Wednesday, February 6, 2013

Iranian President Ahmadinejad targeted with shoe in Egypt



by

Tuesday, February 5, 2013

Why second marriage is necessary for men.

shadi photo Why Second Marriage is Necessary for Men
sahdi1 Why Second Marriage is Necessary for Menshadi 2 Why Second Marriage is Necessary for Men
shadi 3 Why Second Marriage is Necessary for Men

Monday, February 4, 2013

Historical Pictures of Pakistan

image0029.jpg
Miss Dina Jinnah - beloved daughter of Mr Jinnah.
Born on 15 August, 1919, she turned 91 in August, 2010.
image0058.jpg
Mountbatten negotiating with the Founder. Due to the text below this photograph, the book "Freedom At Midnight" is technically 'banned' in Pakistan ever since its publication more than 30 years ago. They titled the picture "Pakistans' improbable prophet."
image0065.jpg
The Founding Fathers attend the Round Table Conference, 1930. Mr Jinnah is second from right in the front row and Sir Zafrullah Khan is second from the left. The Ali brothers are also there, while Begum Shahnawaz sits next to Sir Zafarullah Khan.
image00110.jpg
Rutten Bai Petit married Jinnah in 1918. Born a Parsi, on her 18th birthday and left her fathers' mansion with two pets only to marry Jinnah. Exactly eleven years later she died of abdominal cancer. Jinnah never married again and died a lonely man. Known as the nightingale of Bombay, Ruttie died on her 29th birthday on 20 February, 1929.
image0161.jpg
Jinnah and Liaquat - Uneasy relations?
image0274.jpg
Third President of Pakistan 1969-1971. Deposed and placed under house arrest
image0303.jpg
Sir Abdullah Haroon with his daughter Doulat Haroon
image00329.jpg
Jawaharlal and Kamala Nehru on their wedding
image00432.jpg
Subhas Chandra Bose with Mr. Jinnah
An ICS officer from Bengal, S. C. Bose (1897-1945) resigned from service and was twice elected president of the Congress but had to quit due to ideological differences with Gandhi and Nehru. He later became President of the Indian National Army during World War II. He travelled to Germany but disillusioned with Hitler, he moved to Japan and fought for the independence of India from British rule. Here he is seen in a meeting with Mr. Jinnah. Bose, commonly known as Netaji in India, is believed to have died in an air crash on 18 August, 1945, over Taiwan but his death is shrouded in mystery. He may have died as a Russian PoW in Siberia.
image00826.jpg
image0097.jpg
image01024.jpg
What Mr. Jinnah actually got. He called it a 'moth eaten' Pakistan,
but agreed to it

image01321.jpg
Mr Jinnah with a black Doberman and West Highland Terrier in Bombay during the forties
image01430.jpg
Mr Jinnahs' first and last birthday in Pakistan - 25 December, 1947. Reading about the felicitations on his birthday in the 'Dawn.' The headline says '71 today' The main headline is a statement given by Sindh Prime Minister Khuhro and reads 'Khuhro doesn't want Hindus to leave Sind.'
image01512.jpg
Mohamed Ali Jinnah on the cover of Time Magazine in 1946
image01717.jpg
The Founder takes the salute, 14 August, 1947. His ADCs include Gul Hassan Khan later the last C-in-C of the Pakistan Army and Syed M. Ahsan C-in-C of the Pakistan Navy and Governor of East Pakistan
image01919.jpg
Two Sardars - Sherbaz Mazari with Akber Bugti, 1954
image02114.jpg
Comrades in Arms - Four Future Air Force Chiefs in the Royal Air Force. Seen in the picture are Air Chief Marshal Mehra Indian CAS from 1973 to 1976, Air Marshal Asghar Khan, Air Marshal Nur Khan and Air Marshal Zafar Chaudhry. While Asghar Khan opted for politics after retirement and never cared for power, Nur Khan was Deputy CMLA, Minister for all the Social Sectors and Governor of West Pakistan. Like Asghar Khan and Nur Khan, Zafar Chaudhry also headed the PIA before heading the PAF

