Friday, 24 March 2017

Types of Computer

Computer sizes and power

Computers can be generally classified by size and power as follows, though there is considerable overlap:
  • Personal computer: A small, single-user computer based on a microprocessor.

  • Workstation: A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful microprocessor and, in general, a higher-quality monitor.

  • Minicomputer: A multi-user computer capable of supporting up to hundreds of users simultaneously.

  • Mainframe: A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously.

  • Supercomputer: An extremely fast computer that can perform hundreds of millions of instructions per second.

Supercomputer and Mainframe

Supercomputer is a broad term for one of the fastest computers currently available. Supercomputers are very expensive and are employed for specialized applications that require immense amounts of mathematical calculations (number crunching). For example, weather forecasting requires a supercomputer. Other uses of supercomputers scientific simulations, (animated) graphics, fluid dynamic calculations, nuclear energy research, electronic design, and analysis of geological data (e.g. in petrochemical prospecting). Perhaps the best known supercomputer manufacturer is Cray Research.
Mainframe was a term originally referring to the cabinet containing the central processor unit or "main frame" of a room-filling Stone Age batch machine. After the emergence of smaller "minicomputer" designs in the early 1970s, the traditional big iron machines were described as "mainframe computers" and eventually just as mainframes. Nowadays a Mainframe is a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. The chief difference between a supercomputer and a mainframe is that a supercomputer channels all its power into executing a few programs as fast as possible, whereas a mainframe uses its power to execute many programs concurrently. In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe. The distinction between small mainframes and minicomputers is vague, depending really on how the manufacturer wants to market its machines.


Minicomputer

It is a midsize computer. In the past decade, the distinction between large minicomputers and small mainframes has blurred, however, as has the distinction between small minicomputers and workstations. But in general, a minicomputer is a multiprocessing system capable of supporting from up to 200 users simultaneously.


Workstation

It is a type of computer used for engineering applications (CAD/CAM), desktop publishing, software development, and other types of applications that require a moderate amount of computing power and relatively high quality graphics capabilities. Workstations generally come with a large, high-resolution graphics screen, at large amount of RAM, built-in network support, and a graphical user interface. Most workstations also have a mass storage device such as a disk drive, but a special type of workstation, called a diskless workstation, comes without a disk drive. The most common operating systems for workstations are UNIX and Windows NT. Like personal computers, most workstations are single-user computers. However, workstations are typically linked together to form a local-area network, although they can also be used as stand-alone systems.
N.B.: In networking, workstation refers to any computer connected to a local-area network. It could be a workstation or a personal computer.


Personal computer:

It can be defined as a small, relatively inexpensive computer designed for an individual user. In price, personal computers range anywhere from a few hundred pounds to over five thousand pounds. All are based on the microprocessor technology that enables manufacturers to put an entire CPU on one chip. Businesses use personal computers for word processing, accounting, desktop publishing, and for running spreadsheet and database management applications. At home, the most popular use for personal computers is for playing games and recently for surfing the Internet.
Personal computers first appeared in the late 1970s. One of the first and most popular personal computers was the Apple II, introduced in 1977 by Apple Computer. During the late 1970s and early 1980s, new models and competing operating systems seemed to appear daily. Then, in 1981, IBM entered the fray with its first personal computer, known as the IBM PC. The IBM PC quickly became the personal computer of choice, and most other personal computer manufacturers fell by the wayside. P.C. is short for personal computer or IBM PC. One of the few companies to survive IBM's onslaught was Apple Computer, which remains a major player in the personal computer marketplace. Other companies adjusted to IBM's dominance by building IBM clones, computers that were internally almost the same as the IBM PC, but that cost less. Because IBM clones used the same microprocessors as IBM PCs, they were capable of running the same software. Over the years, IBM has lost much of its influence in directing the evolution of PCs. Therefore after the release of the first PC by IBM the term PC increasingly came to mean IBM or IBM-compatible personal computers, to the exclusion of other types of personal computers, such as Macintoshes. In recent years, the term PC has become more and more difficult to pin down. In general, though, it applies to any personal computer based on an Intel microprocessor, or on an Intel-compatible microprocessor. For nearly every other component, including the operating system, there are several options, all of which fall under the rubric of PC
Today, the world of personal computers is basically divided between Apple Macintoshes and PCs. The principal characteristics of personal computers are that they are single-user systems and are based on microprocessors. However, although personal computers are designed as single-user systems, it is common to link them together to form a network. In terms of power, there is great variety. At the high end, the distinction between personal computers and workstations has faded. High-end models of the Macintosh and PC offer the same computing power and graphics capability as low-end workstations by Sun Microsystems, Hewlett-Packard, and DEC.
III, Personal Computer Types
Actual personal computers can be generally classified by size and chassis / case. The chassis or case is the metal frame that serves as the structural support for electronic components. Every computer system requires at least one chassis to house the circuit boards and wiring. The chassis also contains slots for expansion boards. If you want to insert more boards than there are slots, you will need an expansion chassis, which provides additional slots. There are two basic flavors of chassis designs–desktop models and tower models–but there are many variations on these two basic types. Then come the portable computers that are computers small enough to carry. Portable computers include notebook and subnotebook computers, hand-held computers, palmtops, and PDAs.

Tower model

The term refers to a computer in which the power supply, motherboard, and mass storage devices are stacked on top of each other in a cabinet. This is in contrast to desktop models, in which these components are housed in a more compact box. The main advantage of tower models is that there are fewer space constraints, which makes installation of additional storage devices easier.

Desktop model

A computer designed to fit comfortably on top of a desk, typically with the monitor sitting on top of the computer. Desktop model computers are broad and low, whereas tower model computers are narrow and tall. Because of their shape, desktop model computers are generally limited to three internal mass storage devices. Desktop models designed to be very small are sometimes referred to as slimline models.

Notebook computer

An extremely lightweight personal computer. Notebook computers typically weigh less than 6 pounds and are small enough to fit easily in a briefcase. Aside from size, the principal difference between a notebook computer and a personal computer is the display screen. Notebook computers use a variety of techniques, known as flat-panel technologies, to produce a lightweight and non-bulky display screen. The quality of notebook display screens varies considerably. In terms of computing power, modern notebook computers are nearly equivalent to personal computers. They have the same CPUs, memory capacity, and disk drives. However, all this power in a small package is expensive. Notebook computers cost about twice as much as equivalent regular-sized computers. Notebook computers come with battery packs that enable you to run them without plugging them in. However, the batteries need to be recharged every few hours.

Laptop computer
A small, portable computer -- small enough that it can sit on your lap. Nowadays, laptop computers are more frequently called notebook computers.

Subnotebook computer

A portable computer that is slightly lighter and smaller than a full-sized notebook computer. Typically, subnotebook computers have a smaller keyboard and screen, but are otherwise equivalent to notebook computers.

