Tuesday, April 30, 2019

My question is:

Psychic investigators or Psychic detectives: Do they work with Qareen (Jinn companion)? Mediums also use Qareen?

Sura: Al-A'raf (The Heights) Sura # 7 Verse # 143

And when Moses arrived at Our appointed time and his Lord spoke to him, he said, "My Lord, show me [Yourself] that I may look at You." [ Allah ] said, "You will not see Me, but look at the mountain; if it should remain in place, then you will see Me." But when his Lord appeared to the mountain, He rendered it level, and Moses fell unconscious. And when he awoke, he said, "Exalted are You! I have repented to You, and I am the first of the believers."

Sura: Al-A'raf (The Heights)
Sura # 7
Verse # 143

By the star when it descends,

Sura: An-Najm (The star)
Sura # 53 Verse # 1
By the star when it descends,

Monday, April 29, 2019

Trojan horse (computing)

Uses of a Trojan horse

When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:

Give the attacker backdoor control over the computing device.
Record keyboard strokes to steal the user's account data and browsing history.
Download and install a virus or worm to exploit a vulnerability in another program.
Install ransomware to encrypt the user's data and extort money for the decryption key.
Activate the computing device's camera and recording capabilities.
Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.
Legally capture information relevant to a criminal investigation for law enforcement.


Sura Al-Mulk, Sura # 67 Verse # 19

Whenever I see a bird flying in the sky -- I just utter Al-Mulk because I don't know these verses by heart.

Do they not see the birds above them with wings outspread and [sometimes] folded in? None holds them [aloft] except the Most Merciful. Indeed He is, of all things, Seeing.


not a leaf falls, but He knows it.

Whenever I pass by and a leaf falls I utter this: not a leaf falls, but He knows it.

“And with Him are the keys of the Ghayb (all that is hidden), none knows them but He. And He knows whatever there is in the land and in the sea; not a leaf falls, but He knows it. There is not a grain in the darkness of the earth nor anything fresh or dry, but is written in a Clear Record”

[al-An’aam 6:59]

Is man’s fate pre-destined or does he have freedom of will?


Source: Islam Q&A 
Question # 20806

Saturday, April 27, 2019


1 : a belief in human equality especially with respect to social, political, and economic affairs
2 : a social philosophy advocating the removal of inequalities among people


believing that all people are equally important and should have the same rights and opportunities in life:

an egalitarian society

The party's principles are basically egalitarian.


blissfully unaware of imminent dangers around 'em --

necessary evil

something unpleasant that must be accepted in order to achieve a particular result

vicious circle / cycle

Definition of 'Poverty Trap'

Definition: Poverty trap is a spiraling mechanism which forces people to remain poor. It is so binding in itself that it doesn't allow the poor people to escape it. Poverty trap generally happens in developing and under-developing countries, and is caused by a lack of capital and credit to people.

Description: Poverty trap can be broken by planned investments in the economy and providing people the means to earn and be employed. A series of poverty alleviation programs can be enforced to raise individuals out of poverty by providing monetary aid for a period of time.

But if the plan fails, people will become dependent on such programs forever and may even go deeper down in the poverty spiral. However, poorer countries find this to be difficult, leading to the over-exploitation of natural resources and land.

Source: https://economictimes.indiatimes.com/definition/poverty-trap

advice columnist

: a person who writes an advice column

advice column

: an article in a newspaper or magazine that offers advice to people who write to ask for help with a problem

Friday, April 26, 2019

Classless society

Monday, September 3, 2012

Leanings . . . .

I think I've communistic leanings from the beginning.
Posted by Maqsood Qureshi at 9:47 PM


Thursday, December 13, 2012

Classless society

I don't believe in class distinctions. I believe in a classless society. I believe that--fundamentally--all men and women are equal.
Posted by Maqsood Qureshi at 12:45 AM


Tuesday, November 23, 2010

Classless society . . . .

