Psychic investigators or Psychic detectives: Do they work with Qareen (Jinn companion)? Mediums also use Qareen?
Tuesday, April 30, 2019
Sura: Al-A'raf (The Heights) Sura # 7 Verse # 143
And when Moses arrived at Our appointed time and his Lord spoke to him, he said, "My Lord, show me [Yourself] that I may look at You." [ Allah ] said, "You will not see Me, but look at the mountain; if it should remain in place, then you will see Me." But when his Lord appeared to the mountain, He rendered it level, and Moses fell unconscious. And when he awoke, he said, "Exalted are You! I have repented to You, and I am the first of the believers."
Sura: Al-A'raf (The Heights)
Sura # 7
Verse # 143
Sura # 7
Verse # 143
By the star when it descends,
Sura: An-Najm (The star)
Sura # 53 Verse # 1
By the star when it descends,
Sura # 53 Verse # 1
By the star when it descends,
Monday, April 29, 2019
Trojan horse (computing)
Uses of a Trojan horse
When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:
Give the attacker backdoor control over the computing device.
Record keyboard strokes to steal the user's account data and browsing history.
Download and install a virus or worm to exploit a vulnerability in another program.
Install ransomware to encrypt the user's data and extort money for the decryption key.
Activate the computing device's camera and recording capabilities.
Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.
Legally capture information relevant to a criminal investigation for law enforcement.
When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:
Give the attacker backdoor control over the computing device.
Record keyboard strokes to steal the user's account data and browsing history.
Download and install a virus or worm to exploit a vulnerability in another program.
Install ransomware to encrypt the user's data and extort money for the decryption key.
Activate the computing device's camera and recording capabilities.
Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.
Legally capture information relevant to a criminal investigation for law enforcement.
https://searchsecurity.techtarget.com/definition/Trojan-horse
Sura Al-Mulk, Sura # 67 Verse # 19
Whenever I see a bird flying in the sky -- I just utter Al-Mulk because I don't know these verses by heart.
Do they not see the birds above them with wings outspread and [sometimes] folded in? None holds them [aloft] except the Most Merciful. Indeed He is, of all things, Seeing.
https://quran.com/67
not a leaf falls, but He knows it.
Whenever I pass by and a leaf falls I utter this: not a leaf falls, but He knows it.
[al-An’aam 6:59]
Is man’s fate pre-destined or does he have freedom of will?
https://islamqa.info/en/answers/20806/is-mans-fate-pre-destined-or-does-he-have-freedom-of-will
https://islamqa.info/en
Source: Islam Q&A
Question # 20806 https://islamqa.info/en
Saturday, April 27, 2019
egalitarianism
1 : a belief in human equality especially with respect to social, political, and economic affairs
2 : a social philosophy advocating the removal of inequalities among people
2 : a social philosophy advocating the removal of inequalities among people
egalitarian
believing that all people are equally important and should have the same rights and opportunities in life:
an egalitarian society
The party's principles are basically egalitarian.
an egalitarian society
The party's principles are basically egalitarian.
Definition of 'Poverty Trap'
Definition: Poverty trap is a spiraling mechanism which forces people to remain poor. It is so binding in itself that it doesn't allow the poor people to escape it. Poverty trap generally happens in developing and under-developing countries, and is caused by a lack of capital and credit to people.
Description: Poverty trap can be broken by planned investments in the economy and providing people the means to earn and be employed. A series of poverty alleviation programs can be enforced to raise individuals out of poverty by providing monetary aid for a period of time.
But if the plan fails, people will become dependent on such programs forever and may even go deeper down in the poverty spiral. However, poorer countries find this to be difficult, leading to the over-exploitation of natural resources and land.
Description: Poverty trap can be broken by planned investments in the economy and providing people the means to earn and be employed. A series of poverty alleviation programs can be enforced to raise individuals out of poverty by providing monetary aid for a period of time.
But if the plan fails, people will become dependent on such programs forever and may even go deeper down in the poverty spiral. However, poorer countries find this to be difficult, leading to the over-exploitation of natural resources and land.
Source: https://economictimes.indiatimes.com/definition/poverty-trap
advice column
: an article in a newspaper or magazine that offers advice to people who write to ask for help with a problem
Friday, April 26, 2019
Classless society
Monday, September 3, 2012
Leanings . . . .
I think I've communistic leanings from the beginning.
Posted by Maqsood Qureshi at 9:47 PM
----------------------------------------------------------
Thursday, December 13, 2012
Classless society
I don't believe in class distinctions. I believe in a classless society. I believe that--fundamentally--all men and women are equal.
Posted by Maqsood Qureshi at 12:45 AM
-------------------------------------------------------------
Tuesday, November 23, 2010
Classless society . . . .
I believe in a classless society. Does that make me a Communist? I think I've a Communistic streak in me.
Posted by Maqsood Qureshi at 2:55 PM
-------------------------------------------------------------
1 : a distinctive doctrine, cause, or theory
2 : an oppressive and especially discriminatory attitude or belief
I don't know much about isms -- Communism or this and that -- but when I see laborers -- I get guilty pangs -- in the scorching sun -- infants and toddlers -- playing in dirt -- all of us see this almost everyday -- we pass by these construction sites -- immune to their sufferings --
Leanings . . . .
I think I've communistic leanings from the beginning.
Posted by Maqsood Qureshi at 9:47 PM
----------------------------------------------------------
Thursday, December 13, 2012
Classless society
I don't believe in class distinctions. I believe in a classless society. I believe that--fundamentally--all men and women are equal.
Posted by Maqsood Qureshi at 12:45 AM
-------------------------------------------------------------
Tuesday, November 23, 2010
Classless society . . . .
I believe in a classless society. Does that make me a Communist? I think I've a Communistic streak in me.