image02020.jpg
WHERE THE ROT STARTED:Justice Munir deals a death blow to Pakistan. When Governor General Ghulam Muhammed dismissed the Constituent Assembly of Pakistan in 1954, the Sindh Chief Court declared his action ultra vires of the constitution. However under a lure of Deputy governor General ship offered to Justice Munir he validated the order under the Doctrine of Necessity and dealt a death blow to the judiciary. Subsequently sodomy cases were filed against the honourable judges of the Sindh Chief Court, who ruled against the Governor General
image02225.jpg
Three trusted comrades of Ayub Khan. Air Marshal Nur Khan, Gen Musa and Vice Admiral A R Khan headed the three services during most of Ayubs' rule.
image02323.jpg
A young Air Marshal Nur Khan
image02434.jpg
Gen Ayub Khan - Prime Minister for 13 hours. Gen Ayub Khan was appointed Chief Martial Law Administrator on 7 October, 1958. 20 days later President Iskander Mirza appointed him as Prime Minister and he is seen presiding over a Cabinet meeting. 13 hours after his appointment, Mirza was deposed and Ayub Khan became the second President of the country. To his left civilian Deputy CMLA Mr Aziz Ahmed fixes his knot while Generals Azam, Burki and Sheikh, Manzur Qadir and 29-year old Z A Bhutto look on.
image02518.jpg
Ayub Khan signing the Tashkent Agreement in 1966. Commerce Minister Ghulam Faruque, Foreign Minister Z A Bhutto and Foreign Secretary Aziz Ahmed look on. Prime Minister Shastri died the same night of a heart attack. A member of Pakistan entourage woke up the Foreign Minister and told him on the telephone, 'The [Edited Out] is dead'. Still in his sleep Bhutto asked 'Which one?'
image02927.jpg
Remembering Zaibunissa Hamidullah 1921-2000
Zaibunnissa Hamidullah was a pioneer amongst women journalists of South Asia. A column writer for English newspapers, including Dawn, Zaibunnissa launched Pakistans' first womans' weekly in English, The Mirror. Even though a socialite magazine, it often created ripples by its strong political editorials critical of the policies and actions of the rulers of the day in a language and style that at times earned her the wrath of the wielders of power. The power of her pen rattled Ayub Khan when she lashed out at him for elevating himself to the rank of Field Marshal, and in November 1957, his predecessor Iskander Mirza, shut the paper down for six months when Mirror flayed him for dismissing the Suhrawardy ministry. The paper was read as much for its social content as for the biting sarcasm and wit that characterized the writings of its editor. The magazine closed down in 1972 after twenty-one years of struggle against authoritarian trends in our politics and bigotry and fanaticism in society. The sting in her writings earned her quite a few enemies, but even her detractors admired her for the courage of conviction and the strength of character she displayed throughout her professional and personal life.

image02815.jpg
President Yahya Khan arrives in Moenjodaro Airport in January 1971. Mr Bhutto received him
image03122.jpg
Friends turned Foes - Sherbaz Mazari with Z A Bhutto in 1959
image03213.jpg
Z A Bhutto with Indira Gandhi in the lush lawns of Simla 1972 negotiations
image03431.jpg
BRISTOL HOTEL – KARACHI (1910-1994)
For those who may remember the Bristol Hotel Karchi was constructed by a Welshman in 1910 near the Cantonment Railway Station-Karachi, parallel to the rail tracks between Karachi Cantt and Karachi City Railway Station. It is in close proximity to the current location of the British Council. Initially a Tavern & Bistro for the affluent ones..mostly the high echelons and army officials under the British Raj of early 1900s. The hotel was also mostly the venue of the most talked about New Year parties, May Queen Ball and wedding parties and became the most popular place of Kolachi or Kurracchee then which continued till the late fifties when the Welshmen’s son Grout, left for UK selling it to a Pakistani namely Mr Rizvi, an income tax officer in 1960. At that time, Karachi had hardly a few hotels, which were worth a stay; Metropole, Palace, Beach Luxury, Grand, Excelsior, Taj…with Intercontinental (now PC) commencing its operations in May 1961. Mr. Rizvi maintained the grandeur of BRISTOL and it’s BAR and particularly it’s cuisine, which was probably the best in Karachi attracting people from far and wide. The New Year Parties and May Queen Ball continued with the same fervor and glamour. During the sixites the price tag of NYP entry for a couple was Rs.300 - a small fortune in those days. Bristol continued to attract affluent Karachi-ites for it’s cuisine, large rooms, lush green lawns with Saturday Night Discos and Night Club with groups from Thailand, Germany and France were in attendance later adopted by the Minwallas of Metropole for their ever popular SAMAR night club and dine out of the seventies. The BRISTOL Hotel breathed it’s last when it was attacked by some dacoits and Mr. Rizvi suffering injuries in 1994 which re-occurred and within six months. Mr Rizvi was virtually forced to call it quits. The building of the hotel, however, remains as a home now. It is said that the American movie star Donna Reed stayed at Bristol sometime in 1961 during her overnight visit to Karachi enroute to Cairo on the arrangement by PAN AMERICAN airlines which used to house it’s crew at Malir’s GRAND Hotel of Minwallas, near Karachi Stargate Airport of 1935