I believe in a classless society. Does that make me a Communist? I think I've a Communistic streak in me.
Posted by Maqsood Qureshi at 2:55 PM


1 : a distinctive doctrine, cause, or theory
2 : an oppressive and especially discriminatory attitude or belief
I don't know much about isms -- Communism or this and that -- but when I see laborers -- I get guilty pangs -- in the scorching sun -- infants and toddlers -- playing in dirt -- all of us see this almost everyday -- we pass by these construction sites -- immune to their sufferings --

Thursday, April 25, 2019

Welcome, Silence by Carol North

Reprint: Life comes with F1 key...


Wednesday, September 11, 2013

Life comes with F1 key...

Life comes with F1 key. Life comes with an Escape key. It's your intuition. Believe me: You've shamanic abilities. All of us... You just have to discover how to tap into it. You've to hone it. This is not an exact science. And, I'm no quack. This is based purely on my personal experiences. But I'd tell you one thing with absolute certainty: It's more attentive if you've a clear conscience. It shies away from you if you're conscience-stricken. It starts with Simplex then progresses to full-fledged Duplex communication. :-)

Wednesday, April 24, 2019

Kids Definition of amen

1 —used at the end of a prayer

2 —used to express agreement 
When I said we could use a bit of luck, he replied, “Amen!”

Does intuitive have anything to do with a sixth sense?

Nowadays, we often see intuitive used in contexts pertaining to technology that is easy to understand. A smartphone with an “intuitive interface” is one that doesn't need much explaining; you can usually figure out how it works as soon as you fire it up.

The related noun intuition, meanwhile, describes a feeling of knowing or understanding something without evident rational thought and inference. A parent's intuition might tell him or her that a child is in danger, even if there is no logical reason to believe so.

So does intuitive have anything to do with what is often called the sixth sense? Well, the sixth sense is defined as "a keen intuitive power." It is synonymous with ESP or extrasensory perception. As its name implies, ESP describes a purported ability to know something that cannot be known by normal use of the senses.

The Swiss psychologist Jean Piaget (1896-1980) used the term intuitive substage to refer to the stage of cognitive development when children have acquired a vast amount of knowledge but have not considered how they acquired it, so they accept it as true.

An interface is intuitive because it makes sense according to what we expect from how older interfaces are designed. A parent's intuitive sense of danger may still be prompted by subtle hints that things just aren't as they should be, even if the parent cannot identify exactly how. So while sixth sense refers to the ability to acquire knowledge from beyond the five senses, intuitive tends to apply more to knowledge absorbed through experience, even when not immediately recognized as such.


: a strong intuitive feeling concerning especially a future event or result
had a hunch I would find you here

Tuesday, April 23, 2019

lab/laboratory rat

: a rat that is used by scientists for experiments

memory lane

: an imaginary path through the nostalgically remembered past —usually used in such phrases as a walk down memory lane

Monday, April 22, 2019

Who's this Mike, anyways eh? LOL

Mike Chapple, CISSP, Ph.D.
Information Security Leader, Author, Instructor and Speaker

Mike Chapple is Senior Director for IT Service Delivery at the University of Notre Dame. In this role, he oversees the information security, IT architecture, project management, strategic planning and IT compliance functions for the Office of Information Technologies. Mike also serves as a concurrent assistant professor in the University’s Computer Applications Department where he teaches an undergraduate course on Information Security.

Dr. Chapple previously served as Senior Advisor to the Executive Vice President at Notre Dame for two years. Prior to that, he was program manager of the University’s Information Security Program and a consultant to the Notre Dame Alumni Association on alumni engagement initiatives.

Before returning to Notre Dame, Mike served as Executive Vice President and Chief Information Officer of the Brand Institute, a Miami-based consulting firm. Dr. Chapple also spent four years in the information security research group at the National Security Agency and serving as an active duty intelligence officer in the U.S. Air Force. He is a technical editor for Information Security Magazine and has written over a dozen books, including the CISSP Prep Guide (now in its sixth edition) and the Security+ Training Kit.