Posted by Maqsood Qureshi at 2:55 PM
-------------------------------------------------------------
1 : a distinctive doctrine, cause, or theory
2 : an oppressive and especially discriminatory attitude or belief
I don't know much about isms -- Communism or this and that -- but when I see laborers -- I get guilty pangs -- in the scorching sun -- infants and toddlers -- playing in dirt -- all of us see this almost everyday -- we pass by these construction sites -- immune to their sufferings --
Thursday, April 25, 2019
Reprint: Life comes with F1 key...
Reprint
Wednesday, September 11, 2013
Life comes with F1 key...
Life comes with F1 key. Life comes with an Escape key. It's your intuition. Believe me: You've shamanic abilities. All of us... You just have to discover how to tap into it. You've to hone it. This is not an exact science. And, I'm no quack. This is based purely on my personal experiences. But I'd tell you one thing with absolute certainty: It's more attentive if you've a clear conscience. It shies away from you if you're conscience-stricken. It starts with Simplex then progresses to full-fledged Duplex communication. :-)
Wednesday, September 11, 2013
Life comes with F1 key...
Life comes with F1 key. Life comes with an Escape key. It's your intuition. Believe me: You've shamanic abilities. All of us... You just have to discover how to tap into it. You've to hone it. This is not an exact science. And, I'm no quack. This is based purely on my personal experiences. But I'd tell you one thing with absolute certainty: It's more attentive if you've a clear conscience. It shies away from you if you're conscience-stricken. It starts with Simplex then progresses to full-fledged Duplex communication. :-)
Wednesday, April 24, 2019
Kids Definition of amen
1 —used at the end of a prayer
2 —used to express agreement
When I said we could use a bit of luck, he replied, “Amen!”
Does intuitive have anything to do with a sixth sense?
Nowadays, we often see intuitive used in contexts pertaining to technology that is easy to understand. A smartphone with an “intuitive interface” is one that doesn't need much explaining; you can usually figure out how it works as soon as you fire it up.
The related noun intuition, meanwhile, describes a feeling of knowing or understanding something without evident rational thought and inference. A parent's intuition might tell him or her that a child is in danger, even if there is no logical reason to believe so.
So does intuitive have anything to do with what is often called the sixth sense? Well, the sixth sense is defined as "a keen intuitive power." It is synonymous with ESP or extrasensory perception. As its name implies, ESP describes a purported ability to know something that cannot be known by normal use of the senses.
The Swiss psychologist Jean Piaget (1896-1980) used the term intuitive substage to refer to the stage of cognitive development when children have acquired a vast amount of knowledge but have not considered how they acquired it, so they accept it as true.
An interface is intuitive because it makes sense according to what we expect from how older interfaces are designed. A parent's intuitive sense of danger may still be prompted by subtle hints that things just aren't as they should be, even if the parent cannot identify exactly how. So while sixth sense refers to the ability to acquire knowledge from beyond the five senses, intuitive tends to apply more to knowledge absorbed through experience, even when not immediately recognized as such.
hunch
: a strong intuitive feeling concerning especially a future event or result
had a hunch I would find you here
Tuesday, April 23, 2019
memory lane
: an imaginary path through the nostalgically remembered past —usually used in such phrases as a walk down memory lane
Monday, April 22, 2019
Who's this Mike, anyways eh? LOL
Mike Chapple, CISSP, Ph.D.
Information Security Leader, Author, Instructor and Speaker
Mike Chapple is Senior Director for IT Service Delivery at the University of Notre Dame. In this role, he oversees the information security, IT architecture, project management, strategic planning and IT compliance functions for the Office of Information Technologies. Mike also serves as a concurrent assistant professor in the University’s Computer Applications Department where he teaches an undergraduate course on Information Security.
Dr. Chapple previously served as Senior Advisor to the Executive Vice President at Notre Dame for two years. Prior to that, he was program manager of the University’s Information Security Program and a consultant to the Notre Dame Alumni Association on alumni engagement initiatives.
Before returning to Notre Dame, Mike served as Executive Vice President and Chief Information Officer of the Brand Institute, a Miami-based consulting firm. Dr. Chapple also spent four years in the information security research group at the National Security Agency and serving as an active duty intelligence officer in the U.S. Air Force. He is a technical editor for Information Security Magazine and has written over a dozen books, including the CISSP Prep Guide (now in its sixth edition) and the Security+ Training Kit.
Mike earned both his bachelor’s and doctoral degrees from Notre Dame in computer science & engineering. He also holds a MS in computer science from the University of Idaho and an MBA from Auburn University.
Information Security Leader, Author, Instructor and Speaker
Mike Chapple is Senior Director for IT Service Delivery at the University of Notre Dame. In this role, he oversees the information security, IT architecture, project management, strategic planning and IT compliance functions for the Office of Information Technologies. Mike also serves as a concurrent assistant professor in the University’s Computer Applications Department where he teaches an undergraduate course on Information Security.
Dr. Chapple previously served as Senior Advisor to the Executive Vice President at Notre Dame for two years. Prior to that, he was program manager of the University’s Information Security Program and a consultant to the Notre Dame Alumni Association on alumni engagement initiatives.
Before returning to Notre Dame, Mike served as Executive Vice President and Chief Information Officer of the Brand Institute, a Miami-based consulting firm. Dr. Chapple also spent four years in the information security research group at the National Security Agency and serving as an active duty intelligence officer in the U.S. Air Force. He is a technical editor for Information Security Magazine and has written over a dozen books, including the CISSP Prep Guide (now in its sixth edition) and the Security+ Training Kit.
Mike earned both his bachelor’s and doctoral degrees from Notre Dame in computer science & engineering. He also holds a MS in computer science from the University of Idaho and an MBA from Auburn University.