Hand-held computer

A portable computer that is small enough to be held in one’s hand. Although extremely convenient to carry, handheld computers have not replaced notebook computers because of their small keyboards and screens. The most popular hand-held computers are those that are specifically designed to provide PIM (personal information manager) functions, such as a calendar and address book. Some manufacturers are trying to solve the small keyboard problem by replacing the keyboard with an electronic pen. However, these pen-based devices rely on handwriting recognition technologies, which are still in their infancy. Hand-held computers are also called PDAs, palmtops and pocket computers.

Palmtop

A small computer that literally fits in your palm. Compared to full-size computers, palmtops are severely limited, but they are practical for certain functions such as phone books and calendars. Palmtops that use a pen rather than a keyboard for input are often called hand-held computers or PDAs. Because of their small size, most palmtop computers do not include disk drives. However, many contain PCMCIA slots in which you can insert disk drives, modems, memory, and other devices. Palmtops are also called PDAs, hand-held computers and pocket computers.

PDA

Short for personal digital assistant, a handheld device that combines computing, telephone/fax, and networking features. A typical PDA can function as a cellular phone, fax sender, and personal organizer. Unlike portable computers, most PDAs are pen-based, using a stylus rather than a keyboard for input. This means that they also incorporate handwriting recognition features. Some PDAs can also react to voice input by using voice recognition technologies. The field of PDA was pioneered by Apple Computer, which introduced the Newton MessagePad in 1993. Shortly thereafter, several other manufacturers offered similar products. To date, PDAs have had only modest success in the marketplace, due to their high price tags and limited applications. However, many experts believe that PDAs will eventually become common gadgets.
PDAs are also called palmtops, hand-held computers and pocket computers.

Thursday, 23 March 2017

Study notes on "MODERN PERIODIC TABLE"

Friday, 17 March 2017

Study notes on "MODERN PERIODIC TABLE"

Dear Readers,


SSC CGL 2017 Pre exam in scheduled in the month of June/July 2017. At SA, We are providing to you the NOTES ON GENERAL SCIENCE, these notes will help you build your basic understanding of all topics and you'll be able to score maximum marks in SSC CGL Pre exam. Study, Revise and Learn all these notes by heart. 

MODERN PERIODIC TABLE


VALENCY

Valency may be defined as “the combining capacity of the atom of an element with atoms of other elements in order to acquire the stable configuration (i.e. 8 electron in valence shell. In some special cases it is 2 electrons).”

ATOMIC SIZE

It refers to the distance between the centre of nucleus of an isolated atom to its outermost shell containing electrons.


The atomic radius decreases on moving from left to right along a period. This is due to an increase in nuclear charge which tends to pull the electrons closer to the nucleus and reduces the size of the atom.

In a group atomic size increases from top to bottom due to increase in number of shells.

METALLIC AND NON-METALLIC PROPERTIES



  • In a period from left to right metallic nature decreases while non-metallic character increases.
  • In a group metallic character increases from top to bottom while non-metallic character decrease.
ELECTRONEGATIVITY

The relative tendency of an atom to attract the shared pair of electrons towards itself is called electronegativity.


In a period from left to right, the value of electronegativity increases while in a group from top to bottom the value of electronegativity decreases.


IONIZATION ENERGY

The ionization energy (IE) is the amount of energy required to remove the most loosely bound electron, the valence electron, of an isolated gaseous atom to form a cation.

In a period from left to right, the value of ionization energy increases while in a group from top to bottom the value of ionization energy decreases.

ELECTRON AFFINITY

The electron affinity of an atom or molecule is defined as the amount of energy released or spent when an electron is added to a neutral atom or molecule in the gaseous state to form a negative ion.


In a period from left to right, the value of electron affinity increases while in a group from top to bottom the value of electron affinity decreases.

Important Ancient Books on Science and Medicine

Important Ancient Books on Science and Medicine For SSC CGL EXAM

ATHARVAVEDA (1000 BCE) Treatise on health, longevity, and curative treatment. Hygiene, dietetics, and beneficial effects of milk have also been elaborately dealt with.

BHELA SAMHITA (800 BCE) A codification of medicine scattered in the Vedas.  Atreya is known as the writer of Bhela Samhita

AGNIVESA SAMHITA (700 BCE) A codification of medicine by Agnivesa (a disciple of Atreya - founder of Ayurveda).  

KASHYAP SAMHITA (600 BCE) Deals with paediatrics.
  
CHIVARAVASTU (500 BCE) Mentions the court physician of Bimbisara (King of Magadha) as a marvelous physician and surgeon. Describes difficult surgical operations e.g. opening of the brain and eye surgery. 

HIPPOCRATIC OATH (460 TO 370 BCE) Hippocrates is considered to be the father of western medicine. The Oath is thought to have been written by the Greek physician Hippocrates. In some medical colleges around the world this oath is taken by graduating doctors. 

HUANGDI NEICHING (450 BCE) The first book on medicine in China. 

CHARAKA SAMHITA (100 CE) A classical exposition of Indian medicine. It deals with almost all branches of medicine. 

CELSUS (100 TO 200 CE) A treatise on medicine and surgery from Alexandria and Rome.
  
SUSRUTA SAMHITA (200 TO 300 CE) A treatise on Ayurveda like the Charaka Samhita. Susruta is described as a disciple of Dhanwantari. 

VAGHATA (500 TO 600 CE) A concise and scientific exposition of Ayurveda in verse from. It is distinguished by its knowledge of chemical reactions and laboratory processes etc.

VEDUKUNTA (600 TO 750 CE) A tratise on the rasa chikitsa system of ancient medicine, which considers mercury as the king of all medicines. It explains various preparations of mercury and other metals, alloys, metallic compounds, salts, and sulphur. 

MADHAVACHARAYA (700 TO 800 CE) A  compilation from earlier works of Agnivesa, Charaka, Susruta, and Vaghata and is famous all over India as the best treatise on Ayurveda and diagnosis of disease.  

Important Newspapers for Governments Exam

Important Newspapers for Governments Exam

Important Newspapers 

1. Al-Ahram - Egypt 

2. Izvestia - Russia 

3. The Dawn - Pakistan 


4. Daily News - USA

5. Daily Telegraph - UK

6. Aftonbladet - Sweden 

7. The Daily Mirror - UK

8. The Times - UK

9. The Guardian - UK

10. New Statesman - UK

11. New York Times - USA

12. Pakistan Times - Pakistan 

13. Pravda - Russia 

14. People’s Daily - China 

15. Merdeka - Indonesia 

16. Le Monde - France 

17. Wall Street Journal - USA

18. Clarin - Argentina 

19. The Age - Australia 

20. Gulf Daily News - Bahrain 

21. Correio Braziliense - Brazil 

22. Chronical-Herald - Canada 

23. China Daily - China 

24. Middle East times - Egypt 

25. Courier International - Germany 

26. The Jakarta Post - Indonesia 

27. Tehran Times - Iran 

28. Globes - Israel 

29. La Repubblica - Italy 

30. Asahi Shimbun - Japan 

31. El Universal - Mexico 

32. Gazeta Wyborcza - Poland 

33. O’Independente - Portugal 

34. Gulf Times - Qatar 

35. Gazeta - Russia 

36. Politika - Serbia 

37. El Mundo - Spain 

38. Aksam - Turkey  

Important Facts of SIKH GURU

Important Facts of SIKH GURU



Founder of Sikh religion: Guru Nanak



SIKH GURU’S

1. Guru Nanak
Birth : Talwandi (Pakistan)
Death : Kartarpur
First guru of Sikh
Founder of Sikh religion
Ibrahim Lodi : Same time period
Follower : Lehna


