computer viruses to cripple a computer system. Let's start with the Melissa virus.

10: Melissa

In the spring of 1999, a man named David L. Smith created a computer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida [source: CNN].

Rather than shaking its moneymaker, the Melissa computer virus tempts recipients into opening a document with an e-mail message like "Here is that document you asked for, don't show it to anybody else." Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.

The virus spread rapidly after Smith unleashed it on the world. The United States federal government became very interested in Smith's work -- according to statements made by FBI officials to Congress, the Melissa virus "wreaked havoc on government and private sector networks" [source: FBI]. The increase in e-mail traffic forced some companies to discontinue e-mail programs until the virus was contained.

After a lengthy trial process, Smith lost his case and received a 20-month jail sentence. The court also fined Smith $5,000 and forbade him from accessing computer networks without court authorization [source: BBC]. Ultimately, the Melissa virus didn't cripple the Internet, but it was one of the first computer viruses to get the public's attention.

Flavors of Viruses

In this article, we'll look at several different kinds of computer viruses. Here's a quick guide to what we'll see:

  • The general term computer virus usually covers programs that modify how a computer works (including damaging the computer) and can self-replicate. A true computer virus requires a host program to run properly -- Melissa used a Word document.
  • A worm, on the other hand, doesn't require a host program. It's an application that can replicate itself and send itself through computer networks.
  • Trojan horses are programs that claim to do one thing but really do another. Some might damage a victim's hard drive. Others can create a backdoor, allowing a remote user to access the victim's computer system.

9: ILOVEYOU

A year after the Melissa virus hit the Internet, a digital menace emerged from the Philippines. Unlike the Melissa virus, this threat came in the form of a worm -- it was a standalone program capable of replicating itself. It bore the name ILOVEYOU.

The ILOVEYOU virus initially traveled the Internet by e-mail, just like the Melissa virus. The subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU.TXT.vbs. The vbs extension pointed to the language the hacker used to create the worm: Visual Basic Scripting [source: McAfee].

According to anti-virus software producer McAfee, the ILOVEYOU virus had a wide range of attacks:

  • It copied itself several times and hid the copies in several folders on the victim's hard drive.
  • It added new files to the victim's registry keys.
  • It replaced several different kinds of files with copies of itself.
  • It sent itself through Internet Relay Chat clients as well as e-mail.
  • It downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.

Who created the ILOVEYOU virus? Some think it was Onel de Guzman of the Philippines. Filipino authorities investigated de Guzman on charges of theft -- at the time the Philippines had no computer espionage or sabotage laws. Citing a lack of evidence, the Filipino authorities dropped the charges against de Guzman, who would neither confirm nor deny his responsibility for the virus. According to some estimates, the ILOVEYOU virus caused $10 billion in damages [source: Landler].

Now that the love fest is over, let's take a look at one of the most widespread viruses to hit the Web.

8: The Klez Virus

The Klez virus marked a new direction for computer viruses, setting the bar high for those that would follow. It debuted in late 2001, and variations of the virus plagued the Internet for several months. The basic Klez worm infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book. Some variations of the Klez virus carried other harmful programs that could render a victim's computer inoperable. Depending on the version, the Klez virus could act like a normal computer virus, a worm or a Trojan horse. It could even disable virus-scanning software and pose as a virus-removal tool [source: Symantec].

Shortly after it appeared on the Internet, hackers modified the Klez virus in a way that made it far more effective. Like other viruses, it could comb through a victim's address book and send itself to contacts. But it could also take another name from the contact list and place that address in the "From" field in the e-mail client. It's called spoofing -- the e-mail appears to come from one source when it's really coming from somewhere else.

Spoofing an e-mail address accomplishes a couple of goals. For one thing, it doesn't do the recipient of the e-mail any good to block the person in the "From" field, since the e-mails are really coming from someone else. A Klez worm programmed to spam people with multiple e-mails could clog an inbox in short order, because the recipients would be unable to tell what the real source of the problem was. Also, the e-mail's recipient might recognize the name in the "From" field and therefore be more receptive to opening it.