Sunday, April 21, 2019
thespian
Did You Know?
Greek drama was originally entirely performed by choruses. According to tradition, the Greek dramatist Thespis, of the 6th century B.C., was the inventor of tragedy and the first to write roles for the individual actor as distinct from the chorus, and the actor's exchanges with the chorus were the first dramatic dialogue. Since Thespis himself performed the individual parts in his own plays, he was also the first true actor. Ever since choruses disappeared from drama, thespians have filled all the roles in plays. Thespian is also an adjective; thus, we can speak of "thespian ambitions" and "thespian traditions", for example.
Saturday, April 20, 2019
Gold rush
Gold rush, rapid influx of fortune seekers to the site of newly discovered gold deposits. Major gold rushes occurred in the United States, Australia, Canada, and South Africa in the 19th century.
https://www.britannica.com/event/gold-rush
Gold rush
: a situation in which many people go quickly to a place where gold has been discovered because they hope to find more gold and become rich
cheat sheet
: a written or graphic aid (such as a sheet of notes) that can be referred to for help in understanding or remembering something complex
Friday, April 19, 2019
Roy Sullivan: Cause of death
Suicide by self-inflicted gunshot wound to the head
https://en.wikipedia.org/wiki/Roy_Sullivan
Roy Sullivan: man hit seven times by lightning who survived
Roy Cleveland Sullivan (February 7, 1912 – September 28, 1983) was a United States park ranger in Shenandoah National Park in Virginia. Between 1942 and 1977, Sullivan was hit by lightning on seven different occasions and survived all of them. For this reason, he gained a nickname "Human Lightning Conductor" and "Human Lightning Rod". Sullivan is recognized by Guinness World Records as the person struck by lightning more recorded times than any other human being.
https://en.wikipedia.org/wiki/Roy_Sullivan
Statistics:
https://en.wikipedia.org/wiki/Roy_Sullivan
Statistics:
The odds of being struck by lightning for a person over the period of 80 years have been roughly estimated as 1:10000.[13] If the lightning strikes were independent events, the probability of being hit seven times would be (1:10000)7 = 1:1028. These numbers do not quite apply to Sullivan, however, who by the nature of his work was more exposed to storms than the average person. Virginia, where he lived, averages 35 to 45 thunderstorm days per year, most of which fall in June, July, and August. Between 1959 and 2000 lightning killed 58 people and injured at least 238 people in Virginia. In the United States, 3239 people were killed and 13,057 injured by lightning in the same period. Most of those were males between 20 and 40 years old caught outdoors.
Thursday, April 18, 2019
11 Authors on Their One-Word Book Titles
The art of telling an entire story with a single word
What's in a Name?
At Merriam-Webster we know that words have the power to shape worlds both real and imagined. And we know that writing is hard work. To distill a story, its characters, and all the associated emotions into a single word is no small feat.
That’s why we’ve partnered with eleven of our favorite authors who have shared the story and significance behind their one-word-title books.
https://www.merriam-webster.com/words-at-play/authors-on-their-one-word-book-titles/lauren-elkin-_flaneuse_
What's in a Name?
At Merriam-Webster we know that words have the power to shape worlds both real and imagined. And we know that writing is hard work. To distill a story, its characters, and all the associated emotions into a single word is no small feat.
That’s why we’ve partnered with eleven of our favorite authors who have shared the story and significance behind their one-word-title books.
https://www.merriam-webster.com/words-at-play/authors-on-their-one-word-book-titles/lauren-elkin-_flaneuse_
Who's Kevin Beaver anyways? LOL
Kevin Beaver is an independent information security consultant, expert witness, professional speaker, and writer with Atlanta-based Principle Logic, LLC. He has over three decades of experience in IT and has spent a quarter of a century working in security. Kevin specializes in performing independent information security assessments for corporations, security product vendors, software developers/cloud service providers, government agencies, nonprofit organizations, among others. Before starting his information security consulting practice in 2001, Kevin served in various information technology (IT) and security roles for several healthcare, e-commerce, financial, and educational institutions.
Kevin has appeared on CNN television as an information security expert and has been quoted in The Wall Street Journal, Entrepreneur, Fortune Small Business, Women's Health, and on Inc. magazine’s technology site, IncTechnology.com. Kevin’s work has also been referenced by the PCI Council in their Data Security Standard Wireless Guidelines. Kevin has been a top-rated speaker, giving hundreds of presentations and panel discussions for IT and security seminars, conferences, and webcasts over the past decade and a half.
Kevin has authored or co-authored 12 information security books, including Hacking Wireless Networks For Dummies, Implementation Strategies for Fulfilling and Maintaining IT Compliance (Realtimepublishers.com), and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). Kevin has written more than three dozen whitepapers and over 1,000 articles and guest blog posts for sites such as TechTarget’s SearchSecurity.com, SearchEnterpriseDesktop.com, and SearchSoftwareQuality.com, Ziff Davis’ Toolbox.com, as well as IBM’s SecurityIntelligence.com. Kevin is the creator and producer of the Security On Wheels audiobooks, which provide security learning for IT professionals on the go (securityonwheels.com), and the Security On Wheels blog (securityonwheels.com/blog). He also covers information security and related matters on Twitter (@kevinbeaver) and YouTube (PrincipleLogic). Kevin earned his bachelor’s degree in Computer Engineering Technology from Southern College of Technology and his master’s degree in Management of Technology from Georgia Tech. He has obtained his CISSP certification in 2001 and also holds MCSE, Master CNE, and IT Project+ certifications.
Kevin can be reached through his website, https://www.principlelogic.com, and you can connect to him via LinkedIn at https://www.linkedin.com/in/kevinbeaver.