2. Guru Angad (Lehna renamed)
Developed Gurumukhi script
Continued Lunger system

3. Guru Amardas
Third Guru of Sikh religion
Contemporary of Akbar
22 рдЧрдж्рджिрдпो рдХा рдиिрд░्рдоाрдг

4. Ramdas (son-in-law Guru Amardas)
Contemporary of Akbar
Founder of Amritsar city (land provided by Akbar)
Make the post of Guru hereditary

5. Guru Arjundev
He constructed Amritsar pool
He constructed Harmindar sahib (Golden temple)
He wrote ‘Aadigranth’ in 1604.
Jahangir executed him in 1606.

6. GURU HARGOBIND
Change Sikh's in fighting community
He constructed ‘Akaltakhta’.
Permitted his followers for “Non-veg”.
Jahangir put him into prison for 2 years in Gwalior

7.GURU HAR RAI

8.GURU  HAR KISHAN

9. GURU TEG BAHADUR
Aurangjeb executed him.

10. GURU GOBIND SINGH
Last (10th) guru
Birth : Patna
1699 : Founder of Khalsa Panth (Pure)
Five ‘рдХ’ – рдХреЬा, рдлेрд╢, рдХंрдШा, рдХрддाрд░, рдХрдЪ्рдЫा
Muazzam provide him a ‘mansab’
He abolished the concept of guru and vested the concept of guru in guru Granth sahib.
Death

HISTORY NOTES: MUGHAL DYNASTY ( Part-I)


HISTORY NOTES: MUGHAL DYNASTY ( Part-I)


MUGHAL DYNASTY

Babur (AD 1526-1530)
BIRTH:1483 Fargana(Afganistan) Father-Umer sheikh Mirja, Mother-Kutlug nigar( Mangol)
Founder of Mughal empire, who introduced gunpowder in India 
defeated Ibrahim Lodhi in the First Battle of Panipat (AD 1526)
Rana Sanga (Sangram Singh) at Battle of Khanwa (AD 1527) 
Medini Rai of Chanderi at Battle of Chanderi (AD
1528) 
 Mahmud Lodi at Battle of Ghagra (AD 1529) (Last war of the Babur)
He wrote Tuzuk-i-Baburi (Autobiography of Babur) in the Turkish language.
Babur declared Jehad and adopted the title, Ghazi(After the Khanva War)
According to  Tuzuk-i-Baburi, Babur Died in 1530 in Lahore and buried at Aram Bagh (Agra). Later his body was taken to Afghanistan (Kabul).

Humayun (AD 1530-1556)
Built Dinpanah at Delhi as his second capital.
Sher Shah Suri gradually gained power. He fought two battles with Humayun – Battle of Chausa (AD 1539) and another Battle of Kannauj (AD 1540) culminating in Humayun’s defeat
Humayun passed 15 years in exile; again invaded India in 1555 with the help of his officer Bairam Khan.
Died in AD 1556 due to a fall from his library building’s stairs
 Gulbadan Begum, Humayun’s half-sister wrote Humayun-nama.
 After battle of Chausa Sher khan adapted a title, SHER SHAH SURI
Biography of Humayun-HUMAYUNAMA 

Akbar (AD 1556-1605)
Mother-Hamida Bano Began
Coronated at the young age of 14 by Bairam Khan
Defeated Hemu at the Second Battle of Panipat (AD 1556) with the help of Bairam Khan Conquered Malwa (AD 1561) defeating Baz Bahadur followed by Garh-Katanga (ruled by Rani Durgawati), Chittor (AD 1568), Ranthambhor and Kalinjar (AD 1569), Gujarat (AD 1572), Mewar (Battle of Haldighati, AD 1576 Akbar and Rana Pratap), Kashmir (AD 1586), Sindh (AD 1593) and Asirgarh (AD 1603).
 Buland Darwaza was constructed at Fatehpur Sikri after victory over Gujarat in AD 1572.
Married to Harkha Bai, daughter of Rajput ruler Bharmal
Ralph Fitch (in AD 1585) was the first Englishman to visit Akbar’s court.
Abolished Jaziyah (AD 1564)
Believed in Sulh-i-Kul (peace to all), built Ibadat Khana (Hall of prayer) at Fetehpur Sikri; issued ‘Degree of Infallibility (AD 1579); formulated religious order Din-i-Ilahi (AD 1582). Birbal was the first to embrace it.
Land revenue system was called Todar Mal Bandobast or Zabti System measurement of land, classification of land and fixation of rent; and introduced Mansabdari System (holder of rank) to organise nobility and army.
The Navratnas included Todar Mal, Abul Fazal, Faizi, Birbal, Tansen, Abdur Rahim Khana-i-Khana, Mullah-do-Pyaza, Raja Man Singh and Fakir Aziao-Din.

Jahangir (AD 1605-1627)
Executed the fifth Sikh guru, Guru Arjun Dev.
Greatest failure was the loss of Kandahar to Persia in AD 1622.
Married Mehr-un-Nisa in AD 1611 and conferred the title of Nurjahan on her; He established Zanjir-i-Adal at Agra Fort for the seekers of royal justice.
Captain Hawkins and Sir Thomas Roe visited his court.
Famous painters in his court-Abdul Hassan, Ustad Mansur and Bishandas.

Shahjahan (AD 1628-1658)
Annexed Ahmadnagar while Bijapur and Golconda accepted his overlordship.
Secured Kandahar (AD 1639).
Two Frenchmen, Bernier and Tavernier and an Italian adventurer Manucci visited his court.

Built Moti Masjid and Taj Mahal at Agra, Jama Masjid and Red Fort at Delhi. His reign is considered the Golden Age of the Mughal empire.

Google’s Photoscan App Turns Your Phone Into A Photo Scanner

This Simple Hacks Allows Hackers To Listen to Your Facebook Messenger Voice Messages

Both FB Messenger and Facebook-owned WhatsApp allow users to send voice messages using the Mic icon in the chat bar. While many don’t use the Facebook Messenger voice message feature, it is still very popular. But next time you send a voice message to your near and dear ones or a business colleague, do remember that your voice chat can be snooped on by potential hackers thanks to a Man-in-the-Middle (MiTM) vulnerability.
The Hacker News reports that an Egyptian security researcher Mohamed A. Baset has found a vulnerability in Facebook Messenger’s audio clip recording feature that allows any wannabe hacker to listen in to the message. The FB Messenger flaw allows any hacker to conduct a MiTM attack and grab your audio clip files from Facebook’s server.

How does a Hacker listen to your Facebook voice message?