Antivirus Software

It's important to have an antivirus program on your computer, and to keep it up to date. But you shouldn't use more than one suite, as multiple antivirus programs can interfere with one another. Here's a list of some antivirus software suites:

  • Avast Antivirus
  • AVG Anti-Virus
  • Kaspersky Anti-Virus
  • McAfee VirusScan
  • Norton AntiVirus

Several major computer viruses debuted in 2001. In the next section, we'll take a look at Code Red.

7: Code Red and Code Red II

­The Code Red and Code Red II worms popped up in the summer of 2001. Both worms exploited an operating system vulnerability that was found in machines running Windows 2000 and Windows NT. The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory.

The original Code Red worm initiated a distributed denial of service (DDoS) attack on the White House. That means all the computers infected with Code Red tried to contact the Web servers at the White House at the same time, overloading the machines.

A Windows 2000 machine infected by the Code Red II worm no longer obeys the owner. That's because the worm creates a backdoor into the computer's operating system, allowing a remote user to access and control the machine. In computing terms, this is a system-level compromise, and it's bad news for the computer's owner. The person behind the virus can access information from the victim's computer or even use the infected computer to commit crimes. That means the victim not only has to deal with an infected computer, but also may fall under suspicion for crimes he or she didn't commit.

While Windows NT machines were vulnerable to the Code Red worms, the viruses' effect on these machines wasn't as extreme. Web servers running Windows NT might crash more often than normal, but that was about as bad as it got. Compared to the woes experienced by Windows 2000 users, that's not so bad.

Microsoft released software patches that addressed the security vulnerability in Windows 2000 and Windows NT. Once patched, the original worms could no longer infect a Windows 2000 machine; however, the patch didn't remove viruses from infected computers -- victims had to do that themselves.

6: Nimda

Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm. Nimda spread through the Internet rapidly, becoming the fastest propagating computer virus at that time. In fact, according to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks [source: Anthes].

The Nimda worm's primary targets were Internet servers. While it could infect a home PC, its real purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple methods, including e-mail. This helped spread the virus across multiple servers in record time.

The Nimda worm created a backdoor into the victim's operating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently. In other words, if a user with limited privileges activated the worm on a computer, the attacker would also have limited access to the computer's functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control.

The spread of the Nimda virus caused some network systems to crash as more of the system's resources became fodder for the worm. In effect, the Nimda worm became a distributed denial of service (DDoS) attack.

Phoning it In

Not all computer viruses focus on computers. Some target other electronic devices. Here's just a small sample of some highly portable viruses:

  • CommWarrior attacked smartphones running the Symbian operating system (OS).
  • The Skulls Virus also attacked Symbian phones and displayed screens of skulls instead of a home page on the victims' phones.
  • RavMonE.exe is a virus that could infect iPod MP3 devices made between Sept. 12, 2006, and Oct. 18, 2006.
  • Fox News reported in March 2008 that some electronic gadgets leave the factory with viruses pre-installed -- these viruses attack your computer when you sync the device with your machine [source: Fox News].

Next, we'll take a look at a virus that affected major networks, including airline computers and bank ATMs.

5: SQL Slammer/Sapphire

­In late January 2003, a new Web server virus spread across the Internet. Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors.

The culprit was the SQL Slammer virus, also known as Sapphire. By some estimates, the virus caused more than $1 billion in damages before patches and antivirus software caught up to the problem [source: Lemos]. The progress of Slammer's attack is well documented. Only a few minutes after infecting its first Internet server, the Slammer virus was doubling its number of victims every few seconds. Fifteen minutes after its first attack, the Slammer virus infected nearly half of the servers that act as the pillars of the Internet [source: Boutin].