Kevin has authored or co-authored 12 information security books, including Hacking Wireless Networks For Dummies, Implementation Strategies for Fulfilling and Maintaining IT Compliance (Realtimepublishers.com), and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). Kevin has written more than three dozen whitepapers and over 1,000 articles and guest blog posts for sites such as TechTarget’s SearchSecurity.com, SearchEnterpriseDesktop.com, and SearchSoftwareQuality.com, Ziff Davis’ Toolbox.com, as well as IBM’s SecurityIntelligence.com. Kevin is the creator and producer of the Security On Wheels audiobooks, which provide security learning for IT professionals on the go (securityonwheels.com), and the Security On Wheels blog (securityonwheels.com/blog). He also covers information security and related matters on Twitter (@kevinbeaver) and YouTube (PrincipleLogic). Kevin earned his bachelor’s degree in Computer Engineering Technology from Southern College of Technology and his master’s degree in Management of Technology from Georgia Tech. He has obtained his CISSP certification in 2001 and also holds MCSE, Master CNE, and IT Project+ certifications.
Kevin can be reached through his website, https://www.principlelogic.com, and you can connect to him via LinkedIn at https://www.linkedin.com/in/kevinbeaver.
Monday, April 15, 2019
Lucian: Greek writer (I'd like to read his bio)
Lucian, Greek Lucianos, Latin Lucianus, (born ad 120, Samosata, Commagene, Syria [now Samsat, Tur.]—died after 180, Athens [Greece]), ancient Greek rhetorician, pamphleteer, and satirist.
https://www.britannica.com/biography/Lucian
Movie script: Chasing Rainbows
Here we go now:
Character 1: A boy
Character 2. A girl
He wants to be a pilot but he's too poor to afford it.
Girl helps him get his wings -- PPL Private Pilot License
There she meets his Flying Instructor.
Then everything takes a U-turn
Twist: To be continued …
I don't think there's any aviation movie in India.
How about the girl earning her license with him?
Scriptwriter eh? That's me.
Like Top Gun movie -- this movie might inspire young adults to take up flying as a career or just a hobby. This is a very responsible job -- Discipline and all that. Would turn 'em into men and women of sound character.
Saturday, April 13, 2019
Friday, April 12, 2019
Reprint: Graphic novel (I wrote this during my bout / relapse of schizophrenia)
Saturday, March 18, 2017
My Soul Mate: An Unfinished Quest: My First Comic Book Series based on the following characters.
Character: The Hunchbacked Whirling Dervish is a boy next door - type of chap. He's in perpetual quest for his soul mate. He almost always gets dumped. He goes through a seesaw of sulking and euphoria. But he's die-hard resilience in him. He's a wee bit of faith in God. He role-plays: Sometimes: He's a Counter-Terrorist Professional -- sometimes a Richard-Bach-like Barnstormer. God loves him. He's God close friend but God never tells me that. The Hunchbacked Whirling Dervish prays to God that God I want to be your Close Friend.
Mentor: Is God.
Miss Spock-y Ears: Is The Hunchbacked Whirling Dervish's latest crush. Just the same as always: The Whirling Dervish firmly believes that he has finally found his soul mate. And, he's in madly love with her but doesn't tell her that. She knows everything about him but as he's quite naïve so she doesn't want to hurt him.
Ex-Soul Mates: The Hunchbacked Whirling Dervish's former Soul Mates who keep bumping into him from time to time.
Posted by Maqsood Qureshi at 2:40 PM
My Soul Mate: An Unfinished Quest: My First Comic Book Series based on the following characters.
Character: The Hunchbacked Whirling Dervish is a boy next door - type of chap. He's in perpetual quest for his soul mate. He almost always gets dumped. He goes through a seesaw of sulking and euphoria. But he's die-hard resilience in him. He's a wee bit of faith in God. He role-plays: Sometimes: He's a Counter-Terrorist Professional -- sometimes a Richard-Bach-like Barnstormer. God loves him. He's God close friend but God never tells me that. The Hunchbacked Whirling Dervish prays to God that God I want to be your Close Friend.
Mentor: Is God.
Miss Spock-y Ears: Is The Hunchbacked Whirling Dervish's latest crush. Just the same as always: The Whirling Dervish firmly believes that he has finally found his soul mate. And, he's in madly love with her but doesn't tell her that. She knows everything about him but as he's quite naïve so she doesn't want to hurt him.
Ex-Soul Mates: The Hunchbacked Whirling Dervish's former Soul Mates who keep bumping into him from time to time.
Posted by Maqsood Qureshi at 2:40 PM
Thursday, April 11, 2019
hands-on
obtained by doing something, not by reading about it or by watching it done:
hands-on experience/training/education
hands-on experience/training/education
Wednesday, April 10, 2019
A futurist father and his inquisitive son ...
Father builds a ship.
Son: What's this, dad?
Father says: It's a ship.
Son: What's it? How does it run?
Father: It can't run. There should be an ocean for it to run.
Why did you build it when it can't run?
For you?
For me?
Yep.
To be continued …
Son: What's this, dad?
Father says: It's a ship.
Son: What's it? How does it run?
Father: It can't run. There should be an ocean for it to run.
Why did you build it when it can't run?
For you?
For me?
Yep.
To be continued …
future shock
Definition of future shock
: the physical and psychological distress suffered by one who is unable to cope with the rapidity of social and technological changes
: the physical and psychological distress suffered by one who is unable to cope with the rapidity of social and technological changes
Internet. What's next? Brace yourself for future shock!
Internet --> YouTube --> Local YouTube / TV channels
My point is Internet is the Parent Technology.
And, everything that runs on it is Child Technology.
Here's an analogy for you guys:
Building a ship where there's no ocean is insightful; Futuristic.
To be continued …
My point is Internet is the Parent Technology.
