मैं मदिरालय के अंदर हूँ, मेरे हाथों में प्याला,
प्याले में मदिरालय बिंिबत करनेवाली है हाला,
इस उधेड़-बुन में ही मेरा सारा जीवन बीत गया -
मैं मधुशाला के अंदर या मेरे अंदर मधुशाला!
अपने युग में सबको अनुपम ज्ञात हुई अपनी हाला,
अपने युग में सबको अदभुत ज्ञात हुआ अपना प्याला,
फिर भी वृद्धों से जब पूछा एक यही उज्ञल्तऌार पाया -
अब न रहे वे पीनेवाले, अब न रही वह मधुशाला!
'मय' को करके शुद्ध दिया अब नाम गया उसको, 'हाला'
'मीना' को 'मधुपात्र' दिया 'सागर' को नाम गया 'प्याला',
क्यों न मौलवी चौंकें, बिचकें तिलक-त्रिपुंडी पंिडत जी
'मय-महिफल' अब अपना ली है मैंने करके 'मधुशाला'
कितने मर्म जता जाती है बार-बार आकर हाला,
कितने भेद बता जाता है बार-बार आकर प्याला,
कितने अर्थों को संकेतों से बतला जाता साकी,
फिर भी पीनेवालों को है एक पहेली मधुशाला
बड़े-बड़े नाज़ों से मैंने पाली है साकीबाला,
किलत कल्पना का ही इसने सदा उठाया है प्याला,
मान-दुलारों से ही रखना इस मेरी सुकुमारी को,
विश्व, तुम्हारे हाथों में अब सौंप रहा हूँ मधुशाला
जितनी दिल की गहराई हो उतना गहरा है प्याला,
जितनी मन की मादकता हो उतनी मादक है हाला,
जितनी उर की भावुकता हो उतना सुन्दर साकी है,
जितना ही जो रिसक, उसे है उतनी रसमय मधुशाला
Translate
Wednesday, July 14, 2010
Tuesday, July 13, 2010
Rootkit Revealer
RootkitRevealer is an advanced rootkit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. RootkitRevealer successfully detects many persistent rootkits including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys). If you use it to identify the presence of a rootkit please let us know!
The reason that there is no longer a command-line version is that malware authors have started targetting RootkitRevealer's scan by using its executable name. We've therefore updated RootkitRevealer to execute its scan from a randomly named copy of itself that runs as a Windows service. This type of execution is not conducive to a command-line interface. Note that you can use command-line options to execute an automatic scan with results logged to a file, which is the equivalent of the command-line version's behavior.AccessEnum
This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.
You can find the tool on
http://technet.microsoft.com/en-us/sysinternals/bb897332.aspx
You can find the tool on
http://technet.microsoft.com/en-us/sysinternals/bb897332.aspx
Friday, July 9, 2010
What Is Firewall?
All Internet connections are a two way process. Data must be sent and received by your computer. This data is sent through something called ports. These are not physical things rather aspects of the way your computer communicates online.
Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.
Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.
Thursday, July 8, 2010
How to Trace a IP
C:/tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name
with the help of this command u can trace
with the help of this command u can trace
HOW TO KNOW THE REMOTE IP U CONNECTED
Go to command Prompt--> c:/netstat
It will show the IP address u have connected
21 :: FTP port
80 :: http port
23 :: Telnet port
It will show the IP address u have connected
21 :: FTP port
80 :: http port
23 :: Telnet port
Wednesday, July 7, 2010
Watch my New Beta Version Website
www.chicosfashions.com
Site is launched for testing, check it and let me know the feedback and whatever correction u want
Site is launched for testing, check it and let me know the feedback and whatever correction u want
Sunday, July 4, 2010
WHY?
The reason this happens:
In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.
1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters
In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.
1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters
Notepad Trick ! for complete list move to NOTEPAD TRICKS page
Step 1: Open Notepad
Step 2: Write following line in the notepad.
this pgm will chang
Step 3: Save this file as a.txt
Step 4: Close the notepad.
Step 5: Open the file again.
Step 2: Write following line in the notepad.
this pgm will chang
Step 3: Save this file as a.txt
Step 4: Close the notepad.
Step 5: Open the file again.
Remove Stored username and Passwords !
To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords
Hiding Content of Web Site
If you are serious about hiding contents follow the 6 point program below.
1. Take it down from the publicly available internet location.2. Turn off the computer with the original files.
3. Remove the harddrive.
4. Destroy the harddrive by using a 18 LB sledge hammer.
5. Bury the remains in a land fill.
6. Have hypnosis to remove any traces of memory of the above.
Thursday, July 1, 2010
My Life
इस अजनबी सी दुनिया में, अकेला इक ख्वाब हूँ.
सवालों से खफ़ा, चोट सा जवाब हूँ.
जो ना समझ सके, उनके लिये "कौन".
जो समझ चुके, उनके लिये किताब हूँ.
दुनिया कि नज़रों में, जाने क्युं चुभा सा.
सबसे नशीला और बदनाम शराब हूँ.
सर उठा के देखो, वो देख रहा है तुमको.
जिसको न देखा उसने, वो चमकता आफ़ताब हूँ.
आँखों से देखोगे, तो खुश मुझे पाओगे.
दिल से पूछोगे, तो दर्द का सैलाब हूँ
सवालों से खफ़ा, चोट सा जवाब हूँ.
जो ना समझ सके, उनके लिये "कौन".
जो समझ चुके, उनके लिये किताब हूँ.
दुनिया कि नज़रों में, जाने क्युं चुभा सा.
सबसे नशीला और बदनाम शराब हूँ.
सर उठा के देखो, वो देख रहा है तुमको.
जिसको न देखा उसने, वो चमकता आफ़ताब हूँ.
आँखों से देखोगे, तो खुश मुझे पाओगे.
दिल से पूछोगे, तो दर्द का सैलाब हूँ
Subscribe to:
Posts (Atom)