Tuesday, 14 October 2014

Download Sahi Bukhari Sharif in Urdu and Arabic This is available in 6 Volumes Download here and open in Adobe Reader, Adobe Acrobet and other PDF Readers.   Click Here to DOWNLOAD .pdf format A02a-Sahih_Al-Bukhari_3D
  1. Volume 1
  2. Volume 2
  3. Volume 3
  4. Volume 4
  5. Volume 5
  6. Volume 6

Download The Holy Quran with Urdu Translation

 Click Here to Download in PDF Format


Cyber Crime or computer crime includes any criminal act which deals with computers or networks. All such crimes are operated in order to abuse the electronic media or to influence the functioning of computer or networks.


Performing crime with computer systems is called computer hacking or simply Hacking. And the person who has accepted hacking as his lifestyle is called a Hacker. Computer Hacking is the most popular form of today hacking. It exists in computer security but also in many other forms such as phone hacking, call intercepting, social media’s password hacking and data divergence etc. Hacking is becoming very popular and spreading very rapidly now-a-days, as there is always some reason behind something. Similarly, in hacking, Hacker has some goals or missions. If a Hacker is hacking some-where it means that he has some reasons or some objectives in his mind.
There are many reasons due to which people become hackers and hence they hack into different organizations, institutes and many computers as well as over the internet.

Here, I am showing you some reasons of hacking:
  • Defacement: to deface or delete some contents/information e.g. documents/data files.
  • Planting viruses: to put viruses (malwares) which result damage or disabling of a computer network.
  • Getting passwords: this is the most popular hacking as people tries to get password of others so-that they may see their emails, chats etc.
  • Steal information: to steal personal information or data of an organization or agency.
  • Monetary loss: to make monetary loss by hacking pin code of debt cards and ATM’s etc.
  • Damage others: to damage other devices and self safety.
For security reasons: special police and agencies, national security and defense department use hacking for the sake of catching criminals and for other objectives as well. Now the question arises that who are hackers? It is not easy to recognize but they are often found in following forms. They may be employees of some organization, as they wanted to deface documents against them so as they get personal benefits. Hackers may be teenagers, teenagers usually hack passwords to get money and to make fun as well as they wanted to get university documents; papers etc. Political Activists hack the information of other parties for sake of getting or defacing blunders of corruption etc. There are some professional hackers also. They are professionally trained and are highly skilled in computer hacking and cyber crimes. They work for organizations, defense departments and intelligence/ investigation agencies etc. Some hackers earn money by hacking and they adopt it as their profession. Victims of hacking are ‘Gullible People, Desperados and greedy people, unskilled and inexperienced people, unlucky people, celebrities and famous people and sometimes Government’ J There are several documented cases of hacking. Wiki-leaks is the example of hacking in which secrets of Government were exposed L According to a web portal in 2000 eBay, Amazon and Yahoo was hacked between February 6 to February 12 by a hacker. There is another example of hacking a bank in 1995 by a Russian Vladimir Levin. He stole about $10 million.

Hacking doesn’t depict ethics of any religion. Its
against the ethical values and it creates anxiety and unpleasantness. There are no as such rules or ordinance which is able fully uproot cyber crime. In cross its ratting is increasing day by day. Mr. Binyamin Mughal see also on Binyamin g+

Monday, 13 October 2014

Visit the following link and watch news channels free online.

Select any of the below channel

Sunday, 12 October 2014

How to Write a Comparative Analysis

How to Write a Comparative Analysis. Few college students are able to avoid the infamous comparative analysis paper, also called a "compare and contrast essay." This academic standby requires you to compare two things--whether you're analyzing two different governmental policies or two different Shakespearean sonnets. The key to writing a successful comparative analysis is to establish a good thesis and organizational scheme before you start writing. Read on to learn more.

Step 1
Start with a frame of reference--a basis for comparison. Sometimes the assignment provides this to you by asking you specifically to compare the use of propaganda in two different governments--rather than just to compare two governments--or the way a novelist uses physical descriptions to characterize two of her protagonists, rather than just to compare these characters. If your professor doesn't provide a specific means of comparison, you'll need to come up with this on your own.
Step 2
Make a list of the similarities and differences between the two things you're comparing. As you do this, remember that your goal from this exercise will be to craft a thesis--an argument about how the two things are similar and/or different.
Step 3
Write your thesis. You might want to do some brainstorming on paper before you come up with a thesis, or another prewriting technique like clustering. Another good way to come up with a strong thesis is to discuss your topic with another classmate and bounce ideas off of him.
Step 4
Outline the rest of your paper using one of the following two effective ways to organize a comparative analysis. One is to write several paragraphs about the first subject, and then a few paragraphs on the second subject you're comparing the first one to, noting similarities and differences. The second is to write a paragraph about the first subject, then a paragraph about the second--noting how the second differs or is similar to the first one. You repeat this process of alternating from one subject to the other until you have touched on all of the similarities and differences that you wish to compare and contrast.
Step 5
Write a conclusion that goes over the gist of what you discussed in the previous paragraphs and reinforces your thesis.
Step 6
Carefully proofread before you submit your work. Also make sure you've cited all sources properly, using APA or MLA style--or whatever style guide your professor has asked you to rely upon.


Read a few comparative analysis papers before writing one, so you'll understand the genre.Talk to your professor and/or a writing tutor as you begin thinking through ideas for your paper. The best time to get help on a writing assignment is while you're in the process of writing it--not when you've done a first draft that needs reworking. It's better to get a handle on the topic before you start drafting it.

Friday, 10 October 2014

Libertagia Online Work Video Guide

Libertagia Online Work Video Guide: This video include all the guide regarding online woriking with Libertagia.see this video and ask for any qurries and comments for that.

                                    Register free

What is Libertagia??

Salam Friend hope you are all good :).... before some time i was make a blog for you but its not effected because some people was can't understand how to work on it now we have first time tutorials in urdu its mine tutorial for All of you :)


                      libertagia introduction ( what Is Libertagia... by Binyamin Mughal

 Register free


                     how to register on libertagia part 2/4 by Binyamin Mughal


                   how to approve your account in libertagia... by Binyamin Mughal

 Register free


                     how to work on libertagia and how to make... by Binyamin Mughal

                           Register free

Other Questions and their answers:
Final Concepts

                       Libertagia All Concepts Clear by Binyamin Mughal

How to make Libertagia account ?
How to approve Libertagia account ?
How to work and earn with Libertagia ?

All these questions are answerd in this video.