The Slammer virus taught a valuable lesson: It's not enough to make sure you have the latest patches and antivirus software. Hackers will always look for a way to exploit any weakness, particularly if the vulnerability isn't widely known. While it's still important to try and head off viruses before they hit you, it's also important to have a worst-case-scenario plan to fall back on should disaster strike.

A Matter of Timing

Some hackers program viruses to sit dormant on a victim's computer only to unleash an attack on a specific date. Here's a quick sample of some famous viruses that had time triggers:

  • The Jerusalem virus activated every Friday the 13th to destroy data on the victim computer's hard drive
  • The Michelangelo virus activated on March 6, 1992 -- Michelangelo was born on March 6, 1475
  • The Chernobyl virus activated on April 26, 1999 -- the 13th anniversary of the Chernobyl meltdown disaster
  • The Nyxem virus delivered its payload on the third of every month, wiping out files on the victim's computer

Computer viruses can make a victim feel helpless, vulnerable and despondent. Next, we'll look at a virus with a name that evokes all three of those feelings.

4: MyDoom

The MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer's operating system. The original MyDoom virus -- there have been several variants -- had two triggers. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 12, 2004. Even after the virus stopped spreading, the backdoors created during the initial infections remained active [source: Symantec].

Later that year, a second outbreak of the MyDoom virus gave several search engine companies grief. Like other viruses, MyDoom searched victim computers for e-mail addresses as part of its replication process. But it would also send a search request to a search engine and use e-mail addresses found in the search results. Eventually, search engines like Google began to receive millions of search requests from corrupted computers. These attacks slowed down search engine services and even caused some to crash [source: Sullivan].

MyDoom spread through e-mail and peer-to-peer networks. According to the security firm MessageLabs, one in every 12 e-mail messages carried the virus at one time [source: BBC]. Like the Klez virus, MyDoom could spoof e-mails so that it became very difficult to track the source of the infection.

Oddball Viruses

Not all viruses cause severe damage to computers or destroy networks. Some just cause computers to act in odd ways. An early virus called Ping-Pong created a bouncing ball graphic, but didn't seriously damage the infected computer. There are several joke programs that might make a computer owner think his or her computer is infected, but they're really harmless applications that don't self-replicate. When in doubt, it's best to let an antivirus program remove the application.

Next, we'll take a look at a pair of viruses created by the same hacker: the Sasser and Netsky viruses.

3: Sasser and Netsky

Sometimes computer virus programmers escape detection. But once in a while, authorities find a way to track a virus back to its origin. Such was the case with the Sasser and Netsky viruses. A 17-year-old German named Sven Jaschan created the two programs and unleashed them onto the Internet. While the two worms behaved in different ways, similarities in the code led security experts to believe they both were the work of the same person.

The Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems. It contacted those systems and instructed them to download the virus. The virus would scan random IP addresses to find potential victims. The virus also altered the victim's operating system in a way that made it difficult to shut down the computer without cutting off power to the system.

The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and propagates through a 22,016-byte file attachment [source: CERT]. As it spreads, it can cause a denial of service (DoS) attack as systems collapse while trying to handle all the Internet traffic. At one time, security experts at Sophos believed Netsky and its variants accounted for 25 percent of all computer viruses on the Internet [source: Wagner].

Sven Jaschan spent no time in jail; he received a sentence of one year and nine months of probation. Because he was under 18 at the time of his arrest, he avoided being tried as an adult in German courts.

So far, most of the viruses we've looked at target PCs running Windows. But Macintosh computers aren't immune to computer virus attacks. In the next section, we'll take a look at the first virus to commit a Mac attack.

Black Hats

Just as you'd find good and bad witches in Oz, you can find good and bad hackers in our world. One common term for a hacker who sets out to create computer viruses or compromise system security is a black hat. Some hackers attend conventions like the Black Hat conference or Defcon to discuss the impact of black hats and how they use vulnerabilities in computer security systems to commit crimes.

