Wednesday 3 December 2014

PlayStation turns 20 today

 

PlayStation is all grown up now.

The break-through video console from Sony (SNYFY) Computer Entertainment marks its 20th anniversary today, and to celebrate, Sony is releasing a special Anniversary Edition PS4.
Pre-orders start on Dec. 6, and are available only in "very limited supply," according to the company.
Shunei Yoshida, author of the PlayStation.Blog, noted that the original PlayStation launched in Japan on Dec. 3, 1994.
"20 years is a long time!" he blogged. "In 1994, many outsiders thought that Sony was slightly crazy to launch the original PlayStation into an incredibly competitive gaming market. Who could blame them?"
The market is still competitive. Xbox One from Microsoft (MSFT, Tech30) is in hot demand this holiday shopping season, giving the PlayStation 4 a run for its money, along with competing consoles from Nintendo, including the Wii U.
Related video: Sony hack could lead to censorship
Trying to gain an edge, Sony recently unveiled an Internet cable service called Vue, which would be accessible through PlayStation consoles instead of a cable box.
The company is struggling. Sony expects to lose more than $2 billion in the current fiscal year, largely due to losses in the highly competitive smartphone industry.

Tuesday 23 September 2014

7 safety tips from hackers

It's easy to get hacked. And yes, it can happen to you.

Follow this advice from actual hackers, and you'll be a lot safer online.
1. Turn off your phone's Wi-Fi and Bluetooth.Hackers are religious about this. Keeping these features "on" all the time makes it easy for strangers to slip into your phone.
The problem? If you keep Wi-Fi and Bluetooth active, hackers can see what networks you've connected to before, spoof them and trick your phone into connecting to Wi-Fi and Bluetooth devices that hackers carry around.
Once connected to your phone, hackers can bombard your device with malware, steal data or spy on you. And you won't even notice.
So, turn on Wi-Fi and Bluetooth when you need them. Turn them off when you don't.
2. Use two-step authentication. Nowadays, a single password isn't enough. They get exposed all the time.
Lots of email and social media services offer an extra later of protection: two-step authentication -- essentially a second, temporary password.
For example, when you set this up with Google, (GOOG) Twitter (TWTRTech30) andLinkedIn, (LNKDTech30) they ask you for a secret code every time you log in from a new device. You immediately get a text message with a six-digit number.
It's an effective way to keep out hackers. Even if someone gets your password, they'd still need your phone too -- an unlikely scenario.
3. Create a smart password strategy. For the select few websites with your most sensitive information (email, bank), create some long and unique passphrases, like+hisPl@tinumDr@gonBreathesF1re.
For everything else? Use a password manager. This type of program stores all your passwords online, so you can make each one different, and you won't have to remember them all.
But only use a password manager that encrypts them on your device. LastPass andPassword Safe do this.
(Why not use a password manager for everything? One master password unlocks them all. You create a single point of failure.)
Change all of your passwords more than once a year.
4. Use HTTPS on every website. Install the HTTPS Everywhere tool developed by the pro-privacy Electronic Frontier Foundation. It encrypts all the information your browser is sending between your computer and websites.
If you only see HTTP in the address bar, anyone can spy on your Internet session.
5. Bulk up your home Wi-Fi. Setting up Wi-Fi at home is a tour through the circles of hell. But these two steps are important.
First, set up a password. Don't keep the default password on the sticker.
Next, the machine will ask what type of security encryption standard you'd like. Choose WPA-2.
Lots of machines default to WEP (Wired Equivalent Privacy) or WPA (Wireless Protected Access). Avoid them at all costs. A known Wi-Fi flaw can give up your password in seconds.
6. Don't hide your home Wi-Fi. Your home router asks: "Hide the SSID?" If you say yes, then your devices are forced to "actively scan" for the home network you're trying to hide. Sure, they'll connect. But as a result, your device "actively scans" for networks all the time.
Your laptop and phone are more susceptible to connecting to strangers' unsafe Wi-Fi networks.
"You're actually setting yourself back five years in terms of security," said Ben Smith, an experienced Wi-Fi hacker who's worked on secretive government projects.
7. Think twice before buying an Internet-connected device. Do you really need a"smart" fridge or oven?