The Facebook Messenger voice chat flaw is so simple that a hacker with minimum technical skill can exploit it. Whenever a person records an audio clip and sends it to some other person, the clip is uploaded to Facebook’s CDN server for example https://z-1-cdn.fbsbx.com/…, from where it serves the same audio file, over HTTPS, to both the sender as well as the receiver.

Now, any attacker sitting on your network, running MITM attack with SSL Strip, can actually extract absolute links (including secret authentication token embedded in the URL) to all audio files exchanged between sender and receiver during that process.
Then, the attacker downgrades those absolute links from HTTPS to HTTP, allowing the attacker to direct download those audio files without any authentication.

Baset explains that the issue lies in the way the chat is exchanged over HTTPS to HTTP servers. Facebook is yet to implement a highly secure transport protocol called HSTS. HSTS (HTTP Strict Transport Security) forces browsers to access a website only over an HTTPS connection while disallowing communication between a secured and unsecured web server. In this case, Facebook is yet to roll out HSTS policy for its chat servers. The issue is worsened due to the fact that Facebook also lacks proper authentication allowing any hacker to launch a MiTM attack and snoop on the voice chat.
Here’s a proof-of-concept video of the Facebook voice messages CDN hack:


Facebook Has Still Not Patched This Bug

Though the FB voice chat vulnerability looks critical, Facebook is yet to patch it. Baset has informed Facebook security engineers about the vulnerability long back. While Facebook engineers have acknowledged the bug, it didn’t offer any bug bounty to Baset neither has it patched the bug. “The fact that we have not rolled it (HSTS) out on particular subdomains does not constitute a valid report under our program,” the company said.

“In general, sending in reports that claim we should be using defense-in-depth mechanisms like HSTS will not qualify under our program. We make very deliberate decisions about when we roll out (or not) particular protections and so reports suggesting that we make changes there generally do not qualify,” It added.
We have contacted Facebook security team for the comments on this vulnerbility and will update the artice accordingly.

Which operating system do ‘professional’ hackers use?

Which operating system do ‘real’ hackers use?

Which operating system do the ‘real’ hackers use? The real here is the cyber criminal type hackers and hacktivists and not security researchers and white hat hackers. You can call these ‘real’ hackers black or gray hat hackers as they use their skill sets against the government, media organizations, and companies either for profit or as a protest.  These black had hackers have to use such operating system which can’t ever be traced back to them and at the same time offers them best hacking tools and features.

So which operating system do such black hat or gray hat hackers use?

While there may be thousands of blog posts which say that hackers prefer Linux operating system for their black hat hacking operations, it is proved that it may not be so. Many of the high-risk hacking show that some “real hackers” run MS windows to hide in plain sight. Windows, which is the required but hated target for most hackers, enables hackers to work with Windows-only environments, such as .NET framework, Windows-based malware, virus or trojan. They use cheap burner laptop bought from Craigslist to build a light weight bootable ghost image and which can’t be traced back to them. These type of burner laptops have USB and SD card for memory options.  This makes it easier to hide, destroy or even swallow if needed.
Many of them go a step further and create read-only partitions for the OS and second writable space for limited persistent local storage. Some paranoid types add a hotkey panic button for quick RAM scrubbing and running a SysRq-trigger to avoid any trace back to them.

The new smaller bootable ghost OS image is then written out to an encrypted SD card. The burner laptop is dismantled and thoroughly destroyed. Hackers pay special attention to the physical destruction of the hard drive, network card, and RAM. Sometimes they use even use a blowtorch or sledgehammer can do destroy such computers.
While some of the black hat hackers prefer Windows OS, many others opt for following Linux distros :

1. Kali Linux
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni and Devon Kearns of Offensive Security developed it by rewriting BackTrack. Kali Linux is the most versatile and advanced penetration testing distro. Kali updates its tools and it is available for many different platforms like VMware and ARM.
2. Parrot-sec forensic os
Parrot Security is an operating system based on Debian GNU/Linux mixed with Frozenbox OS and Kali Linux in order to provide the best penetration and security testing experience. it is an operating system for IT security and penetration testing developed by the Frozenbox Dev Team. It is a GNU/Linux distribution based on Debian and mixed with Kali.

3. DEFT
Deft is Ubuntu customization with a collection of computer forensic programs and documents created by thousands of individuals, teams, and companies. Each of these works might come under a different license. There Licence Policy describe the process that we follow in determining which software we will ship and by default on the DEFT install CD.
4. Live Hacking OS
Live Hacking OS is also based on Linux which has a big package of hacking tools useful for ethical hacking or penetration testing. It includes the graphical user interface GNOME inbuilt. There is a second variation available which has command line only, and it has very fewer hardware requirements.
5. Samurai Web Security Framework
The Samurai Web Testing Framework is a live Linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.
8. Network Security Toolkit (NST)
Network Security Toolkit (NST) is a bootable live CD based on Fedora Core. The toolkit was designed to provide easy access to best-of-breed open source network security applications and should run on most x86 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of open source network security tools.
9. NodeZero
It is said the necessity is the mother of all inventions, and NodeZero Linux is no different. The NodeZero team consists of testers and developers who have put together this amazing distro. Penetration Testing distributions tend to have historically utilized the “Live” system concept of Linux, which really means that they try not to make any permanent effects to a system. Ergo all changes are gone after reboot and run from media such as discs and USB’s drives. However, all that may come handy for occasional testing, its usefulness can be depleted when you are testing regularly. It is also believed that “Live System’s” just don’t scale well in a robust testing environment.
9. Pentoo
Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64-bit installable live cd. Pentoo is also available as an overlay for an existing Gentoo installation. It features packet injection patched wifi drivers, GPGPU cracking software, and lots of tools for penetration testing and security assessment. The Pentoo kernel includes GRsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.
10. GnackTrack
GnackTrack is an open and free project to merge penetration testing tools and the Linux Gnome desktop. GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu.
GnackTrack comes with multiple tools that are really helpful for effective penetration testing, it has Metasploit, Armitage, W3AF and others wonderful tools.
11. Blackbuntu
Blackbuntu is a Linux distro specifically for penetration testing which was specially designed for security training students and practitioners of information security. Blackbuntu is penetration testing distribution with GNOME Desktop Environment. It’s currently being built using the Ubuntu 10.10 and work on reference Back|Track.
12. Knoppix STD
Knoppix STD (Security Tools Distribution) is a Live CD Linux distribution based on Knoppix that focused on computer security tools. It included GPL licensed tools in the following categories: authentication, password cracking, encryption, forensics, firewalls, honeypots, intrusion detection system, network utilities, penetration, packet sniffers, assemblers, vulnerability assessment and wireless networking. Knoppix STD version 0.1 was published January 24, 2004, on Knoppix 3.2. Thereafter, the project stagnated, lacking updated drivers and packages. A release date for version 0.2 has not yet been announced. A list of tools is available on the official website.
13. Weakerth4n
Weakerth4n is a penetration testing distribution which is built from Debian Squeeze. For the desktop environment, it uses Fluxbox.This operating system is ideal for WiFi hacking as it contains plenty of Wireless tools. It has a very well maintained website and a devoted community. Built from Debian Squeeze (Fluxbox within a desktop environment) this operating system is particularly suited for WiFi hacking as it contains plenty of Wireless cracking and hacking tools.
Tools include: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing Android Hacking, Networking and creating Shells.
14. Cyborg Hawk
Many hackers think this is the most advanced, powerful and yet beautiful penetration testing distribution ever created. Lined up with the ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. It has 700 + tools while Kali has 300+ and also dedicated tools for and menu for mobile security and malware analysis . Also, it is easy to compare it with Kali as to make a better OS than Kali . It is a new operating system based on Ubuntu Linux.
It is now clear that black hat hackers mostly use Linux but have to use Windows as their targets are always on Windows run environment. Though that is changing with most financial firms now moving to Linux based servers. Also, Mac OS X is not a popular target for malware and hacking attempts, because it is neither the most famous server (Linux) nor the most famous client (Windows), giving hackers that use it a [false]sense of security.