Mike earned both his bachelor’s and doctoral degrees from Notre Dame in computer science & engineering. He also holds a MS in computer science from the University of Idaho and an MBA from Auburn University.

Sunday, April 21, 2019


Did You Know?

Greek drama was originally entirely performed by choruses. According to tradition, the Greek dramatist Thespis, of the 6th century B.C., was the inventor of tragedy and the first to write roles for the individual actor as distinct from the chorus, and the actor's exchanges with the chorus were the first dramatic dialogue. Since Thespis himself performed the individual parts in his own plays, he was also the first true actor. Ever since choruses disappeared from drama, thespians have filled all the roles in plays. Thespian is also an adjective; thus, we can speak of "thespian ambitions" and "thespian traditions", for example.

those that survive are stalwart, rugged men — L. D. Stamp

Saturday, April 20, 2019

Gold rush

Gold rush, rapid influx of fortune seekers to the site of newly discovered gold deposits. Major gold rushes occurred in the United States, Australia, Canada, and South Africa in the 19th century.


Gold rush

: a situation in which many people go quickly to a place where gold has been discovered because they hope to find more gold and become rich

cheat sheet

: a written or graphic aid (such as a sheet of notes) that can be referred to for help in understanding or remembering something complex

Friday, April 19, 2019

Roy Sullivan: Cause of death

Suicide by self-inflicted gunshot wound to the head


Roy Sullivan: man hit seven times by lightning who survived

Roy Cleveland Sullivan (February 7, 1912 – September 28, 1983) was a United States park ranger in Shenandoah National Park in Virginia. Between 1942 and 1977, Sullivan was hit by lightning on seven different occasions and survived all of them. For this reason, he gained a nickname "Human Lightning Conductor" and "Human Lightning Rod". Sullivan is recognized by Guinness World Records as the person struck by lightning more recorded times than any other human being.


The odds of being struck by lightning for a person over the period of 80 years have been roughly estimated as 1:10000.[13] If the lightning strikes were independent events, the probability of being hit seven times would be (1:10000)7 = 1:1028. These numbers do not quite apply to Sullivan, however, who by the nature of his work was more exposed to storms than the average person. Virginia, where he lived, averages 35 to 45 thunderstorm days per year, most of which fall in June, July, and August. Between 1959 and 2000 lightning killed 58 people and injured at least 238 people in Virginia. In the United States, 3239 people were killed and 13,057 injured by lightning in the same period. Most of those were males between 20 and 40 years old caught outdoors.

Thursday, April 18, 2019

word-slinger -- gunslinger -- wordsmithery

11 Authors on Their One-Word Book Titles

The art of telling an entire story with a single word

What's in a Name?

At Merriam-Webster we know that words have the power to shape worlds both real and imagined. And we know that writing is hard work. To distill a story, its characters, and all the associated emotions into a single word is no small feat.

That’s why we’ve partnered with eleven of our favorite authors who have shared the story and significance behind their one-word-title books.


Motorola Model 50XC (1940) radio

Who's Kevin Beaver anyways? LOL

Kevin Beaver is an independent information security consultant, expert witness, professional speaker, and writer with Atlanta-based Principle Logic, LLC. He has over three decades of experience in IT and has spent a quarter of a century working in security. Kevin specializes in performing independent information security assessments for corporations, security product vendors, software developers/cloud service providers, government agencies, nonprofit organizations, among others. Before starting his information security consulting practice in 2001, Kevin served in various information technology (IT) and security roles for several healthcare, e-commerce, financial, and educational institutions.
Kevin has appeared on CNN television as an information security expert and has been quoted in The Wall Street Journal, Entrepreneur, Fortune Small Business, Women's Health, and on Inc. magazine’s technology site, IncTechnology.com. Kevin’s work has also been referenced by the PCI Council in their Data Security Standard Wireless Guidelines. Kevin has been a top-rated speaker, giving hundreds of presentations and panel discussions for IT and security seminars, conferences, and webcasts over the past decade and a half.