Monday 8 September 2014

SQL Injection Tutorial for Beginners

What is a SQL Injection?

SQL injection is a code injection technique that exploits a security vulnerability within the database layer of an application. This vulnerability can be found when user input is incorrectly filtered for string literal escape characters embedded in SQL statements.
Although SQL injection is most commonly used to attack websites, it can also be used to attack any SQL database. Last year, a security company reported that the average web application is attacked at least four times per month by SQL injection techniques. Online retailers receive more attacks than any other industry with an online presence.

Picking a Target

The first step to performing a SQL injection attack is to find a vulnerable website. This will probably be the most time-consuming process in the entire attack. More and more websites are protecting themselves from SQL injection meaning that finding a vulnerable target could take quite some time.
One of the easiest ways to find vulnerable sites is known as Google Dorking. In this context, a dork is a specific search query that finds websites meeting the parameters of the advanced query you input. Some examples of dorks you can use to find sites vulnerable to a SQL injection attack include:
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=

Of course, there are many others as well. The key component of these specialized search queries is that they all focus on websites that rely on PHP scripts to generate dynamic content from a SQL database somewhere on the backend of the server. You can learn more about advanced Google search techniques in Unleash Google Search.
Remember that a SQL injection attack can work on any SQL database, but PHP-based websites are usually your best targets because they can be set up by just about anyone (i.e. WordPress) and often contain lots of valuable information about customers within the database you are attempting to hack.
However, just because Google pops up with a result using these dorks does not mean it is vulnerable to attack. The next step is to test each site until you find one that is vulnerable.

Navigate to one of the websites you found. For this example, assume that one of the search results is http://www.udemy.com/index.php?catid=1. To find out if this site is vulnerable to SQL injection, simply add an apostrophe at the end of the URL like this:
http://www.udemy.com/index.php?catid=1’
Press enter and see what the website does. If the page returns a SQL error, the website is vulnerable to SQL injection. If the page loads normally, it is not a candidate for SQL injection and you should move on to the next URL in your list.
The errors you receive do not matter. As a general, if the website returns any SQL errors, it should be vulnerable to SQL injection techniques.
At this point, understanding SQL is even more important as you will begin manipulating the database directly from the vulnerable page.  Practical SQL Skills is a solid resource for beginner and intermediate users.

Starting the Attack

After locating a vulnerable site, you need to figure out how many columns are in the SQL database and how many of those columns are able to accept queries from you. Append an “order by” statement to the URL like this:
http://www.udemy.com/index.php?catid=1 order by 1
Continue to increase the number after “order by” until you get an error. The number of columns in the SQL database is the highest number before you receive an error. You also need to find out what columns are accepting queries.
You can do this by appending an “Union Select” statement to the URL. A union select statement in this URL would look like this:
http://www.udemy.com/index.php?catid=-1 union select 1,2,3,4,5,6
There are a couple of things to note in this example. Before the number one (after catid), you need to add a hyphen (-). Also, the number of columns you discovered in the previous step is the number of digits you put after the union select statement. For instance, if you discovered that the database had 12 columns, you would append:
catid=-1 union select 1,2,3,4,5,6,7,8,9,10,11,12
The results of this query will be the column numbers that are actually accepting queries from you. You can choose any one of these columns to inject your SQL statements.

Exploiting the Database

At this point, you know what columns to direct your SQL queries at and you can begin exploiting the database. You will be relying on union select statements to perform most of the functions from this point forward.
The tutorial ends here. You have learned how to select a vulnerable website and detect which columns are responsive to your queries. The only thing left to do is append SQL commands to the URL. Some of the common functions you can perform at this point include getting a list of the databases available, getting the current user, getting the tables, and ultimately, the columns within these tables. The columns are where all of the personal information is stored.
If you are unfamiliar with using SQL commands to finish the exploit, you should study various commands before attempting a SQL injection attack.