Hackers Can Listen to your Facebook Messenger Voice Messages With This Simple Hack

This Simple Hacks Allows Hackers To Listen to Your Facebook Messenger Voice Messages

Both FB Messenger and Facebook-owned WhatsApp allow users to send voice messages using the Mic icon in the chat bar. While many don’t use the Facebook Messenger voice message feature, it is still very popular. But next time you send a voice message to your near and dear ones or a business colleague, do remember that your voice chat can be snooped on by potential hackers thanks to a Man-in-the-Middle (MiTM) vulnerability.
The Hacker News reports that an Egyptian security researcher Mohamed A. Baset has found a vulnerability in Facebook Messenger’s audio clip recording feature that allows any wannabe hacker to listen in to the message. The FB Messenger flaw allows any hacker to conduct a MiTM attack and grab your audio clip files from Facebook’s server.

How does a Hacker listen to your Facebook voice message?

The Facebook Messenger voice chat flaw is so simple that a hacker with minimum technical skill can exploit it. Whenever a person records an audio clip and sends it to some other person, the clip is uploaded to Facebook’s CDN server for example https://z-1-cdn.fbsbx.com/…, from where it serves the same audio file, over HTTPS, to both the sender as well as the receiver.

Now, any attacker sitting on your network, running MITM attack with SSL Strip, can actually extract absolute links (including secret authentication token embedded in the URL) to all audio files exchanged between sender and receiver during that process.
Then, the attacker downgrades those absolute links from HTTPS to HTTP, allowing the attacker to direct download those audio files without any authentication.

Baset explains that the issue lies in the way the chat is exchanged over HTTPS to HTTP servers. Facebook is yet to implement a highly secure transport protocol called HSTS. HSTS (HTTP Strict Transport Security) forces browsers to access a website only over an HTTPS connection while disallowing communication between a secured and unsecured web server. In this case, Facebook is yet to roll out HSTS policy for its chat servers. The issue is worsened due to the fact that Facebook also lacks proper authentication allowing any hacker to launch a MiTM attack and snoop on the voice chat.
Here’s a proof-of-concept video of the Facebook voice messages CDN hack:


Facebook Has Still Not Patched This Bug

Though the FB voice chat vulnerability looks critical, Facebook is yet to patch it. Baset has informed Facebook security engineers about the vulnerability long back. While Facebook engineers have acknowledged the bug, it didn’t offer any bug bounty to Baset neither has it patched the bug. “The fact that we have not rolled it (HSTS) out on particular subdomains does not constitute a valid report under our program,” the company said.

“In general, sending in reports that claim we should be using defense-in-depth mechanisms like HSTS will not qualify under our program. We make very deliberate decisions about when we roll out (or not) particular protections and so reports suggesting that we make changes there generally do not qualify,” It added.
We have contacted Facebook security team for the comments on this vulnerbility and will update the artice accordingly.

рооூроЯ்роЯுро╡ро▓ிропைропுроо் рооுродுроХுро╡ро▓ிропைропுроо் рооாропрооாроХ்роХுроо் роТро▒்ро▒ை роКроЪி! роТро░ு рокுродுрооை роЪிроХிроЪ்роЪை



рооூроЯ்роЯுро╡ро▓ிропைропுроо் рооுродுроХுро╡ро▓ிропைропுроо் рооாропрооாроХ்роХுроо் роТро▒்ро▒ை роКроЪி! роТро░ு рокுродுрооை роЪிроХிроЪ்роЪை


  ро╡ро▓ிропிро▓்ро▓ாрод ро╡ாро┤்роХ்роХைродாрой் роОро▓்ро▓ோро░ுроЯைроп ро╡ிро░ுрок்рокрооுроо்! роЖройாро▓் роЕройேроХроо் рокேро░ுроХ்роХு роЕродு ро╡ாроп்рок்рокродிро▓்ро▓ை. роОрок்рокோродுрооோ, роОрок்рокோродாро╡родோ роПродேройுроо் роТро░ு ро╡ро▓ி ро╡ிро░роЯ்роЯ... родро▒்роХாро▓ிроХ роиிро╡ாро░рогрод்родுроЯрой் роЕродை роЪроХிрод்родுроХ் роХொрог்роЯு ро╡ாро┤рок் рокро┤роХுроХிро▒ро╡ро░்роХро│ே роЕродிроХроо்.

роЖройாро▓், ‘роОрои்род ро╡ро▓ிропுроо் роЗрок்рокроЯி роЕро▓роЯ்роЪிропрок்рокроЯுрод்родроХ் роХூроЯிропродро▓்ро▓. ро╡ро▓ி роОрой்рокродே роТро░ு роиோроп்’ роОрой்ро▒ு роОроЪ்роЪро░ிроХ்роХிро▒ாро░் ро╡ро▓ி роиிро░்ро╡ாроХ рооро░ுрод்родுро╡ роиிрокுрогро░ாрой рокிро░рокு родிро▓роХ். ро╡ро▓ி роПрой்? роЕродு роЪொро▓்ро▓ ро╡ро░ுроо் роЕрокாроп роЕро▒ிро╡ிрок்рокு роОрой்рой? ро╡ро▓ிропை рооாропрооாроХ்роХுроо் ро▓ேроЯ்роЯро╕்роЯ் роУро╕ோрой் роКроЪி роЪிроХிроЪ்роЪை... роОрой роЪроХро▓род்родைропுроо் рокро▒்ро▒ிрок் рокேроЪுроХிро▒ாро░் роЕро╡ро░்.