Kevin has authored or co-authored 12 information security books, including Hacking Wireless Networks For Dummies, Implementation Strategies for Fulfilling and Maintaining IT Compliance (Realtimepublishers.com), and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). Kevin has written more than three dozen whitepapers and over 1,000 articles and guest blog posts for sites such as TechTarget’s SearchSecurity.com, SearchEnterpriseDesktop.com, and SearchSoftwareQuality.com, Ziff Davis’ Toolbox.com, as well as IBM’s SecurityIntelligence.com. Kevin is the creator and producer of the Security On Wheels audiobooks, which provide security learning for IT professionals on the go (securityonwheels.com), and the Security On Wheels blog (securityonwheels.com/blog). He also covers information security and related matters on Twitter (@kevinbeaver) and YouTube (PrincipleLogic). Kevin earned his bachelor’s degree in Computer Engineering Technology from Southern College of Technology and his master’s degree in Management of Technology from Georgia Tech. He has obtained his CISSP certification in 2001 and also holds MCSE, Master CNE, and IT Project+ certifications.

Kevin can be reached through his website, https://www.principlelogic.com, and you can connect to him via LinkedIn at https://www.linkedin.com/in/kevinbeaver.

Monday, April 15, 2019

Lucian: Greek writer (I'd like to read his bio)

Lucian, Greek Lucianos, Latin Lucianus, (born ad 120, Samosata, Commagene, Syria [now Samsat, Tur.]—died after 180, Athens [Greece]), ancient Greek rhetorician, pamphleteer, and satirist.


Movie script: Chasing Rainbows

Here we go now:

Character 1: A boy
Character 2. A girl

He wants to be a pilot but he's too poor to afford it.
Girl helps him get his wings -- PPL Private Pilot License

There she meets his Flying Instructor.
Then everything takes a U-turn
Twist: To be continued …

I don't think there's any aviation movie in India.
How about the girl earning her license with him?

Scriptwriter eh? That's me.

Like Top Gun movie -- this movie might inspire young adults to take up flying as a career or just a hobby. This is a very responsible job -- Discipline and all that. Would turn 'em into men and women of sound character. 

Friday, April 12, 2019

Reprint: Graphic novel (I wrote this during my bout / relapse of schizophrenia)

Saturday, March 18, 2017

My Soul Mate: An Unfinished Quest: My First Comic Book Series based on the following characters.

Character: The Hunchbacked Whirling Dervish is a boy next door - type of chap. He's in perpetual quest for his soul mate. He almost always gets dumped. He goes through a seesaw of sulking and euphoria. But he's die-hard resilience in him. He's a wee bit of faith in God. He role-plays: Sometimes: He's a Counter-Terrorist Professional -- sometimes a Richard-Bach-like Barnstormer. God loves him. He's God close friend but God never tells me that. The Hunchbacked Whirling Dervish prays to God that God I want to be your Close Friend.

Mentor: Is God.

Miss Spock-y Ears: Is The Hunchbacked Whirling Dervish's latest crush. Just the same as always: The Whirling Dervish firmly believes that he has finally found his soul mate. And, he's in madly love with her but doesn't tell her that. She knows everything about him but as he's quite na├»ve so she doesn't want to hurt him.

Ex-Soul Mates: The Hunchbacked Whirling Dervish's former Soul Mates who keep bumping into him from time to time.

Posted by Maqsood Qureshi at 2:40 PM

Thursday, April 11, 2019


obtained by doing something, not by reading about it or by watching it done:
hands-on experience/training/education

Wednesday, April 10, 2019

A futurist father and his inquisitive son ...

Father builds a ship.
Son: What's this, dad?
Father says: It's a ship.
Son: What's it? How does it run?
Father: It can't run. There should be an ocean for it to run.
Why did you build it when it can't run?
For you?
For me?
To be continued …

future shock

Definition of future shock

: the physical and psychological distress suffered by one who is unable to cope with the rapidity of social and technological changes

Internet. What's next? Brace yourself for future shock!