Note: Hacking is illegal...Hacking is Crime..,

Sunday 24 August 2014

Why Pakistan...???

Pakistan has a lot of issues and problems which have put this  country behind in the race of development and success. But regardless of all the problems and major issues within the country, Pakistan is still loved for its natural beauty. It is in no way behind in the race of natural beauty and big mountains’ popularity in the world. In no way, this country is lesser appreciated by the tourists due to its natural scenes, big mountains and crystal clear rivers. The northern areas of Pakistan remain full almost all the months of the year with tourists and local visitors.

Some of the beautiful places of Pakistan are listed below:-

1. Kashmir Sceneries


The part of Kashmir which is under Pakistan is the beautiful place to visit. It has the beauty that attracts all. the people their and the natural beauty by God makes the Kashmir a beautiful part to visit.


2. Neelum Valley

Neelum valley is one of most attractive place for tourists due to its famous lush greenery, springs, streams,lakes and hilly and sloppy mountains. Running through the Lesser Himalaya, the Neelam River valley has excellent scenic beauty, panoramic views, towering hills on both sides of the noisy Neelum river, lush green forests, enchanting streams and attractive surroundings make the valley a dream come true.

3. Swat Valley

Swat is a valley and an administrative district in the Khyber Pakhtunkhwa Province, Pakistan. It is the upper valley of the Swat River, which rises in the Hindu Kush range.

4. Kaghan Valley


The Kaghan Valley is a beautiful valley in the north-east of Mansehra District . It attracts many tourists from not only Pakistan but also from the whole world. Laying in lower Himalayan mountains range, the Kaghan valley, famous for its bewitching splendor and natural beauty, is one of the most charming tourist resorts in scenic Hazara division. There are many beautiful and attractive spots like Shogran, Jared, Naran,Lake Saiful Muluk, Lake Dudipat Sar, Lake Lulu Sar, Babusar Pass and much more to do.

5. Murree Hills


This is a summer hill station, summer resort and is sitated in Murree, the subdivision of Rawalpindi District. Murree was the summer capital of the British Raj in the Punjab Province. People from all over the Pakistan wish to go there in summer to enjoy its beauty and in winter season for astonishing experience of snowfall. Bhurban and New Murree (Patriata) are a main tourist center. One of the most favorite tourist point of Murree is Galliat, it has fascinating greenery and scenic beauty that attracts tourist belonging different regions of Asia.

6. Jehlum Valley


This is an ideal valley of Azad Kshmir region for both the domestic and international tourists. The curling river Jhelum passes through from East to West between the high green mountains of this valley. This valley has a most beautiful valley “Leepa Valley” . This is the most fascinating & loveliest valley in Azad Kashmir. Its lush green rice fields in summer and typical wooden Kashmiri houses present a wonderful view to the people visiting the area. Walnut, Apple, Cherry and honey of Leepa are very popular and in great demand. There are many visiting sites like Peerchanasi, Chikar, Chinary, Leepa, Chakothi, Ghari Dopatta, Chokothi Cham-fall and Zilzaal Lake.

7. Karakoram Mountains


The Karakorams are part of a complex of mountain ranges at the centre of Asia, including the Hindu Kush to the west, the Pamirs to the northwest, the Kunlun Mountains to the northeast, and the Himalayas to the southeast. The borders of Tajikistan, China, Pakistan, Afghanistan, and India all converge within the Karakoram system, giving this remote region great geopolitical significance. The name “Kurra-koorrum,” a rendering of the Turkic term for “Black Rock” or “Black Mountain,” appeared in early 19th-century English writings. 