‘‘роиிро▒ைроп рокேро░ு ‘ропாро░ுроХ்роХுрод்родாрой் ро╡ро▓ி роЗро▓்ро▓ை’ройு роЕро▓роЯ்роЪிропрок்рокроЯுрод்родро▒ாроЩ்роХ. роЕрок்рокроЯி ро▓ேроЪிро▓ ро╡ிроЯро▒ ро╡ிро╖ропрооிро▓்ро▓ை ро╡ро▓ி. ро╡ро▓ி роЗро░ுрои்родா, роЕродுроХ்роХொро░ு роХாро░рогрооுроо் роЗро░ுроХ்роХுроо். роЙроЯроо்рокுроХ்роХுро│்ро│ роПродோ роХோро│ாро▒ுроЩ்роХிро▒родுроХ்роХாрой роЕро▓ாро░роо்родாрой் ро╡ро▓ி! роЕродுроХ்роХாрой роЪிроХிроЪ்роЪைроЩ்роХро▒родு ро╡ро▓ிропை роороЯ்роЯுроо் роиிро▒ுрод்родро▒ роЪிроХிроЪ்роЪைропா роЗро░ுроХ்роХроХ்роХூроЯாродு; ро╡ро▓ிроХ்роХு роОрой்рой роХாро░рогроо்ройு роХрог்роЯுрокிроЯிроЪ்роЪு, роЕрои்род роХாро░рогрод்родுроХ்роХு роиிро╡ாро░рогроо் родро░்ро▒родா роЗро░ுроХ்роХрогுроо். роЕродைрок் рокுро░ிроЮ்роЪுроХ்роХாроо, родро▒்роХாро▓ிроХ роиிро╡ாро░рогроо் рооூро▓рооா роЕродை роЕроЯроХ்роХி ро╡ைроХ்роХிро▒родாро▓, рокிрой்ройாро│ிро▓் рокிро░роЪ்ройை рокெро░ிроЪாроХро▓ாроо். ро╡ро▓ிроХ்роХாрой рооூро▓род்родைропுроо், роХாро░рогрод்родைропுроо் родெро░ிроЮ்роЪுроХ்роХிроЯ்роЯு, роЕродுроХ்роХாрой роЪро░ிропாрой роЪிроХிроЪ்роЪை роОроЯுрод்родுроХ்роХрогுроо். роЗродை роЕро▒ிро╡ுро▒ுрод்родро▒родுродாрой் ро╡ро▓ி роиிро░்ро╡ாроХрод்родோроЯ роЪிро▒рок்рокроо்роЪроо்.

ро╡ெро│ிроиாроЯுроХро│்ро▓ ро╡ро▓ி роиிро░்ро╡ாроХрод் родுро▒ைропுроо், ро╡ро▓ி роиிро░்ро╡ாроХ рооро░ுрод்родுро╡ро░்роХро│ுроо் рокிро░рокро▓роо். роЖройா роироо்рооூро░்ро▓ роОроЩ்роХ ро╡ро▓ிроЪ்роЪாро▓ுроо், роЙроЯройே роТро░ு рокெропிрой் роХிро▓்ро▓ро░ை ро╡ாроЩ்роХி рооுро┤ுроЩ்роХро▒родுроо், роХிро░ீроо் родроЯро╡ிроХ்роХிро▒родுрооா роЕро▒ிропாрооைропிро▓родாрой் роЗро░ுроХ்роХாроЩ்роХ роороХ்роХро│். роЕроЯுрод்родроХроЯ்роЯрооா роХுроЯுроо்рок роЯாроХ்роЯро░ை роЕрогுроХுро╡ாроЩ்роХ. роЕро╡роЩ்роХ роТро╡்ро╡ொро░ு рооро░ுрои்родா роХொроЯுрод்родுрок் рокாро░்род்родு, роЕрок்рокுро▒роо் ро╡ேро▒ роТро░ு роЪிро▒рок்рокு рооро░ுрод்родுро╡ро░ுроХ்роХு роЪிрокாро░ிроЪு рокрог்рогி рокாро░்роХ்роХிро▒родுроХ்роХுро│்ро│ роиோроп்роХ்роХாрой роЕроЯிрок்рокроЯை роХாро░рогроо் рооுро▒்ро▒ிроЯுроо். ро╡ро▓ி ро╡рои்родродுроо் роЙроЯройроЯிропா ро╡ро▓ி роиிро░்ро╡ாроХ рооро░ுрод்родுро╡ро░ை роЕрогுроХро▒родுродாрой் роЪро░ி’’ роОрой்роХிро▒ рокிро░рокு родிро▓роХ், рокொродுро╡ாрой роЪிро▓ ро╡ро▓ிроХро│ைрок் рокро▒்ро▒ிропுроо், роЕро╡ро▒்ро▒ுроХ்роХாрой ро▓ேроЯ்роЯро╕்роЯ் роЪிроХிроЪ்роЪைроХро│் рокро▒்ро▒ிропுроо் родொроЯро░்роХிро▒ாро░்.

‘‘ро╕்ро▓ிрок் роЯிро╕்роХ்ройு роЪொро▓்ро▓роХ்роХூроЯிроп рокிро░роЪ்ройை роЗрой்ройிроХ்роХு роиிро▒ைроп роЗро│ைроЮро░்роХро│ை рокாродிроХ்роХுродு. рооுродுроХுрод் родрог்роЯுро▓ 2 роОро▓ுроо்рокுроХро│ுроХ்роХு роЗроЯைропிро▓ роЙро│்ро│ роЪро╡்ро╡ு рооாродிро░ிропாрой рокроХுродி роироХро░்рои்родு рокோро╡родைрод்родாрой் ‘ро╕்ро▓ிрок் роЯிро╕்роХ்’ройு роЪொро▓்ро▒ோроо். роЕрои்род роЪро╡்ро╡ு рокிродுроЩ்роХி ро╡ெро│ிропே ро╡рои்родு рооுродுроХுрод் родрог்роЯோроЯ рокроХ்роХро╡ாроЯ்роЯுро▓ роЙро│்ро│ роиро░роо்рокு рооுройைроХро│ை роЙро░роЪுроо். роЗрок்рокроЯி роЙро░роЪுро╡родாро▓ ро╡ро▓ி роЖро░роо்рокிроХ்роХுродு. роЪрооீрокроХாро▓роо்ро╡ро░ை рооுродுроХுрод் родрог்роЯுро▓ роЙрог்роЯாроХிро▒ роЗродுрокோрой்ро▒ рокிро░роЪ்ройைроХро│ுроХ்роХு роЕро▒ுро╡ை роЪிроХிроЪ்роЪைродாрой் родீро░்ро╡ா роЗро░ுрои்родродு.
роЗрок்рокோ рокுродுроЪா ро╡рои்родிро░ுроХ்роХிро▒ роУро╕ோрой் роЪிроХிроЪ்роЪை рооூро▓рооா роЕро▒ுро╡ை роЪிроХிроЪ்роЪைропைрод் родро╡ிро░்роХ்роХро▓ாроо். ро╡ிроЪேро╖ роХро░ுро╡ி рооூро▓рооா роЖроХ்роЪிроЬройை роУро╕ோройா рооாрод்родி, роЕродை роКроЪிропிро▓ роиிро░рок்рокி, роЪро╡்ро╡ு рокிродுроЩ்роХிрой роЗроЯрод்родைроХ் роХрог்роЯுрокிроЯிроЪ்роЪு роЪெро▓ுрод்родро▒рок்рок, роЕрои்родрок் рокроХுродி роЕрок்рокроЯிропே роЪро░ுроХு рооாродிро░ி ро╡род்родிроЯுроо். рокроХ்роХ ро╡ிро│ைро╡ுроХро│ே роЗро▓்ро▓ாрод роЕро░ுрооைропாрой роЗрои்род роЪிроХிроЪ்роЪை роОрои்род ро╡ропродிройро░ுроХ்роХுроо் роПро▒்ро▒родு. роЯெро▓்ро▓ி роЕроХிро▓ роЗрои்родிроп ро╡ிроЮ்роЮாрой рооро░ுрод்родுро╡роХ் роХро┤роХ рооро░ுрод்родுро╡рооройைропிро▓ роЗрои்род роЪிроХிроЪ்роЪைропை родро░்ро▒ாроЩ்роХ. роЗродேрокோро▓ роЪெрой்ройைропிро▓ுроо் роЗрок்рокோ роЪெроп்ропро▒ோроо்.