Internet --> YouTube --> Local YouTube / TV channels
My point is Internet is the Parent Technology.
And, everything that runs on it is Child Technology.
Here's an analogy for you guys:
Building a ship where there's no ocean is insightful; Futuristic.
To be continued …

ticktock ticktock ticktock ...


Of the 187 countries that SimilarWeb surveyed, WhatsApp emerged as a clear leader on 109 nations, or 55.6% of the world. Other than India, other countries where the messaging app has a strong user base are include Brazil, Mexico, UK, Russia, and several countries in South America.

WhatsApp now 'rules' over half of the world

According to a report, WhatsApp is installed on 94.8% of all Android devices and is used for an average of 37 minutes daily.

WhatsApp is widely known to be the world's most popular messaging app. Here's more proof to it. According to recent research from digital market intelligence company SimilarWeb, WhatsApp is the top mobile messaging app in 109 countries across the world. In India, Facebook-owned WhatsApp is installed on 94.8% of all Android devices and is used for an average of 37 minutes daily, according to the report. 



Internet users in India to reach 627 million in 2019: Report

Internet usage in the country has exceeded half a billion people for first time, pegged at 566 million, driven by rural internet growth and usage.



Tuesday, April 9, 2019

The Official CompTIA PenTest+ Study Guide

After reading this study guide you will understand how to:

Plan and scope penetration tests
Conduct passive reconnaissance
Perform non-technical tests to gather information
Conduct active reconnaissance
Analyze vulnerabilities
Penetrate networks
Exploit host-based vulnerabilities
Test applications
Complete post-exploit tasks
Analyze and report penetration test results


    EC-Council Certified Ethical Hacker

    What is New in CEH Version 10 Course

    Module 01: Introduction to Ethical Hacking
    Module 02: Footprinting and Reconnaissance
    Module 03: Scanning Networks
    Module 04: Enumeration
    Module 05: Vulnerability Analysis
    Module 06: System Hacking
    Module 07: Malware Threats
    Module 08: Sniffing
    Module 09: Social Engineering
    Module 10: Denial-of-Service
    Module 11: Session Hijacking
    Module 12: Evading IDS, Firewalls, and Honeypots
    Module 13: Hacking Web Servers
    Module 14: Hacking Web Applications
    Module 15: SQL Injection
    Module 16: Hacking Wireless Networks
    Module 17: Hacking Mobile Platforms
    Module 18: IoT Hacking
    Module 19: Cloud Computing
    Module 20: Cryptography


    Monday, April 8, 2019

    Vulnerability scanner


    Reprint: Where're my Ouija board? :-) (Wrote during my bout / relapse of schizophrenia)

    Tuesday, October 15, 2013

    Where're my Ouija board? :-)

    1. I've -- miraculously -- revived my robot: Mister WALL-E -- finally! He's comatose for like zillions of months! :-) I'd program this Frankenstein's creature to perform bizarrely geeky feats! Could I improvise it to play darts -- for example?

    2. My ethical hacking / penetration testing network is taking shape. Cisco Small Business RV Series Routers? What do you think eh? :-) For instance: Cisco RV215W Wireless-N VPN Firewall? Should I go for it?

    3. Windows Server 2012 on an oldie laptop is almost ready.

    4. Dedicated Internet connexion plus static IP Address: Stalled. Reason: Bureaucratic red tape!

    Nevertheless, the lab should be up and running -- within the next few weeks. I'm soloing -- am dirt-poor plus -- extremely erratic memory! :-) Rational explanations eh? :-)

    Where're my Ouija board? I'd summon my long-lost poltergeist friend!

    That's all for now.


    Posted by Maqsood Qureshi at 3:25 AM





    Reprint: Let me turn rookies into Alpha Geeks... (Probably keyed in during my bout of Schizophrenia --not sure)

    Wednesday, October 9, 2013

    Let me turn rookies into Alpha Geeks...