 


 

Thursday 7 August 2014

Mobile Phone(Technology Or Dieases)


Mobile Phone is the best way to communicate. We can stay in touch with our loved ones anywhere, anytime, just because of mobile phones. All thanks to their small size, lightweight, that make them portable.Mobile phones are quite useful in studies and business. In both fields, the mobile phone has become like compulsory gadget. Students can access Internet on their mobile phones while on the go, and thus can get knowledge of any topic they wish to. The business persons can keep updated with the markets up and downs, can stay in touch with their employees and clients.ust consider any emergency situation in which you want to talk to your friend, relative or anyone else? Mobile Phone is what works as boon in such situations. You might have faced any emergency situation in which mobile phone helped you, have you? Whether you have faced it or not, it’s quite easy to understand the role of mobile phones in emergencies.

The students are just addicted to mobile phones. They can be seen playing games, chatting, and talking to their friends on their mobile phones most of the times. This is the reason why they don’t get time for studies. In fact, students are more interested in wasting their time on mobile phones, rather than spending it on studying.
Accident and Health Issues
Most of the accidents that happen daily arise because of mobile phones. The mobile phones have resulted in dangerous driving, whose direct impact can be seen in increasing no. of accidents. Apart from accidents, mobile phones have bad impact on health as well. Several researches conducted by the health experts have proved the bad impact of mobile phones on health. There is alot more on the mobile phone harmful effect on the human body or mind which includes:

1) A study on mice offspring suggested that cell phone use during pregnancy may cause behavioural problems that resemble the effects of ADHD
2) A number of studies have shown relationships between mobile telephone use and reduced sperm count and sperm quality. Peer reviewed studies have shown relationships using statistical questionnaire techniques, controlled experiments on living humans, and controlled experiments on sperm outside the body.
The Environmental Working Group (EWG) has a web page entitled "Cell Phone Radiation Damages Sperm, Studies Show" published August 2013. The EWG page reviews and tabulates studies showing relationships between mobile phone use and low sperm count and sperm quality,
3) A team led by Dr. Nora Volkow, head of the National Institute on Drug Abuse, used advanced imaging technology to monitor glucose consumed in the brain. They found that even weak cell phone radiation alters brain activity near cell phone antenna. Environmental Working Group now recommends cell phone users limit their exposure to cell phone radiation by for example looking for cell phone models that emitts low radiation.




                             France has banned all mobile phone advertising aimed at under-12s, while legislation is being introduced to make it compulsory to sell all phones with earphones. Canada and Russia have also advised caution and the Israeli government is considering printing health warnings on phones, as on cigarette packets. Meanwhile, several countries are implementing or considering a total ban of Wi-Fi in schools.
“People say there’s no plausible biological hypothesis for how electromagnetic radiation can damage cells – well speak for yourself,” says Prof Henshaw, who is an adviser to Mobilewise, a group that issues safety guidance to children. “Research is moving so fast, I receive five to 10 papers a day on the effects of radiofrequency. We don’t know everything.” Prof Henshaw does not agree that primary DNA damage is needed to cause cancer. He cites research into magnetite crystals, that are found in the human brain. Electromagnetic radiation is shown to physically vibrate these particles and there’s speculation this could make cells think they’re under attack.
“They’ll find it stressful and this could affect the mechanism and we know that some cancers are caused by mechanics,” he says. 


Although mobile phone is life companion for most people but for teens and small kids it can be harmful or can be drug, they can addicted to it and will forgot all the possible life relations needed at that time.