And, everything that runs on it is Child Technology.
Here's an analogy for you guys:
Building a ship where there's no ocean is insightful; Futuristic.
To be continued …
Of the 187 countries that SimilarWeb surveyed, WhatsApp emerged as a clear leader on 109 nations, or 55.6% of the world. Other than India, other countries where the messaging app has a strong user base are include Brazil, Mexico, UK, Russia, and several countries in South America.
WhatsApp now 'rules' over half of the world
According to a report, WhatsApp is installed on 94.8% of all Android devices and is used for an average of 37 minutes daily.
WhatsApp is widely known to be the world's most popular messaging app. Here's more proof to it. According to recent research from digital market intelligence company SimilarWeb, WhatsApp is the top mobile messaging app in 109 countries across the world. In India, Facebook-owned WhatsApp is installed on 94.8% of all Android devices and is used for an average of 37 minutes daily, according to the report.
Source:
https://economictimes.indiatimes.com/magazines/panache/WhatsApp-now-rules-over-half-of-the-world/articleshow/52432250.cms
Internet users in India to reach 627 million in 2019: Report
Internet usage in the country has exceeded half a billion people for first time, pegged at 566 million, driven by rural internet growth and usage.
Source:
https://economictimes.indiatimes.com/tech/internet/internet-users-in-india-to-reach-627-million-in-2019-report/articleshow/68288868.cms
Tuesday, April 9, 2019
The Official CompTIA PenTest+ Study Guide
After reading this study guide you will understand how to:
Perform non-technical tests to gather information
Conduct active reconnaissance
Analyze vulnerabilities
Penetrate networks
Exploit host-based vulnerabilities
Test applications
Complete post-exploit tasks
Plan and scope penetration tests
Conduct passive reconnaissance Perform non-technical tests to gather information
Conduct active reconnaissance
Analyze vulnerabilities
Penetrate networks
Exploit host-based vulnerabilities
Test applications
Complete post-exploit tasks
Analyze and report penetration test results
https://certification.comptia.org/certifications/pentest
EC-Council Certified Ethical Hacker
What is New in CEH Version 10 Course
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
Monday, April 8, 2019
Reprint: Where're my Ouija board? :-) (Wrote during my bout / relapse of schizophrenia)
Tuesday, October 15, 2013
Where're my Ouija board? :-)
1. I've -- miraculously -- revived my robot: Mister WALL-E -- finally! He's comatose for like zillions of months! :-) I'd program this Frankenstein's creature to perform bizarrely geeky feats! Could I improvise it to play darts -- for example?
2. My ethical hacking / penetration testing network is taking shape. Cisco Small Business RV Series Routers? What do you think eh? :-) For instance: Cisco RV215W Wireless-N VPN Firewall? Should I go for it?
3. Windows Server 2012 on an oldie laptop is almost ready.
4. Dedicated Internet connexion plus static IP Address: Stalled. Reason: Bureaucratic red tape!
Nevertheless, the lab should be up and running -- within the next few weeks. I'm soloing -- am dirt-poor plus -- extremely erratic memory! :-) Rational explanations eh? :-)
Where're my Ouija board? I'd summon my long-lost poltergeist friend!
That's all for now.
Bye.
Posted by Maqsood Qureshi at 3:25 AM
Where're my Ouija board? :-)
1. I've -- miraculously -- revived my robot: Mister WALL-E -- finally! He's comatose for like zillions of months! :-) I'd program this Frankenstein's creature to perform bizarrely geeky feats! Could I improvise it to play darts -- for example?
2. My ethical hacking / penetration testing network is taking shape. Cisco Small Business RV Series Routers? What do you think eh? :-) For instance: Cisco RV215W Wireless-N VPN Firewall? Should I go for it?
3. Windows Server 2012 on an oldie laptop is almost ready.
4. Dedicated Internet connexion plus static IP Address: Stalled. Reason: Bureaucratic red tape!
Nevertheless, the lab should be up and running -- within the next few weeks. I'm soloing -- am dirt-poor plus -- extremely erratic memory! :-) Rational explanations eh? :-)
Where're my Ouija board? I'd summon my long-lost poltergeist friend!
That's all for now.
Bye.
Posted by Maqsood Qureshi at 3:25 AM
Reprint: Let me turn rookies into Alpha Geeks... (Probably keyed in during my bout of Schizophrenia --not sure)
Wednesday, October 9, 2013
Let me turn rookies into Alpha Geeks...
My Ethical Hacking / Penetration Testing Lab
Hardware:
1. Laptop: vgc (very good condition)
2. Laptop: Oldie
3. Desktop: Oldie
I shy away from hardware so not giving you specs -- By the way, I'd mug up CompTIA A+ guide(s).
I'd sign up for a dedicated high-speed Internet connexion.
In the not too distant future: I'd also sign up for a dedicated IP address.
I'd also get a Hardware Firewall (dirt cheap) but sturdy -- should deflect attacks -- though I just adore those groovy Check Point's UTM appliances.
Software:
1. Windows Server 2012 (Evaluation copy)
2. Honeypots
3. BBS
What's your role?
You've to attack my systems viciously (no-holds-barred). This a real live Ethical Hacking exercise. Relentless -- knock-down-drag-out -- distributed attacks.
Posted by Maqsood Qureshi at 2:32 AM
Let me turn rookies into Alpha Geeks...
My Ethical Hacking / Penetration Testing Lab
Hardware:
1. Laptop: vgc (very good condition)
2. Laptop: Oldie
3. Desktop: Oldie
I shy away from hardware so not giving you specs -- By the way, I'd mug up CompTIA A+ guide(s).
I'd sign up for a dedicated high-speed Internet connexion.
In the not too distant future: I'd also sign up for a dedicated IP address.