роЕродே рооாродிро░ி ‘роЖро╕்роЯிропோ роЖро░்род்ро░ைроЯ்роЯிро╕்’ройு роЪொро▓்ро▓роХ்роХூроЯிроп рооூроЯ்роЯு ро╡ро▓ிроХ்роХுроо், роЗрои்род роУро╕ோрой் роКроЪி роиро▓்ро▓ рокро▓рой் родро░ுроо். рооூроЯ்роЯு рооாро▒்ро▒ு роЕро▒ுро╡ை роЪிроХிроЪ்роЪைродாрой் родீро░்ро╡ுроЩ்роХிро▒ роиிро▓ைропிро▓ роЗро░ுроХ்роХро▒ро╡роЩ்роХро│ுроХ்роХுроХ்роХூроЯ роЕродுроХ்роХு рооாро▒்ро▒ா, роЗрои்род роКроЪிропை рооூроЯ்роЯுро▓ рокோроЯро▓ாроо். роЗрои்род роКроЪிропைрок் рокோроЯ்роЯுроХ்роХிроЯ்роЯு, ро╡ெро▒ுроо் 3 & 4 роорогி роиேро░род்родுроХ்роХுро│்ро│ ро╡ீроЯ்роЯுроХ்роХுрод் родிро░ுроо்рокро▓ாроо். ро╡ро▓ி родро░்ро▒ ро╡ேродройைропோроЯ роироЯроХ்роХрооுроЯிропாроо роироХро░்рои்родு ро╡ро░்ро▒ро╡роЩ்роХ, роЪிро░ிроЪ்роЪுроХ்роХிроЯ்роЯே роироЯрои்родு ро╡ீроЯ்роЯுроХ்роХுрод் родிро░ுроо்рокро▒ роЕродிроЪропрод்родை рооூроЯ்роЯுро▓ рокோроЯро▒ роЗрои்род роУро╕ோрой் роКроЪி роЪிроХிроЪ்роЪை роиிроХро┤்род்родுродு. рооுродுрооை родро░்ро▒ ро╡ேродройைропா роЗройிрооே рооூроЯ்роЯுро╡ро▓ிропை роЪроХிроЪ்роЪுроХ்роХ ро╡ேрог்роЯிроп роЕро╡роЪிропрооிро▓்ро▓ை!

Trigiminal neuralgia Glossopharyngeal neuralgiaройு роЪிро▓ роиோроп்роХро│் роЗро░ுроХ்роХு. роЗродройாро▓ рокாродிроХ்роХрок்рокроЯ்роЯро╡роЩ்роХро│ுроХ்роХு рооுроХрод்родுро▓ рооிрой்роЪாро░ ро╖ாроХ் роЕроЯிроЪ்роЪ рооாродிро░ி роЪுро░ீро░், роЪுро░ீро░்ройு ро╡ро▓ிроХ்роХுроо். рокро▓் родேроп்роХ்роХро╡ோ, роЪாрок்рокிроЯро╡ோ роХூроЯ рооுроЯிропாродு. ро╡ро▓ி роиிро░்ро╡ாроХрод் родுро▒ைро▓ роЗрои்родрок் рокிро░роЪ்ройைроХ்роХாроХро╡ே рокிро░род்ропேроХ роКроЪிроХро│் роЗро░ுроХ்роХு. роЕродைрок் рокோроЯ்роЯா роороЯ்роЯுрооே роиிро╡ாро░рогроо் роХிроЯைроХ்роХுроо்.

‘роГрокைрок்ро░ோрооைропாро▓்роЬிропா’ройு роТро░ு роХрог்роЯிро╖рой் рокெрог்роХро│ை роЕродிроХроо் родாроХ்роХுродு. роОроЩ்роХேропாро╡родு ро╡ро▓ிроХ்роХுродுройு роЪொро▓்ро▓ிроЯ்роЯே роЗро░ுрок்рокாроЩ்роХ. роЖройா роОро▓்ро▓ா роЯெро╕்роЯ்роЯுроо் роиாро░்рооро▓்ройு роХாроЯ்роЯுроо். ро╡ро▓ி роиிро░்ро╡ாроХ роиிрокுрогро░ாро▓ роороЯ்роЯுрои்родாрой் роЗрои்родрок் рокிро░роЪ்ройைропைроХ் роХрог்роЯுрокிроЯிроХ்роХро╡ுроо், роЪро░ிропாрой роЪிроХிроЪ்роЪைропைроХ் роХொроЯுроХ்роХро╡ுроо் рооுроЯிропுроо்’’ роОрой்роХிро▒ роЯாроХ்роЯро░், роХроЯைроЪிропாроХроЪ் роЪொро▓்роХிро▒ ро╡ிро╖ропроо் ро╡ро▓ிропுроЯрой் ро╡ாро┤்роХிро▒ роТро╡்ро╡ொро░ுро╡ро░ுроХ்роХுрооாрой роЕро╡роЪро░ роЕроЯ்ро╡ைро╕்!

‘‘роЪிро▓ рокேро░ுроХ்роХு роЪாрок்рокிроЯ்роЯா ро╡ро▓ி рокро▒рои்родுроЯுроо். роЪிро▓ро░ுроХ்роХு 2 роЯроо்ро│ро░் родрог்рогீро░் роХுроЯிроЪ்роЪாро▓ே ро╡ро▓ி рокோрой рооாродிро░ி роЗро░ுроХ்роХுроо். роЗрой்ройுроо் роЪிро▓ро░ுроХ்роХு роУроп்ро╡ுроо், роиро▓்ро▓ родூроХ்роХрооுроо் ро╡ро▓ிропிро▓ேро░ுрои்родு ро╡ிроЯுродро▓ை родро░ுроо். роЗродு роЪாродாро░рог ро╡ро▓ிропிро▓்ро▓ைройு роОрок்рок рооройроЪுроХ்роХுро│்ро│ роорогி роЕроЯிроХ்роХுродோ, роЕрок்рок роЙроЯройроЯிропா ро╡ро▓ி роиிро░்ро╡ாроХ рооро░ுрод்родுро╡ро░ைрок் рокாро░்роХ்роХрогுроо். роПрой்ройா, ро╡ро▓ிроЩ்роХிро▒родே роТро░ுро╡ிродрооாрой роиோроп்родாрой்!’’