Thursday 31 July 2014

Dr Aafia Siddiqui (Daughter Of Pakistan)

Dr Aafia Siddiqui was born in Karachi, Pakistan, to Muhammad Salay Siddiqui, a British-trained neurosurgeon, and Ismet (née Faroochi), an Islamic teacher, social worker, and charity volunteer. She belongs to the Urdu-speaking Muhajir community of Karachi. Her mother was prominent in political and religious circles and at one time a member of Pakistan's parliament. Siddiqui is the youngest of three siblings.Her sister, Fowzia, is a Harvard-trained neurologist who worked at Sinai Hospital in Baltimore and taught at Johns Hopkins University before she returned to Pakistan.
Aafia attended school in Zambia until the age of eight, and finished her primary and secondary schooling in Karachi.
Siddiqui moved to Houston, Texas on a student visa in 1990 joining her brother. She attended the University of Houston for three semesters, then transferred to the Massachusetts Institute of Technology after being awarded a full scholarship.
In 1992, as a sophomore, Siddiqui received a Carroll L. Wilson Award for her research proposal "Islamization in Pakistan and its Effects on Women".  As a junior, she received a $1,200 City Days fellowship through MIT's program to help clean up Cambridge elementary school playgrounds. While she initially had a triple major in biology, anthropology, and archaeology at MIT, she graduated in 1995 with a B.S. in biology.


