Tuesday, June 26, 2007

Six Rules for Seeking Knowledge (al-ilm)


اخي لن تنال العلم الا بستة * سأنبيك عن تفصيلها ببيان
ذكاء وحرص واجتهاد وبلغة * وصحبة استاذ وطول زمان

1-ذكاء
الذكاء قسمان قسم منحه الله لعبده وقسم مكتسب وكلاهما من الله ولكن بإمكان الانسان تنمية الجزء الاخر فيصبح اكثر ذكاء
2-حرص
ينبغي على كل طالب علم ان يكون ذا حرص ودافعية في طلبه للعلم ليرفع من رصيده العلمي فبقدر ما يتحصل من علم لديه بقدر ما يعظم قدره وينجح في حياته والحرص على طلب العلم ينبع من ادراك قيمته وعظم اهميته فإذا ادرك ذلك كان حريصا عليه فعليك ان تعرف فضل ما تطلب قبل ان تبدأ بالطلب
3-اجتهاد
يقصد به الهمة العالية والمتابعه اليومية وكثرة المراجعه والاستذكار فذلك يحمي العلم من النسيان فلكل شئ آفة وآفة العلم النسيان
لا يورث العلم من الاعمام ولا يرى بالليل في المنام
لكنه يحصل بالتكرار والدرس في الليل والنهار
4-بلغة
هي المادة التي تباغك الى بغيتك من تحصيل العلم وهي الزاد الذي تتقوى به على اكتسابه فعلى الطالب ان يتحرى البلغة الحلال والمأكل الطيب
5-صحبة استاذ
الصحبه دوام الملازمه والمواظبة على الحضور بين يدي الاستاذ حتى تتمرس معه على على حسن الفهم
6-طول زمان
ان العلم لا يدرك بين عشية وضحاها ولا يوى في رؤيا النائم
تمنيت ان تمسي فقيها مناظرا بغير عناء والجنون فنون
فتحصيل العلم لا يكون بحضور درسين او ثلاثة او قراءة فصل او فصلين انما يحتاج الى زمن في مطاعة الكتب ومجالسة العلماء.

Tuesday, June 19, 2007

Top ten ways to protect your online privacy

Here are 10 ways to keep personal information secure when online:

  1. Favour common sense over technological solutions. Keep personal documents safe, preferably in a locked drawer. Shred bank statements, credit card slips and bills before throwing them away.
  2. If it’s too good to be true, it is. Never open unsolicited “spam” messages. Delete e-mails offering cash, free gifts or stock tips. Millions of unsolicited “spam” messages are sent every day in an attempt to defraud computer users.
  3. Basic prevention helps. Protect your computer against identity theft. Install security software to combat viruses, spyware and spam and keep it updated.
  4. Know enough about your firewall, the barrier between the public Internet and a personal computer, to know when it is working and when it isn’t. Don’t worry about the geeky complexity of it all, just know it’s operating.
  5. Beware of “phishing”, where criminals trick people into revealing personal or financial details, often by sending e-mails purporting to be from a bank. Never casually reply to requests for your personal financial details.
  6. Keep your private e-mail address secure. Consider using different e-mail accounts for shopping, banking, friends and work. There are many free account providers.
  7. Do not use the same password for different sites. Choose passwords with a mix of letters, numbers and symbols. Don’t use obvious passwords, such as your first name or “123456” and don’t write them down. For memory’s sake, choosing a basic root word, then rotating numbers, is safer.
  8. Make online payments safely. Never enter a card number unless there is a padlock in the Web browser’s frame, rather than the Web page. The Web address should begin with “https” — the extra “S” stands for “secure”. Consider reserving one credit card for Web use or signing up for a separate online payment service like PayPal.
  9. Secure your wireless network at home and be wary when using public access points. Encrypt the connection to scramble communications over the network. Turn off the wireless network when you’re not using it.
  10. Treat your laptop computer like cash — never leave it in a locked car or turn your back while using it in a public place. The same holds true with your mobile phone: Lock your phone (and any passwords you keep on it) when not using it.

Thursday, June 07, 2007

Dreams Shattered, Life Battered

Many in the world live in the world of dreams, striving and toiling all day and night to see those dreams they see come true. Day dreamers even though they run after life they never seem to catch it and finally they realize they forgot to live.

People with vision conquer the world but many die without crossing a mile of their lives. We motivate ourselves with stories of great men who turned the world upside down but forget to learn from the many who motivated by these people die in vain.

Friends turning foe and relatives throwing curses can shatter almost every mans dream. However, our life is nothing but a dream and one fine day all will wake up to realize what was correct and what was wrong. Is it wrong to trust a friend or is it wrong to save the trust instead of a personal gain.

Once the Times of India wrote that it is said that more then 90% of the Indian Population in major cities suffers from some kind of a mental disease. Why is that so? Shakespeare has well said that when troubles come they come not on single spies but in battalions. An average man lives upto 60 and in todays world when a person reaches half this age and looks back at life he could clearly say that he forgot to live. There is no one who cares enough to hold you in your hands in a calamity. No one in this world can feel a person's pain. No one can ever read a persons mind and thoughts. No one can ever step in another persons shoes. Still there are those who sit at height to counsel and have personal gains.