    My Ethical Hacking / Penetration Testing Lab


    1. Laptop: vgc (very good condition)
    2. Laptop: Oldie
    3. Desktop: Oldie

    I shy away from hardware so not giving you specs -- By the way, I'd mug up CompTIA A+ guide(s).

    I'd sign up for a dedicated high-speed Internet connexion.

    In the not too distant future: I'd also sign up for a dedicated IP address.

    I'd also get a Hardware Firewall (dirt cheap) but sturdy -- should deflect attacks -- though I just adore those groovy Check Point's UTM appliances.


    1. Windows Server 2012 (Evaluation copy)
    2. Honeypots
    3. BBS

    What's your role?

    You've to attack my systems viciously (no-holds-barred). This a real live Ethical Hacking exercise. Relentless -- knock-down-drag-out -- distributed attacks.

    Posted by Maqsood Qureshi at 2:32 AM

    Reprint: I wrote this for Ms. Alizee (I wrote this as well during my bout of schizophrenia!)

    Wednesday, December 20, 2017
    This is where I love to be
    La isla bonita -- A girl sings this lullaby

    Every moment is ecstasy
    Where scorching sunray like embers of my memory

    Her voice is divine and unheard symphony
    That wreathes my soul like caged birds cacophony

    Her eyes -- untold tales of prophecy
    Sailors' quest for the island of Destiny

    Emeralds and rubies -- premonition of Shangri–la -- She's my fantasy
    She makes me believe in mirages -- that's some real sorcery

    This is where I love to be
    La isla bonita -- A girl sings this lullaby

    She's the one -- White pearl and dark red ruby
    My talisman -- I lost in the echoes of her lullaby.

    Reprint: I wrote this during my bout of schizophrenia!

    Friday, October 4, 2013

    Can firewalls deter us eh? ;-)

    Hacking contests are appetizers...

    Team up with fellow Ethical Hackers -- and protect start-ups and individuals particularly women -- from rogue hackers -- voluntarily. You'd easily engage script kiddies -- in the beginning -- and whenever you'd thwart 'em: Have some Pizza; And, of course--Order it online; Garlic bread too, please! :-)

    Your war chests aren't your counterstrike / counteroffensive tools -- Your real -- most potent -- arsenal is your mind.

    Liaise with White Hat Hackers across India and across the world.

    Innate reverence for InfoSec Gurus.

    Don't provoke me to come out of retirement -- My formidability is still uncontestable -- Okay, okay -- just kidding! -- Please don't hack my Linux box! :-)

    And, no DDoS attacks, either! :-)

    I'm fortyish -- retiree -- not even newbies dread me -- now.

    Spread out your digital tentacles -- devour those slimy worms.

    I'm from the old school -- I staunchly advocate social engineering -- snake charmers and con artists have been swindling us since the Dark Ages -- Charles Sobhraj is an avant-garde social engineer -- Three-tier security cordon: Digital fortress? Sob stories -- Human interest story -- Believe me: Machines are immune but you'd always NLP humans -- They're gullible -- Get your CEO's permission and evaluate your org's security -- You'd be able to breach it.

    I'd give you a hint: Order a veggie Pizza for your admin -- And, some PlayStation games for his kid. :-)

    That's all for now.

    Here's my address:


    Sunday, April 7, 2019

    Reprint: Indian rope-trick--er--ahem--I mean Indian hack-trick! :-)

    Wednesday, October 9, 2013

    Indian rope-trick--er--ahem--I mean Indian hack-trick! :-)

    Here's your chance to hack with legal immunity -- My objective is multipronged:

    #1. You and I: Both of us would be learning the nitty-gritty of real-life Ethical Hacking.

    #2. This sort of setup would keep you off of illegalities -- I mean like hacking into other networks and all that.

    There's no fee -- but you'd always buy me a Pizza! :-) (I abhor the practice of vegetarianism!)

    No early-bird offers--either.

    My goal is to give you a free of charge platform / environment with plenty of elbow room to hone your hacking skills.