A woman finds herself alone on the street in an unfamiliar neighborhood of an unfamiliar city. The people around her don’t speak her native language, and in fact, she doesn’t understand their language.  She is accompanied by a 12 year old boy, Ali. She doesn’t recognize him, but she has a great affection for children, and he is in her care. He will later be identified as her son, Ahmed whom she has not seen in the 5 years since they were abducted from a taxi in Karachi not far from their home.  She doesn’t know  how she got there, and she isn’t entirely sure why she is there. Small and slender, no more than 110 lbs, he seems fragile, a little disoriented, out of place. She will later say that she was looking for her husband, or another time, that she was looking for a particular woman. It’s possible she really doesn’t know why she is there.  She hears the Muezzin’s call and begins to move towards the mosque. Perhaps she will find a refuge there.
The Afghan police in Ghazni notice a woman on the street. Something draws their attention to her.  She doesn’t appear to belong to the place. Perhaps she isn’t dressed in the local style. She is on the street in the early afternoon on a Friday when most men are at the Mosque and women are in their homes. The Police say she seemed out of place, lost. The police would later say that she was loitering after dark, but among the court documents, there is an interview with the shopkeeper in front of whose store she was detained. He says that he wasn’t in the store because it was Friday, he was attending the prayer service at the Mosque.  It would have been between 1 pm and 3:30 pm. He swears the woman is a stranger and he has never seen her before. Though they will later say that they only approached her because she seemed out of place, they check his shop and even his phone to make sure. There is nothing on his phone except some pornographic images of white girls. He is innocent.[3]
So what did attract their attention? Most likely we will never know for sure. Maybe its her apparent disorientation as they will later state, or perhaps it is just that they don’t recognize her. Maybe they have been tipped off to look for her. When they confront her, she is startled and defensive. She screams at them not to touch her. She accuses them of being Americans or American operatives.[3] It is clear that neither she nor the boy speaks the local language, so a translator is called. A WikiLeaked document identifies a shopkeeper who was enlisted as translator.  He says that she shouts at the police and curses them in Urdu.  She calls on Allah and demands that they not touch her.  Of course the same document says that she was picked up after dark.[1]  If they are just asking what she is doing, why is she so distressed?  Have they physically detained her, or is she just panicked by their uniforms? They take her in for questioning.
They have found a number of incriminating objects in her handbag. According to a document later published through Wikileaks, her purse contains “numerous documents on how to build explosives, chemical weapon use, targeting US military assets, excerpts from the Anarchist’s Arsenal and a 1 GB (gigabyte) thumb drive with additional related material”  along with “unknown chemical materials sealed in containers”.[1] During the course of the interrogation she is severely beaten. She admits that she is a suicide bomber whose target is the local governor. Apparently his home is nearby the place she was detained. She has a passport, which apparently has her true identity because they recognize her name as being on the FBI Most Wanted List. (Pretty good reckoning for local Afghan National Police who don’t speak English). Perhaps it just confirms that she is definitely the one they were looking for. They call Afghan President Hamid Karzai and the Americans at Bagram, as well as the Governor she was supposedly targeting, who immediately takes advantage of the opportunity for publicity and calls a press conference.[2]
Soon the Americans arrived, FBI agents with soldiers and translators in tow, to collect their prey. She is sitting on a bed behind a curtain in a rather small room. She is bruised and exhausted. Perhaps she has dozed and is awakened by the entrance of as many as 10 men into the small room where she is being held. Now she is alert. It is interesting that the interrogators have brought along translators, but perhaps they need them to communicate with the Afghan police. The woman speaks good enough English to get a Masters Degree from MIT and PhD from Brandeis University. She was a dynamo then, busy with her studies and her charities and her family. Now she is exhausted, beaten, frightened, alone in a room full of heavily armed men.
One of the soldiers seats himself near the curtain and sets his automatic rifle on the floor near his chair. He will later say that it hadn’t occurred to him that the prisoner was in the room.[1]  I suppose that is understandable. In the world these Americans normally inhabit, prisoners are regularly shackled and hooded. They are brought into a room when everyone else is in place like chained animals being brought into the ring at a circus. Even so, it is a pretty serious breach of responsibility for the Sergeant in charge of the security team to lay his rifle on the floor next to a closed curtain.
This prisoner is curious about the commotion and anxious. She wants to know what is happening. She rises and steps forward. She peeks through the curtain …Snatches the gun … and Fires the gun…according to the Americans. Someone yells out “The prisoner is free.”  Shots ring out. She  falls to the ground, wounded, with a bullet in her belly and one in her side.  When her attackers come to rescue her, she curses them in English and screams at them not to touch her, even as they wrestle her to the ground. Later, in court, the Americans will swear that she took the gun and fired it.   They will say they had no choice but to defend themselves. The Afghans will state that they didn’t see what happened but they heard shots fired. The woman says that she came to the curtain to see what was going on.
The prisoner is brought to Bagram Hospital for surgery, where a portion of her intestines is removed, along with a kidney. She is in shock and near death on arrival. Numerous transfusions are required to bring her back and stabilize her prior to and during the emergency surgery. Afterwards, she is shackled, hand and foot, to her bed. Imagine, if you will, a surgery where the patient is cut from breastbone to pubis, and then shackled to a bed on her back, bound hand and foot like a crucifixion. A pair of watchful FBI Agents stay by her side, encouraging her to talk about herself, about her life.[3] She will later refer to him as her only friends. She is heavily sedated with pain killers, and one can imagine they might be very helpful, given her restraints, and comforting, given her state of utter dependence and aloneness. A week later, she is flown to New York and arraigned before the Southern Court of New York in a wheelchair on separate charges obtaining a lethal weapon and of attempting to kill each person in the room.The least amount of compassion would indicate that even if she did take the gun, even if she managed to fire the high power automatic rifle without being knocked to the ground, the action would have been in the service of escape rather than a murderous rampage. However, there is no forensic evidence whatsoever that she held the gun or fired it.  No one was shot except the prisoner herself. There were no bullet holes in the walls or ceiling of the small room, and no shell casings recovered from the floor. There were no fingerprints on the gun, and there was no gunpowder on the prisoner’s hands or the curtain in front of her. [Court Documents] Yet a year later, Dr. Aafia Siddiqui, a Pakistani national who never should have been extradited from Afghanistan to the US in the first place, a bright, well educated person with a PhD from Brandeis University, now incapable if a consistent description of where she had been for the past 5 years, incapable of recognizing her own son, was convicted of separate counts of attempted murder and assault for every American in the room, sentenced to 86 years in prison and incarcerated in Carswell Medical Center in Texas.According to Cornell University Legal Information Institute, under Federal law: the maximum sentence for manslaughter (actually killing someone) is 5-7 years; the maximum sentence for  threatening the President or Vice President of the US is 5 years; the maximum sentence for assaulting a Supreme Court Officer is 1 year though if a deadly weapon is involved it goes up to 10 years. A maximum  sentence of 20 years is allowed for ”helping Al Qaeda develop a nuclear weapon”, slavery and human trafficking, ’genocidal eugenics’, selling child pornography, or performing a deadly act of violence against personnel at an international airport (so long as the person so assaulted doesn’t die).[6.2-6.5] The charges against Aafia Siddiqui have similar maximum sentencing guidelines to helping Al Qaeda build a nuclear weapon or human trafficking or assaulting  personnel in an international airport [6.1.6.6] [5.1-5.3].The Jury deemed the defendant guilty of  all charges WITHOUT PREMEDITATION. It would seem this verdict would preclude terrorism.  Dawn Cardi, a member of Aafia Siddiqui’s defense team pointed this out in her Sentencing Statement.  She said that the normal sentence for this verdict would be 10-12 years.[3]  But the judge did apply the Terrorism Enhancement.  Though the Jury evaluated the case on the facts presented, Judge Berman’s sentence was based on the contents of her bag, never addressed in court, and FBI allegations that were never prosecuted.  He ignored clear indications that she suffered from PTSD and that she suffered from mental illness that was serious to merit her placement at the psychiatric ward at Carswell but not serious enough to influence her actions or her participation in the trial, the lack of material evidence for the crime she was convicted of and her persistent claims of prior abuse while incarcerated in Afghanistan or Pakistan.  Why was Aafia Siddiqui prosecuted for one crime and convicted of another one can only assume there was not enough evidence to make the preferred case.