I'd also get a Hardware Firewall (dirt cheap) but sturdy -- should deflect attacks -- though I just adore those groovy Check Point's UTM appliances.
Software:
1. Windows Server 2012 (Evaluation copy)
2. Honeypots
3. BBS
What's your role?
You've to attack my systems viciously (no-holds-barred). This a real live Ethical Hacking exercise. Relentless -- knock-down-drag-out -- distributed attacks.
Posted by Maqsood Qureshi at 2:32 AM
Reprint: I wrote this for Ms. Alizee (I wrote this as well during my bout of schizophrenia!)
Wednesday, December 20, 2017
This is where I love to be
La isla bonita -- A girl sings this lullaby
Every moment is ecstasy
Where scorching sunray like embers of my memory
Her voice is divine and unheard symphony
That wreathes my soul like caged birds cacophony
Her eyes -- untold tales of prophecy
Sailors' quest for the island of Destiny
Emeralds and rubies -- premonition of Shangri–la -- She's my fantasy
She makes me believe in mirages -- that's some real sorcery
This is where I love to be
La isla bonita -- A girl sings this lullaby
She's the one -- White pearl and dark red ruby
My talisman -- I lost in the echoes of her lullaby.
This is where I love to be
La isla bonita -- A girl sings this lullaby
Every moment is ecstasy
Where scorching sunray like embers of my memory
Her voice is divine and unheard symphony
That wreathes my soul like caged birds cacophony
Her eyes -- untold tales of prophecy
Sailors' quest for the island of Destiny
Emeralds and rubies -- premonition of Shangri–la -- She's my fantasy
She makes me believe in mirages -- that's some real sorcery
This is where I love to be
La isla bonita -- A girl sings this lullaby
She's the one -- White pearl and dark red ruby
My talisman -- I lost in the echoes of her lullaby.
Reprint: I wrote this during my bout of schizophrenia!
Friday, October 4, 2013
Can firewalls deter us eh? ;-)
Hacking contests are appetizers...
Team up with fellow Ethical Hackers -- and protect start-ups and individuals particularly women -- from rogue hackers -- voluntarily. You'd easily engage script kiddies -- in the beginning -- and whenever you'd thwart 'em: Have some Pizza; And, of course--Order it online; Garlic bread too, please! :-)
Your war chests aren't your counterstrike / counteroffensive tools -- Your real -- most potent -- arsenal is your mind.
Liaise with White Hat Hackers across India and across the world.
Innate reverence for InfoSec Gurus.
Don't provoke me to come out of retirement -- My formidability is still uncontestable -- Okay, okay -- just kidding! -- Please don't hack my Linux box! :-)
And, no DDoS attacks, either! :-)
I'm fortyish -- retiree -- not even newbies dread me -- now.
Spread out your digital tentacles -- devour those slimy worms.
I'm from the old school -- I staunchly advocate social engineering -- snake charmers and con artists have been swindling us since the Dark Ages -- Charles Sobhraj is an avant-garde social engineer -- Three-tier security cordon: Digital fortress? Sob stories -- Human interest story -- Believe me: Machines are immune but you'd always NLP humans -- They're gullible -- Get your CEO's permission and evaluate your org's security -- You'd be able to breach it.
I'd give you a hint: Order a veggie Pizza for your admin -- And, some PlayStation games for his kid. :-)
That's all for now.
Here's my address: 127.0.0.1
Can firewalls deter us eh? ;-)
Hacking contests are appetizers...
Team up with fellow Ethical Hackers -- and protect start-ups and individuals particularly women -- from rogue hackers -- voluntarily. You'd easily engage script kiddies -- in the beginning -- and whenever you'd thwart 'em: Have some Pizza; And, of course--Order it online; Garlic bread too, please! :-)
Your war chests aren't your counterstrike / counteroffensive tools -- Your real -- most potent -- arsenal is your mind.
Liaise with White Hat Hackers across India and across the world.
Innate reverence for InfoSec Gurus.
Don't provoke me to come out of retirement -- My formidability is still uncontestable -- Okay, okay -- just kidding! -- Please don't hack my Linux box! :-)
And, no DDoS attacks, either! :-)
I'm fortyish -- retiree -- not even newbies dread me -- now.
Spread out your digital tentacles -- devour those slimy worms.
I'm from the old school -- I staunchly advocate social engineering -- snake charmers and con artists have been swindling us since the Dark Ages -- Charles Sobhraj is an avant-garde social engineer -- Three-tier security cordon: Digital fortress? Sob stories -- Human interest story -- Believe me: Machines are immune but you'd always NLP humans -- They're gullible -- Get your CEO's permission and evaluate your org's security -- You'd be able to breach it.
I'd give you a hint: Order a veggie Pizza for your admin -- And, some PlayStation games for his kid. :-)
That's all for now.
Here's my address: 127.0.0.1
Bye.
Sunday, April 7, 2019
Reprint: Indian rope-trick--er--ahem--I mean Indian hack-trick! :-)
Wednesday, October 9, 2013
Indian rope-trick--er--ahem--I mean Indian hack-trick! :-)
Here's your chance to hack with legal immunity -- My objective is multipronged:
#1. You and I: Both of us would be learning the nitty-gritty of real-life Ethical Hacking.
#2. This sort of setup would keep you off of illegalities -- I mean like hacking into other networks and all that.
There's no fee -- but you'd always buy me a Pizza! :-) (I abhor the practice of vegetarianism!)
No early-bird offers--either.
My goal is to give you a free of charge platform / environment with plenty of elbow room to hone your hacking skills.
And, there're no hunting trophies.
Dust off your consoles -- vie for root.