2: Leap-A/Oompa-A

Maybe you've seen the ad in Apple's Mac computer marketing campaign where Justin "I'm a Mac" Long consoles John "I'm a PC" Hodgman. Hodgman comes down with a virus and points out that there are more than 100,000 viruses that can strike a computer. Long says that those viruses target PCs, not Mac computers.

For the most part, that's true. Mac computers are partially protected from virus attacks because of a concept called security through obscurity. Apple has a reputation for keeping its operating system (OS) and hardware a closed system -- Apple produces both the hardware and the software. This keeps the OS obscure. Traditionally, Macs have been a distant second to PCs in the home computer market. A hacker who creates a virus for the Mac won't hit as many victims as he or she would with a virus for PCs.

But that hasn't stopped at least one Mac hacker. In 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.

The Leap-A virus doesn't cause much harm to computers, but it does show that even a Mac computer can fall prey to malicious software. As Mac computers become more popular, we'll probably see more hackers create customized viruses that could damage files on the computer or snarl network traffic. Hodgman's character may yet have his revenge.

We're down to the end of the list. What computer virus has landed the number one spot?

Breaking into Song

While computer viruses can pose a serious threat to computer systems and Internet traffic, sometimes the media overstates the impact of a particular virus. For example, the Michelangelo virus gained a great deal of media attention, but the actual damage caused by the virus was pretty small. That might have been the inspiration for the song "Virus Alert" by "Weird Al" Yankovic. The song warns listeners of a computer virus called Stinky Cheese that not only wipes out your computer's hard drive, but also forces you to listen to Jethro Tull songs and legally change your name to Reggie.

1: Storm Worm

The latest virus on our list is the dreaded Storm Worm. It was late 2006 when computer security experts first identified the worm. The public began to call the virus the Storm Worm because one of the e-mail messages carrying the virus had as its subject "230 dead as storm batters Europe." Antivirus companies call the worm other names. For example, Symantec calls it Peacomm while McAfee refers to it as Nuwar. This might sound confusing, but there's already a 2001 virus called the W32.Storm.Worm. The 2001 virus and the 2006 worm are completely different programs.

The Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack. Some hackers use the Storm Worm to create a botnet and use it to send spam mail across the Internet.

Many versions of the Storm Worm fool the victim into downloading the application through fake links to news stories or videos. The people behind the attacks will often change the subject of the e-mail to reflect current events. For example, just before the 2008 Olympics in Beijing, a new version of the worm appeared in e-mails with subjects like "a new deadly catastrophe in China" or "China's most deadly earthquake." The e-mail claimed to link to video and news stories related to the subject, but in reality clicking on the link activated a download of the worm to the victim's computer [source: McAfee].

Several news agencies and blogs named the Storm Worm one of the worst virus attacks in years. By July 2007, an official with the security company Postini claimed that the firm detected more than 200 million e-mails carrying links to the Storm Worm during an attack that spanned several days [source: Gaudin]. Fortunately, not every e-mail led to someone downloading the worm.

Although the Storm Worm is widespread, it's not the most difficult virus to detect or remove from a computer system. If you keep your antivirus software up to date and remember to use caution when you receive e-mails from unfamiliar people or see strange links, you'll save yourself some major headaches.

Want to learn more about computer viruses? Take a look at the links on the next page, if you dare.

Malware

Computer viruses are just one kind of malware. Other types include spyware and some kinds of adware. Spyware spies on what a user does with his or her computer. That can include logging keystrokes as a way to discover login codes and passwords. Adware is a software app that displays ads to users while they use a larger application like a Web browser. Some adware contains code that gives advertisers extensive access to private information.

 

(source from http://www.howstuffworks.com)

--
regards

Mr. RK. Ahmadh Riffai Kariapper
Faculty of Applied Sciences
Sabaragamuwa University of Sri Lanka
+94718080883