Sources:-

  1.  The Express Tribune: Wikileaks Aafia’s Incriminating Purse
  2. Court Document, USA vs. Aafia Siddiqui, Document #256 (Aafia Siddiqui’s testimony to FBI agents at her bedside while in Bagram hospital after her surgery)
  3. Sentencing, USA vs. Aafia Siddiqui, Document #314
  4. Case Summary, 1:08-cr-00826-RMB USA v. Siddiqui, “Count 1: Conspiracy(with whom?) to Kill A US Citizen [] Count 4: Violent Crime/Drugs/Machine Gun (!) (Use of a firearm during crime of violence(?)“  — Emphasis and red comments interjected are mine.
  5. Definitions from Findlaw.com
    1. Attempt to Commit Murder or Manslaughter
    2. Protection of Officers and Employees of the United States
    3. Assaulting Resisting or Impeding Certain Officers or Employees
    4. *** Armed Career Criminal Act (Terrorism Enhancement)
  6. Other crimes in 18 U.S.C. 
  7. http://www.counterpunch.org

Monday 28 July 2014

United Nation ( A Failure Organization)

The United Nation Organization was formed to keep the peaceful and the healthy environment in the world. Its main cause was to free the world from the mass destruction weapons and to control the human rights violation and to stop the wars. But so far its role is not played in the country, it's role in Iraq, Somalia, Bosnia and now currently in Palestine(GAZA). The UN was set up with the express purpose of preventing global wars, yet it has done absolutely nothing to prevent them. Indeed, the UN has often served merely as a forum for countries to abuse and criticise each other, rather than resolve disputes peacefully.

The world body has failed to reflect the democratic aspiration of the world. Without being democratic itself, it talks of democratization of the world. Number of nuclear powers in the world has kept on increasing. UN could not control the increasing number of such  weapons and arms. No emphatic role in crisis of worst kinds like the Cuban Missile Crisis, Vietnam crisis etc. UN was nowhere in the picture when the NATO rained bombs over former Yugoslavia.