    And, there're no hunting trophies.

    Dust off your consoles -- vie for root.

    Girls: Expect a red-carpet welcome -- Let the boys accuse me of unabashed favoritism -- Lenient policies! :-) If you happen to spot a gray-haired guy -- hunchbacked -- in his early forties -- wearing extremely sober suspenders -- scuffling to cross the street -- you'd safely approach him -- with absolutely no caution (put that pepper spray in your clutch bag, please!) -- that's me! :-)

    Posted by Maqsood Qureshi at 8:24 AM

    Russian hackers targeting conservative US thinktanks, Microsoft says

    Firm claims Kremlin-linked group created fake websites for Senate and thinktanks


    Several Pakistani Websites Reportedly Hacked By Indian Group Over Pulwama Attack


    5 Of The Most Notorious Hacker Groups Of The World Right Now


    Kevin Beaver

    Kevin Beaver is an independent information security consultant with more than three decades of experience. Kevin specializes in performing vulnerability and penetration testing and security consulting work for Fortune 1000 corporations, product vendors, independent software developers, universities, and government organizations. He has appeared on CNN and been quoted in The Wall Street Journal.

    Keith Barker

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Connect with Keith:

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of Expertise: Networking and Security


    Saturday, April 6, 2019

    My comments: Desmond Morris

    I've whopping interest in anthropology -- But I don't subscribe to the idea / theory of evolution. 
    I respect him as an individual and his commendable lifelong work.

    My comments: With all due respect, I don't buy that hooey.

    The Naked Ape: A Zoologist's Study of the Human Animal by Desmond Morris

    Desmond Morris and I

    I think over the years -- I've become a sort of social scientist like Desmond Morris.

    Definition of social science

    1 : a branch of science that deals with the institutions and functioning of human society and with the interpersonal relationships of individuals as members of society

    2 : a science (such as economics or political science) dealing with a particular phase or aspect of human society

    Definition of social psychology

    : the study of the manner in which the personality, attitudes, motivations, and behavior of the individual influence and are influenced by social groups

    This book is on my wish list. By Heike Behrend

    This book is on my wish list. By Heike Behrend

    Professor: Heike Behrend -- Profile


    My comments: Read this (below) So you stil think I'm moron, crazy and insane eh?

    Militants from the Pakistani Taliban have attacked an army-run school in Peshawar, killing 141 people, 132 of them children, the military say
    Pakistan Taliban: Peshawar school attack leaves 141 dead

    Terror attack on mosques: At least 50 people were killed and 50 wounded, in a hate-filled terror attack targeting two mosques in the New Zealand city of Christchurch.

    Ad infinitum …

    My comments: Cannibals In Uganda

    It hurts when people call me names.

    Stop calling me names!

    Look around you.

    Cannibals In Uganda

    Over the last year, there have been increasing reports of cannibalism in Uganda. Reports of cannibalism have been documented since at least 2011, when Dr. Heike Behrend, a professor at the University of Cologne, wrote a book on the practice, but the issue received a renewed focus after a particularly grisly incident in March.

    Vocativ recently sent Brooklyn-based filmmaker Matthew Goldman to Uganda to check out the situation.

    In Uganda, Goldman met Baboola, a self-professed cannibal, who told him about the situation in Uganda and why he eats human flesh.

    Cannibalism has been on the rise in the country in recent years. A pregnant woman and her child were supposedly killed and eaten in Rakai, a district in central Uganda, in March. 14 people have been arrested in connection with the incident.

    The reports of cannibalism have not gone over well. Ugandans have been keeping to a strict curfew at night to avoid supposed cannibals and, in recent months, people have been destroying the homes and businesses of those suspected of cannibalism.

    Joseph Kony, the leader of the much-maligned Lord's Resistance Army, has been accused of cannibalism. There have been reports that he makes soldiers drink the blood of enemies.

    Baboola told Goldman that he was introduced to cannibalism by a relative. The relative told Baboola that the meat was "good" and that he should eat it.