Girls: Expect a red-carpet welcome -- Let the boys accuse me of unabashed favoritism -- Lenient policies! :-) If you happen to spot a gray-haired guy -- hunchbacked -- in his early forties -- wearing extremely sober suspenders -- scuffling to cross the street -- you'd safely approach him -- with absolutely no caution (put that pepper spray in your clutch bag, please!) -- that's me! :-)
Posted by Maqsood Qureshi at 8:24 AM
Indian rope-trick--er--ahem--I mean Indian hack-trick! :-)
Here's your chance to hack with legal immunity -- My objective is multipronged:
#1. You and I: Both of us would be learning the nitty-gritty of real-life Ethical Hacking.
#2. This sort of setup would keep you off of illegalities -- I mean like hacking into other networks and all that.
There's no fee -- but you'd always buy me a Pizza! :-) (I abhor the practice of vegetarianism!)
No early-bird offers--either.
My goal is to give you a free of charge platform / environment with plenty of elbow room to hone your hacking skills.
And, there're no hunting trophies.
Dust off your consoles -- vie for root.
Girls: Expect a red-carpet welcome -- Let the boys accuse me of unabashed favoritism -- Lenient policies! :-) If you happen to spot a gray-haired guy -- hunchbacked -- in his early forties -- wearing extremely sober suspenders -- scuffling to cross the street -- you'd safely approach him -- with absolutely no caution (put that pepper spray in your clutch bag, please!) -- that's me! :-)
Posted by Maqsood Qureshi at 8:24 AM
Russian hackers targeting conservative US thinktanks, Microsoft says
Firm claims Kremlin-linked group created fake websites for Senate and thinktanks
https://www.theguardian.com/us-news/2018/aug/21/russian-hackers-targeting-more-us-political-groups-microsoft-says
Several Pakistani Websites Reportedly Hacked By Indian Group Over Pulwama Attack
https://www.outlookindia.com/website/story/india-news-several-pakistani-websites-reportedly-hacked-by-indian-group-over-pulwama-attack/325644
5 Of The Most Notorious Hacker Groups Of The World Right Now
https://www.huffingtonpost.in/2016/12/12/these-are-some-of-the-most-notorious-hacker-groups-of-the-world_a_21625725/
Kevin Beaver
Kevin Beaver is an independent information security consultant with more than three decades of experience. Kevin specializes in performing vulnerability and penetration testing and security consulting work for Fortune 1000 corporations, product vendors, independent software developers, universities, and government organizations. He has appeared on CNN and been quoted in The Wall Street Journal.
Keith Barker
Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.
Connect with Keith:
Twitter
Facebook
YouTube
Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point
Areas of Expertise: Networking and Security
https://www.cbtnuggets.com/trainers/keith-barker
Connect with Keith:
YouTube
Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point
Areas of Expertise: Networking and Security
https://www.cbtnuggets.com/trainers/keith-barker
Saturday, April 6, 2019
My comments: Desmond Morris
I've whopping interest in anthropology -- But I don't subscribe to the idea / theory of evolution.
I respect him as an individual and his commendable lifelong work.
Desmond Morris and I
I think over the years -- I've become a sort of social scientist like Desmond Morris.
Definition of social science
1 : a branch of science that deals with the institutions and functioning of human society and with the interpersonal relationships of individuals as members of society
2 : a science (such as economics or political science) dealing with a particular phase or aspect of human society
2 : a science (such as economics or political science) dealing with a particular phase or aspect of human society
Definition of social psychology
: the study of the manner in which the personality, attitudes, motivations, and behavior of the individual influence and are influenced by social groups
My comments: Read this (below) So you stil think I'm moron, crazy and insane eh?
Militants from the Pakistani Taliban have attacked an army-run school in Peshawar, killing 141 people, 132 of them children, the military say
Pakistan Taliban: Peshawar school attack leaves 141 dead
Terror attack on mosques: At least 50 people were killed and 50 wounded, in a hate-filled terror attack targeting two mosques in the New Zealand city of Christchurch.
Ad infinitum …
Terror attack on mosques: At least 50 people were killed and 50 wounded, in a hate-filled terror attack targeting two mosques in the New Zealand city of Christchurch.
Ad infinitum …
My comments: Cannibals In Uganda
It hurts when people call me names.
Look around you.
Stop calling me names!
Look around you.
Cannibals In Uganda
Over the last year, there have been increasing reports of cannibalism in Uganda. Reports of cannibalism have been documented since at least 2011, when Dr. Heike Behrend, a professor at the University of Cologne, wrote a book on the practice, but the issue received a renewed focus after a particularly grisly incident in March.
Vocativ recently sent Brooklyn-based filmmaker Matthew Goldman to Uganda to check out the situation.
In Uganda, Goldman met Baboola, a self-professed cannibal, who told him about the situation in Uganda and why he eats human flesh.
Cannibalism has been on the rise in the country in recent years. A pregnant woman and her child were supposedly killed and eaten in Rakai, a district in central Uganda, in March. 14 people have been arrested in connection with the incident.
The reports of cannibalism have not gone over well. Ugandans have been keeping to a strict curfew at night to avoid supposed cannibals and, in recent months, people have been destroying the homes and businesses of those suspected of cannibalism.
Joseph Kony, the leader of the much-maligned Lord's Resistance Army, has been accused of cannibalism. There have been reports that he makes soldiers drink the blood of enemies.
Baboola told Goldman that he was introduced to cannibalism by a relative. The relative told Baboola that the meat was "good" and that he should eat it.
Baboola says that he only eats people that are already dead, as opposed to to killing people. He says that the best tasting meat are people that have just died.
Baboola has mostly given up the trade, though he "cheats" on special occasions.
Vocativ recently sent Brooklyn-based filmmaker Matthew Goldman to Uganda to check out the situation.
In Uganda, Goldman met Baboola, a self-professed cannibal, who told him about the situation in Uganda and why he eats human flesh.