Attached Thumbnails

  • image01116.jpg

Saturday, February 2, 2013

World First Computer Virus Was Created By 2 Pakistanis in 1986



Two Pakistani brothers invented the "Pakistani Brain" virus.. When and how did the metaphor of the computer 'virus' arise? Lauri Mullens Los Angeles, Calif. Back to Ask the Experts Rob Rosenberger is a computer consultant who maintains the Computer Virus Myths Homepage. He replies: The roots of the modern computer virus go back to 1949, when computer pioneer John von Neumann presented a paper on the "Theory and Organization of Complicated Automata," in which he postulated that a computer program could reproduce. Bell Labs employees gave life to von Neumann's theory in the 1950s in a game they called "Core Wars." In this game, two programmers would unleash software "organisms" and watch as they vied for control of the computer. You can read about Core Wars in the May 1984 issue of Scientific American. Strangely enough, two science-fiction books in the 1970s helped to promote the concept of a replicating program. Thomas Brunner's Shockwave Rider and Thomas Ryan's Adolescence of P-1 depicted worlds where a piece of software could transfer itself from one computer to another without detection. Back in the real world, Fred Cohen presented the first rigorous mathematical definition for a computer virus in his 1986 Ph.D. thesis. Cohen coined the term "virus" at this point and is considered the father of what we know today as computer viruses. He sums it up in one sentence as "a program that can infect other programs by modifying them to include a, possibly evolved, version of itself." The media seldom mentioned computer viruses in the mid-1980s, treating the whole concept as an obscure theoretical problem. The media's perception of viruses took a dramatic turn in late-1988, when a college student named Robert T. Morris unleashed the infamous "Internet Worm." (Some trivia: Morris's father had a hand in the original Core Wars games.) Reporters grew infatuated with the idea of a tiny piece of software knocking out big mainframe computers worldwide. The rest, as they say, is history. Some references: V.I.R.U.S. Protection by Pamela Kane. Bantam Books, New York, 1989. "Computer Viruses: Theory and Experiments," described by Frederick B. Cohen in A Short Course on Computer Viruses; ASP Press, Pittsburgh, 1990. Steven White, manager of IBM Research's Massively Distributed System Group, offers some complementary information: The term "computer virus" was coined in the early 1980s. Fred Cohen, then a Ph.D. student at the University of Southern California, came up with the idea of using self-replicating software, which spreads by attaching itself to existing programs as a way of attacking the security of multi-user computing systems. He showed this idea to Len Adleman, his thesis advisor. Adleman pointed out the similarity to a biological virus, which uses the resources of the cell it attacks to reproduce itself, and the term "computer virus" began its journey into everyday English. Since then, computer viruses have mimicked their biological namesakes, spreading digital disease around the world. And, here at IBM Research, we are taking inspiration from biological defenses to viruses and creating a kind of immune system for cyberspace, which will be able to find, analyze and eliminate new computer viruses from the world's computers quickly and automatically. Alex Haddox is product manager of the Symantec AntiVirus Research Center, which manufactures Norton AntiVirus products. He adds: The history of the computer virus began in the 1940s when John von Neumann published a paper called "Theory and Organization of Complicated Automata" which documented the possibility of replicating computer programs. John Conway is credited with creating the first "virus" in the form of a life emulating program called the "Game of Life" in the 1960s. In the 1970s, the first true self-replicating programs, referred to as "organisms," were written as experiments in artificial intelligence on UNIX systems and used in small, isolated network type games by large research companies. In 1983, the term "virus" was first coined to describe self-replicating programs by Frederick Cohen and his colleague, Len Alderman. The first reports of serious damage from a PC virus occurred in 1986; the infection was caused by the "Pakistani Brain" virus, which was written by two brothers, Basit and Amjad Farooq Alvi, of Lahore, Pakistan. A final reply comes from Jacob Motola of Integralis, a software security company: The concept behind the first malicious computer programs was described years ago in the Computer Recreations column of Scientific American. The metaphor of the "computer virus" was adopted because of the similarity in form, function and consequence with biological viruses that attack the human system. Computer viruses can insert themselves in another program, taking over control or adversely effecting the function of the program. Like their biological counterparts, computer viruses can spread rapidly and self-replicate systematically. They also mimic living viruses in the way they must adapt through mutation to the development of resistance within a system: the author of a computer virus must upgrade his creation in order to overcome the resistance (antiviral programs) or to take advantage of new weakness or loophole within the system. Computer viruses also act like biologics in the way they can be set off: they can be virulent from the outset of the infection or the can be activated by a specific event (logic bomb). But computer viruses can also be triggered at a specific time (time bomb). Most viruses act innocuous towards a system until their specific condition is met. The computer industry has expanded the metaphor to now include terms like inoculation, disinfection, quarantine and sanitation. Now if your system gets infected by a computer virus you can quarantine it until you can call the "virus doctor" who can direct you to the appropriate "virus clinic" where your system can be inoculated and disinfected and an anti-virus program can be prescribed.