    Baboola says that he only eats people that are already dead, as opposed to to killing people. He says that the best tasting meat are people that have just died.

    Baboola has mostly given up the trade, though he "cheats" on special occasions.


    Friday, April 5, 2019

    Here's What It's Like To Be A Cannibal In Uganda


    Deep Raag and Pyrokinesis -- Our Gurus and ancestors Versus atheistical science / scientists

    Raga Deep: Our Gurus and ancestors have been telling  us since ages that when this Raga is sung -- oil lamps will light up. For most of us it seems impossible. Today I stumbled upon this:

    Pyrokinesis is the purported psychic ability allowing a person to create and control fire with the mind.

    This post is not to appease any group of people -- I think skeptics should look into this phenomenon.

    We let science override our religious beliefs. We're more inclined to accept the scientific conclusions -- tsk, tsk!

    Long-distance relationship (LDR) or long-distance romantic relationship (LDRR)

    A long-distance relationship (LDR) (or long-distance romantic relationship (LDRR) is an intimate relationship between partners who are geographically separated from one another. Partners in LDRs face geographic separation and lack of face-to-face contact. LDRs are particularly prevalent among college students- constituting 25% to 50% of all relationships.[1] Even though scholars have reported a significant number of LDRs in undergraduate populations, long-distance relationships continue to be an understudied phenomenon.

    Source: https://en.wikipedia.org/wiki/Long-distance_relationship

    Some du’aa’s and remedies for one who suffers from pain in his body

    It was narrated from Abu Sa’eed al-Khudri (may Allaah be pleased with him) that some of the companions of the Prophet (peace and blessings of Allaah be upon him) came to one of the Arab tribes. They asked them for hospitality but they refused to welcome them. Whilst they were like that, the chief of that tribe was stung. They said: ‘Do you have any remedy or someone who can recite ruqyah?’ They said: ‘You did not offer us hospitality, so we will not do anything until you give us something in return.’ Then they agreed upon a flock of sheep. Then he started to recite the Essence of the Qur’aan – i.e., Soorat al-Faatihah – and he collected his saliva and spat at him (at the site of the injury), and he recovered. The sheep were brought and they (the companions) said: We will not take them until we ask the Prophet (peace and blessings of Allaah be upon him). So they asked him and he smiled and said: “How did you know that it is a ruqyah? Take them and give me a share of them.”
    Narrated by al-Bukhaari, 5404; Muslim, 2201.

    islamqa.com -- Question # 20176


    islamqa.info -- Question # 199949

    In the hadeeth in as-Saheehayn from ‘Aa’ishah (may Allah be pleased with her), she says: … (This went on) until the truth came to him when he was in the cave of Hiraa’. The angel came and said, “Read (or recite)!” He (the Messenger of Allah (peace and blessings of Allah be upon him)) said: “I said: ‘I am not a reader.’ Then he took hold of me and squeezed me until I could not bear it any more, then he released me and said, ‘Read!’ I said, ‘I am not a reader.’ He took hold of me and squeezed me a second time until I could not bear it any more, then he released me and said, ‘Read!’ I said, ‘I am not a reader.’ He took hold of me and squeezed me a third time until I could not bear it any more, then he released me and said: ‘Read! In the Name of your Lord Who has created (all that exists) … He has taught man that which he knew not.’ [al-‘Alaq 96:1-5].”

    Source: https://islamqa.info/en/answers/199949/read-in-the-name-of-your-lord-who-has-created-all-that-exists-is-a-command-to-recite-from-memory-not-from-a-written-page

    Wednesday, April 3, 2019


    Attacks in cyberspace
    Cybercrime, cyberespionage, or cyberwar?
    Cyberattack and cyberdefense

    Source: https://www.britannica.com/topic/cyberwar

    Monday, April 1, 2019

    Skills that you require to pursue a career in cybersecurity


    10 Tips Every Cybersecurity Aspirant Should Know


    6 Reasons Why Your Organization Needs an Ethical Hacker