Cannibalism has been on the rise in the country in recent years. A pregnant woman and her child were supposedly killed and eaten in Rakai, a district in central Uganda, in March. 14 people have been arrested in connection with the incident.
The reports of cannibalism have not gone over well. Ugandans have been keeping to a strict curfew at night to avoid supposed cannibals and, in recent months, people have been destroying the homes and businesses of those suspected of cannibalism.
Joseph Kony, the leader of the much-maligned Lord's Resistance Army, has been accused of cannibalism. There have been reports that he makes soldiers drink the blood of enemies.
Baboola told Goldman that he was introduced to cannibalism by a relative. The relative told Baboola that the meat was "good" and that he should eat it.
Baboola says that he only eats people that are already dead, as opposed to to killing people. He says that the best tasting meat are people that have just died.
Baboola has mostly given up the trade, though he "cheats" on special occasions.
https://www.businessinsider.in/Heres-What-Its-Like-To-Be-A-Cannibal-In-Uganda/articleshow/43357314.cms
Friday, April 5, 2019
Here's What It's Like To Be A Cannibal In Uganda
https://www.businessinsider.in/Heres-What-Its-Like-To-Be-A-Cannibal-In-Uganda/articleshow/43357314.cms
Deep Raag and Pyrokinesis -- Our Gurus and ancestors Versus atheistical science / scientists
Raga Deep: Our Gurus and ancestors have been telling us since ages that when this Raga is sung -- oil lamps will light up. For most of us it seems impossible. Today I stumbled upon this:
Pyrokinesis is the purported psychic ability allowing a person to create and control fire with the mind.
This post is not to appease any group of people -- I think skeptics should look into this phenomenon.
We let science override our religious beliefs. We're more inclined to accept the scientific conclusions -- tsk, tsk!
Pyrokinesis is the purported psychic ability allowing a person to create and control fire with the mind.
This post is not to appease any group of people -- I think skeptics should look into this phenomenon.
We let science override our religious beliefs. We're more inclined to accept the scientific conclusions -- tsk, tsk!
Long-distance relationship (LDR) or long-distance romantic relationship (LDRR)
A long-distance relationship (LDR) (or long-distance romantic relationship (LDRR) is an intimate relationship between partners who are geographically separated from one another. Partners in LDRs face geographic separation and lack of face-to-face contact. LDRs are particularly prevalent among college students- constituting 25% to 50% of all relationships.[1] Even though scholars have reported a significant number of LDRs in undergraduate populations, long-distance relationships continue to be an understudied phenomenon.
Source: https://en.wikipedia.org/wiki/Long-distance_relationship
Some du’aa’s and remedies for one who suffers from pain in his body
It was narrated from Abu Sa’eed al-Khudri (may Allaah be pleased with him) that some of the companions of the Prophet (peace and blessings of Allaah be upon him) came to one of the Arab tribes. They asked them for hospitality but they refused to welcome them. Whilst they were like that, the chief of that tribe was stung. They said: ‘Do you have any remedy or someone who can recite ruqyah?’ They said: ‘You did not offer us hospitality, so we will not do anything until you give us something in return.’ Then they agreed upon a flock of sheep. Then he started to recite the Essence of the Qur’aan – i.e., Soorat al-Faatihah – and he collected his saliva and spat at him (at the site of the injury), and he recovered. The sheep were brought and they (the companions) said: We will not take them until we ask the Prophet (peace and blessings of Allaah be upon him). So they asked him and he smiled and said: “How did you know that it is a ruqyah? Take them and give me a share of them.”
Narrated by al-Bukhaari, 5404; Muslim, 2201.
Narrated by al-Bukhaari, 5404; Muslim, 2201.
islamqa.com -- Question # 20176
https://islamqa.info/en/answers/20176/some-duaas-and-remedies-for-one-who-suffers-from-pain-in-his-body
islamqa.info -- Question # 199949
In the hadeeth in as-Saheehayn from ‘Aa’ishah (may Allah be pleased with her), she says: … (This went on) until the truth came to him when he was in the cave of Hiraa’. The angel came and said, “Read (or recite)!” He (the Messenger of Allah (peace and blessings of Allah be upon him)) said: “I said: ‘I am not a reader.’ Then he took hold of me and squeezed me until I could not bear it any more, then he released me and said, ‘Read!’ I said, ‘I am not a reader.’ He took hold of me and squeezed me a second time until I could not bear it any more, then he released me and said, ‘Read!’ I said, ‘I am not a reader.’ He took hold of me and squeezed me a third time until I could not bear it any more, then he released me and said: ‘Read! In the Name of your Lord Who has created (all that exists) … He has taught man that which he knew not.’ [al-‘Alaq 96:1-5].”
Wednesday, April 3, 2019
Cyberwar
Cyberwar
Attacks in cyberspace
Cybercrime, cyberespionage, or cyberwar?
Cyberattack and cyberdefense
Source: https://www.britannica.com/topic/cyberwar
Attacks in cyberspace
Cybercrime, cyberespionage, or cyberwar?
Cyberattack and cyberdefense
Source: https://www.britannica.com/topic/cyberwar
Tuesday, April 2, 2019
Monday, April 1, 2019
Skills that you require to pursue a career in cybersecurity
https://blog.eccouncil.org/skills-that-you-require-to-pursue-a-career-in-cybersecurity/
10 Tips Every Cybersecurity Aspirant Should Know
https://blog.eccouncil.org/10-tips-every-cybersecurity-aspirant-should-know/
6 Reasons Why Your Organization Needs an Ethical Hacker
https://blog.eccouncil.org/6-reasons-why-your-organization-needs-an-ethical-hacker/
Subscribe to:
Posts (Atom)