There is one godly figure my heart pounds and beats as we remember him. He is no God but so divine that he can never be separated from the creator. Rasuallah (SA) whom Allah sent as Rehmat and mercy on this land. And the rehmat still exists in his progeny and their Dai Syedna Mohammed Burhanuddin (TUS). The Dawoodi Bohras seek his blessings and have overcome the greatest fo all troubles.

There comes a time when a troubled mind is led to submit to destruction and the more powerful the mind is the larger the destruction is caused. The power of an atomic bomb can be harnessed for peaceful causes but its destructive capacity is massive. The human mind is no different. A peaceful generator of energy can turn destructive when the circumstances are out of control. It does depend on how you deal with it.

The Quran has said that killing a single soul is equal to killing all people. What a brilliant statement and the worlds top so called mentors should know it. The society turns men into criminals by first killing their spirit and their soul. He who kills a soul kills the entire population. The consequences are so wide spread like an atom bomb that is rarely controllable. The destruction is so wide that all Friends and Family feel its heat.

Next time if you see a crime try to know its cause. Did you deprive someone of love and respect. If so each one of us is guilty. Today terror has become the height of discussion everywhere. The breading ground of terror is discrimination and nothing else. The rich discriminate the poor. The powerful discriminate the week. The rights of every person are being stampeded by the rights activists.

Dreaming is never bad but has been labeled unwise and the world following the labeled instructions shatters them to bits and pieces. Self centric persons are those who call others selfish in greed of having their share of respect and right to live. We never know which one of these are we.

Prayers are a Mumin's weapon but what if the weapon has been lost in the wilds of Azkaban. Its upto those who are besides him to help selflessly. It never happens in this world of dreams but only in the dreams of men who dare. A friend in need is a friend indeed.

May Allah bless our beloved Maula (TUS) a long life. Ameen

Monday, June 04, 2007

Spybot - Search & Destroy

Any Internet surfer who has a little sense of security and privacy should have this inevitable ware. It is one of my personal favorites and I make it a point that its installed on any system that I use. The best thing about this anti-adware / anti-spyware is that its free.


Spybot has other wonderful tools as well. such as RegAlyzer, FileAlyzer and other products. People in the Web Hosting and Internet industry would love its NetAlyzer tool to gather network info, trace routes, and gather and manage whois queries, for advanced users.

You can fall inlove with spybot once you try its wares for windows palm as well as its symbian edition. I really wonder why Nokia didn't consider adding it in its default tool set.

Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is free, so there's no harm giving it a try to see if something has invaded your computer.

To see a list of threats Spybot-S&D can remove, in the navigation bar at the left click on Support --> Threats. For an introduction to Spybot-S&D, please read the tutorial. If you fear incompatibility with other software you are now using, although we can assure you that there is no danger you can review our compatibility overview which lists some software whose compatibility has been analyzed.

Spybot-S&D can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you have been working on. And for professional users, Spybot-S&D allows you to fix some registry inconsistencies and extended reports. A list of all the apllication's features is also available.

Portable Application Safety

Some suggestions for staying safe from PortableApps.com...

An important thing to keep in mind when using portable applications is that they can be used to spread viruses between machines. While this isn't as much of an issue when you own or are responsible for the machines you are using it on (say work and home), it can be a very big issue when you use a portable app on an untrusted or unknown machine (school, internet cafe, etc). For this reason, it is important that you practice Safe Portable App-ing!

The Checklist

  • Use a solid antivirus program on your primary PC and keep its virus definitions up to date.
  • Use a solid antivirus program on your portable device, like ClamWin Portable, and keep its virus definitions up to date.
  • Scan your PC and portable drive for viruses on a regular basis.
  • Whenever you plug your portable drive into an unknown computer, you should assume that it may now be infected with a virus. If the PC has a virus that is currently in memory, it may attempt to infect your portable applications as soon as you plug it in.
  • When you then plug your portable drive into another computer (after an unknown), you should first scan it for viruses before running any of your applications. (Most antivirus software will make this available to you by right-clicking on your drive in Explorer or My Computer.) That way, if it is infected, you'll know before you run your applications and the new computer will not be infected.
  • Always wait until the drive access light has stopped blinking and then click the icon in your system tray to 'Safely Remove' your device. Don't just remove it. Just because the application's window is closed doesn't mean the app has fully closed and finished writing to the disk.
  • Back up on a regular basis, both your applications and your files. PortableApps Backup makes this a snap and it's built right into the PortableApps Suite.

If you follow these simple rules, you'll be able to enjoy your portable applications without getting stuck with a virus or losing your data. As always, there is still the risk of getting a new virus that your antivirus program can't yet detect, but the probability would be relatively low, and you run the same risk whenever you download a file from the internet.