In some cases, such as the 2003 invasion of Iraq, UN resolutions have arguably been used as a justification for wars, rather than to prevent them.The UN totally exposed in the case of US invasion on Iraq in name for the search weapon of mass destruction. US has withdrawn its combat forces but the law and order and mutual distrust has worsened and at this juncture UN seems to be clueless.
Domestic situation of near anarchy in Iraq and many regions of Afghanistan, despite on active UN. The US President scheme of withdrawal has not able to bring any specific solutions in the region. In fact, the situation has been further aggravated.
Now, its role in the Palestine is not in the scene anymore. The only thing UN is planning is to call up its member and making up a committie just to talk on the issue, no results or statements have been followed on a serious note. The genocide of the Gaza people by the Israel's is look like the part of UN.
Israel had been taking unilateral action through decades in its geographical vicinity and nothing substantial has come out even by September 2010. Around 1000+ peoples including innocent babies, womens and all have been killed in the air strike by the israel and now the ground forces of israel and bleeding the Gaza in the blood.
Where is UN? Where are his peace keeping words? Where are his promises?
The only thing UN cares about is United States Of America(USA) it's democracy,it's people.
Actually, UN is ruled by USA bitter truth of UN.

Saturday 26 July 2014

Israel in Platestine


JERUSALEM — Brushing aside criticism of Israel’s  aerial attacks,ground attakcs on Gaza, Prime Minister Benjamin Netanyahu said  he felt no international pressure to quit the operation and would not rule out a ground invasion to stop

the barrages of rockets from Palestinian militants.

“We are weighing all possibilities and preparing for all possibilities,” Mr. Netanyahu told reporters at a news conference  Tel Aviv. Mr. Netanyahu, who has spoken with the leaders of the United States, Russia and the United Nations among others since Israel began the aerial assaults, said the Israelis had hit more than 5,000 targets in Gaza and still had more to go.

“No international pressure will prevent us from striking the terrorists who are attacking us,” Mr. Netanyahu was quoted by news agencies as saying.

He spoke as Palestinian health officials in Gaza reported at least 20 more deaths from Israeli airstrikes and still its counting, pushing the number of fatalities toward 700+, many of them civilians, including women and children.Thousand more have been reported wounded, and no action has been taking by United Nation or USA against this genocide.


Israel pointed our they are at "war", but with who?
the innocents childrens in Gaza who are been killed in a blink of an eye. With who?

those innocents mothers, who are getting raped who are carrying thier dead, injured childerns.
This is not a War this is a genocide
and a big failure of United Nation and USA.



Wednesday 23 July 2014

A new way to earn money



This article will define that how you can earn via the social media.

Now days because of the social media the world has come close together. Facebook, twitter, Hotmail etc are the things that have sum up the entire world into a close box.

These things not only did this but because of this people use to earn money…, interesting isn’t..!!!  but it’s the truth…that’s how it works too…,



We all are fully aware of the Facebook which have got pages groups in it to promote any sort of product or thing. But have you ever think of earning from Facebook.? It is true and you can say it is easy to.. just you need time and time. and this how it works:-

Be the admin of some Facebook pages which have maximum number of peoples feedback or response. Being and admin of the pages doesn’t give you anything if you take it just to post some status BUT now it's a most important need for doing this work. Inbox other pages admins to ask for likes on their pages. Likes doesn’t do anything it’s just the promotion of your page worldwide because many other diff country people are on Facebook and this creates a sense of promotion of page internationally. So, inbox  them and ask that whether you need likes for your page or not. If they say no thentry other and if they say yes then I ask how much likes, Set up a package or so that you have confident answer for them. For e.g:
1. 1000 likes for 20$
2. 2000 likes for 40$
3. 3000 likes for 60$

So then listen to them and post their page link on your pages, on all  pages you have  and ask your follower’s or likers to like this page. They do it and in this way you will easily achieve your target. In this way earning on Facebook can be done.

Question Is how do you get payment.?

Simple, meet your customer face to face to get paid this create a sense of trust b/w both parties and if the customer is far away then try money transfer thing like Paypal etc.


That was all about the fact or possibilities you can do on social media.