Friday, 10 February 2012

mehndi design









check out these menhdi design

bridal dress







bridal dress colection

Subha

Ab Or Kis Subha Se Main Aas Lagaon
Jab Shaam Tak B Usko Main Yaad Na Aun

Wo Kho Gya Hai Shayed Apni Rafaqaton Main
Ab Barishon K Moasum Main Yaad Kya Dilaon

Tarpa Nahi Hai Ab Tak Wo Kisi Ki Judaiyon Main
Main Apne Aansoou Ko Faryaad Kyun Banaon

Charcha Abhi Nahi Hai Ruswaiyon Ka Meri
Darta Hon Kal Jahan Main Ruswa Ho Na Jaon

Kehta Raha Hon Usko Mera Sath Sath Chalna
Wo Agay Nikal Gaya Hai Main Kahin Bichar Na Jaon

کِسی بھی رائیگانی سے بڑا ہے یہ دُکھ تو زندگانی سے بڑا ہے

کِسی بھی رائیگانی سے بڑا ہے یہ دُکھ تو زندگانی سے بڑا ہے

کِسی بھی رائیگانی سے بڑا ہے
یہ دُکھ تو زندگانی سے بڑا ہے
نہ ہم سے عشق کا مفہوم پوچھو
یہ لفظ اپنے معانی سے بڑا ہے
ہماری آنکھ کا یہ ایک آنسو
تمہاری راجدھانی سے بڑا ہے
گزر جائے گی ساری رات اس میں
مرا قصّہ، کہانی سے بڑا ہے
ترا خاموش سا اظہار راحت
کسی کی لن ترانی سے بڑا ہے

How Do I Know If My PC Is Infected With Spyware or Adware

Many people that are new to the Internet world are nervous about the potential of viruses, Spyware or Adware that can harm their computer, affect performance or make their very private information public to others.

Spyware programs can do a number of damaging things to your personal computer. Spyware infects your pc and hides in the background and can do many nasty things to the performance of your system. It can also do harmful things to you such as send out your personal information, your every keystroke and photo that resides on your hard drive, watch your surfing habits and shopping habits and annoy you with annoying pop-ups filled with advertisements and even pornography.

If you are experiencing any unusual changes in your computer's performance or have any unusual new pop-ups, changes to your toolbars or new icons on your desktop, you should run a system scan to find out if you have Spyware. Products exist on the market to help you combat this problem. Be sure to install software that you know is credible. Downloading freeware can often result in further Spyware existing on your computer. Spyware, Adware and Malware companies frequently fool users into sending pop-ups telling them that there's a problem with their computer and this in fact is further spyware. These errors can open your system up to future further problems by fooling people into thinking they're downloading fixes when really further spyware is being downloaded.

Watch your system's performance and at the sign of any unusual activity, realize that you are probably infected. Do something as soon as possible to protect your privacy. These programs don't discriminate and can launch themselves when you or your family members sit in front of the computer. Pornographic pop-ups can turn up whether it's an adult or a child using the computer. Protect your pc.

Antivirus alone isn't enough to combat this problem. Spyware sneaks into your system via executable files that you don't need to do anything to launch. They can sneak in as attachments that you download or by many other means. They're harmful and annoying but you can protect your computer and your privacy with the right software. This software needs to have an auto update for spyware definitions as new spyware definitions are being added daily. So a spyware removal program is a great compliment to your existing anti-virus software.

How to avoid getting your information be stolen via wireless connections

Sending unencrypted information over any unfamiliar network can turn your computer into an open book -- with pages full of your personal information.

Many of these connections are appear to be legitimate connections because they are spoofed (camouflaged to appear as if they are a trusted connection).

Spoofing a connection, or site isn't very hard to do. They simply copy and transpose pictures and statements (words) from legitimate sites to their own. The Artists Against website has a portal, where you can see fake websites that are up and running on the Internet, here.

Martin's article contains some excellent tips on how to navigate the murky waters of public hot spots, safely.

They can be viewed, here.

Interestingly enough, wireless technology, isn't only used to compromise individuals. In the recent TJX data breach, where some are saying 200 million records were stolen since 2003, reports are saying the data was stolen, using wireless technology.

It's being reported that this was accomplished from a car with a laptop. Driving around with a laptop, using other people's wireless connections, is sometimes referred to as "war-driving," which is my new word for the day.

history of computer

History of Computer Science :
          The history of computer science predates the invention of the modern digital computer by many years. Machines for calculating fixed numerical tasks have existed since antiquity, such as the abacus. Wilhelm Schickard built the first mechanical calculator in 1623. Charles Babbage designed a difference engine in Victorian times, and around 1900 the IBM corporation sold punch-card machines. However all of these machines were constrained to perform a single task, or at best, some subset of all possible tasks.
Prior to the 1950s, the term computer referred to a human clerk who performed calculations. Early researchers in what came to be called computer science, such as Kurt Gödel, Alonzo Church, and Alan Turing, were interested in the question of computability: what things can be computed by a human clerk who simply follows a list of instructions with paper and pencil, for as long as necessary, and without ingenuity or insight? Part of the motivation for this work was the desire to develop computing machines that could automate the often tedious and error-prone work of a human computer. Their key insight was to construct universal computing systems capable (in theory) of performing all possible computable tasks, and thus generalising all previous dedicated-task machines into the single notion of the universal computer. The creation of the concept of a universal computer marked the birth of modern computer science.
During the 1940s, as newer and more powerful computing machines were developed, the term computer came to refer to the machines rather than their human predecessors. As it became clear that computers could be used for more than just mathematical calculations, the field of computer science broadened to study computation in general. Computer science began to be established as a distinct academic discipline in the 1960s, with the creation of the first computer science departments and degree programs. Since practical computers became available, many applications of computing have become distinct areas of study in their own right.Workflow Management SystemKaromi ENTERPRISE: Workflow let's you do everything you need to do, and everything you want to doDesign workflows graphically, rule-based routing, role-based access, monitoring dashboard, eForm Builder, Report generation wizard, link to external databases, escalations and more. Workflow Management System has enabled J. K. Tyres reduce processing times significantly through access to real-time data, while integrating seamlessly with their existing Oracle databases. Read the entire Karomi customer success story. SAP Consultant India
NBZ IT Solutions Ltd: SAP is also the name of a software miniature. NBZ IT Solutions Ltd is best SAP Consultant India. The Session Announcement Protocol Meaning of SAP is a protocol for broadcasting multicast session information. A SAP listening application can listen to the well-known SAP multicast addresses and construct a guide of all advertised multicast sessions. SAP software products are in the ERP business