Thursday, January 31, 2013

Jamia Binoria’s Mufti Killing in Karachi


Karachi: Three people were killed when unknown motorcyclists opened fire on a vehicle near Nursery bridge on Shahrah-e-Faisal in Karachi. Rescue workers said four people were traveling in Hi-roof Suzuki vehicle when gunmen on a bike opened fire, killing three of them and injuring one. The injured has been shifted to nearby hospital.

Sunday, January 27, 2013

Google Offers $1 Million Reward For Hacking Their ‘Chrome’ Browser


For the last three years, Google’s Chrome browser has left the world’s premiere hacking competition unscathed, even as Firefox, Internet Explorer and Safari have all been taken down by the assembled security researchers. So this year, Google is offering hackers a million reasons to re-focus their efforts. Google has today announced that it’s putting up a bounty of $1 Million for anyone who can hack its Chrome browser and pinpointing vulnerabilities within it.
The competition called Pwnium will take place at this years CanSecWest security conference on March 7th. With prices totalling a million dollars, with prizes for $60,000, $40,000 and $20,000, for finding vulnerabilities in Chrome. Pwnium is being organised by Google and is a splinter contest from the well known Pwn2Own hacking contest. The competition will be run on a first come first serve basis and winners will also be given a tasty new Chromebook. Google decided to launch its own contest this year due to the organisers of Pwn2Own, Tipping Point say that contestants do not need to reveal the techniques used to breach the browsers’ security. Google explains: We will issue multiple rewards per category, up to the $1 million limit, on a first-come-first served basis. There is no splitting of winnings or “winner takes all.” We require each set of exploit bugs to be reliable, fully functional end to end, disjoint, of critical impact, present in the latest versions and genuinely “0-day,” i.e. not known to us or previously shared with third parties. Contestant’s exploits must be submitted to and judged by Google before being submitted anywhere else. During previous Pwn2Own competitions Google’s Chrome browser has with stood the onslaught of hackers and come away without being hack for three years on the trot. Unlike other well known browser such as Safari, Firefox and Internet Explorer that have all been hacked each year. For more information on the competition and prizes jump over to the Google Pwnium Blog post. Source: Google