роЕроЯிроХ்роХроЯி роЗро░ுрооро▓ா? роЖро╕்родுрооாро╡ாроХ роЗро░ுроХ்роХро▓ாроо்! рокройிроХ்роХாро▓ рокропроо்

роЕроЯிроХ்роХроЯி роЗро░ுрооро▓ா? роЖро╕்родுрооாро╡ாроХ роЗро░ுроХ்роХро▓ாроо்! рокройிроХ்роХாро▓ рокропроо்


ро╡ெропிро▓ைрок் рокро┤ிрод்род рокро▓ро░ுроХ்роХுроо், роЗрок்рокோродு роХுро│ிро░ைроХ் роХрог்роЯு роЙродро▒ро▓்! ‘роОрод்родройை ро╡ெропிро▓ை ро╡ேрогா рокொро▒ுрод்родுроХ்роХро▓ாроо். роЗрои்родроХ் роХுро│ிро░் рокроЯுрод்родро▒ рокாроЯு родாроЩ்роХро▓ைропே’ роОрой்роХிро▒ рокுро▓роо்рокро▓் рокро░ро╡ро▓ாроХ! роХுро│ிро░் рокроЯுрод்родுроо் рокாроЯுроХро│ிро▓் рокிро░родாройрооாройродு роЕроЯிроХ்роХроЯி родாроХ்роХுроо் роЪро│ி роЗро░ுрооро▓ுроо், рооூроЪ்роЪுрод்родிрогро▒ро▓ுроо். родிро░ுроо்рокிрой рокроХ்роХрооெро▓்ро▓ாроо் родுроо்рооро▓ுроо் роЗро░ுрооро▓ுрооாроХ роХுроЯ்роЯீро╕் рооுродро▓் рокெро░ிропро╡ро░்роХро│் ро╡ро░ை роХுро│ிро░ிрой் рокாродிрок்рокுроХ்роХு ропாро░ுрооே ро╡ிродிро╡ிро▓роХ்роХிро▓்ро▓ை.

‘роКродроХ் роХாрод்родு роПрод்родுроХ்роХро▓ை, роЕродாрой்’ роОрой்ро▒ோ, ‘роХுро│ிро░் роХுро▒ைроЮ்роЪா родாройா роЪро░ிропாропிроЯுроо்’ роОрой்ро▒ோ, роЪுроп роЪрооாродாройрод்родுроЯрой், роЪுроп рооро░ுрод்родுро╡роо் рокாро░்род்родுроХ்роХொрог்роЯு роЕро▓роЯ்роЪிропрооாроХ роЗро░ுрок்рокро╡ро░ா роиீроЩ்роХро│்? рокройிропிрой் рооேро▓் рокро┤ிропைрок் рокோроЯுро╡родை роиிро▒ுрод்родிро╡ிроЯ்роЯு, рокிро░роЪ்ройை роОрой்ройро╡ாроХ роЗро░ுроХ்роХுроо் роОрой ропோроЪிропுроЩ்роХро│்!

‘‘родொроЯро░்роЪ்роЪிропாрой роЪро│ி, роЗро░ுрооро▓் рокிро░роЪ்ройை роЕро▓роЯ்роЪிропрок்рокроЯுрод்родроХ் роХூроЯிропродிро▓்ро▓ை. роЕродு роЙроЯроо்рокுроХ்роХுро│்ро│ роОроЩ்роХропோ рооро▒ைроЮ்роЪிро░ுроХ்роХிро▒ роЖро╕்родுрооா роиோропோроЯ ро╡ெро│ிрок்рокாроЯா роЗро░ுроХ்роХро▓ாроо். ‘роОройроХ்роХு роЖро╕்родுрооாро╡ெро▓்ро▓ாроо் роХிроЯைропாродு. рокройிроХ்роХாро▓род்родுро▓ роороЯ்роЯுроо் ро▓ேроЪா рооூроЪ்роЪிро▒ைроХ்роХுроо்’ройு роЪொро▓்ро▓ிроХ்роХிро▒ро╡роЩ்роХродாрой் роЗрои்род роЪீроЪрой்ро▓ роЕродிроХ роХро╡ройрод்родோроЯ роЗро░ுроХ்роХрогுроо். роПрой்ройா, роЖро╕்родுрооாроЩ்роХிро▒родு рокройிроХ்роХாро▓род்родுро▓ роороЯ்роЯுроо் ро╡ро░்ро▒ роиோропிро▓்ро▓ை. роЕрои்род роЪீроЪрой்ро▓ родீро╡ிро░рооாроХро▓ாроо் роЕро▓்ро▓родு родрой்ройோроЯ роЕро▒ிроХுро▒ிроХро│ைроХ் роХாроЯ்роЯро▓ாроо்’’ роОрой்роХிро▒ாро░் роиெроЮ்роЪроХ роиோроп்роХро│ுроХ்роХாрой роЪிро▒рок்рокு рооро░ுрод்родுро╡ро░் родாрооро╕்.
‘‘роЪுро╡ாроЪроХ்роХுро┤ро▓்роХро│ைрок் рокாродிроХ்роХிро▒ роТро░ு роиோропைрод்родாрой் роЖро╕்родுрооாройு роЪொро▓்ро▒ோроо். роЪுро╡ாроЪроХ்роХுро┤ро▓்роХро│்родாрой் рооூроЪ்роЪுроХ்роХாро▒்ро▒ை роиுро░ைропீро░ро▓ுроХ்роХு роОроЯுрод்родுроЯ்роЯுрок் рокோроХுроо். роЖро╕்родுрооா роЙро│்ро│ро╡роЩ்роХро│ோроЯ роЪுро╡ாроЪроХ்роХுро┤ாроп்роХро│ோроЯ роЙроЯ்роЪுро╡ро░் ро╡ீроЩ்роХி, роХுро▒ுроХிропிро░ுроХ்роХுроо். роЕродройாро▓ роЪாродாро░рогрооா рооூроЪ்роЪு ро╡ிроЯ рооுроЯிропாродு. роЖро╕்родுрооாро╡ுроХ்роХு рооுроХ்роХிроп роХாро░рогроо், роТро░ு ро╡роХை роЬீрой்.

рокெро░ிропро╡роЩ்роХро│ுроХ்роХு ро╡ро░்ро▒ роЖро╕்родுрооாро╡ுроХ்роХு роЪுро▒்ро▒ுроЪ்роЪூро┤ро▓்ро▓ роЙро│்ро│ родூроЪி, рооாроЪு рооாродிро░ிропாрой ро╡ிро╖ропроЩ்роХро│் роХாро░рогрооாроХро▓ாроо். роХுро┤рои்родைроЩ்роХро│ுроХ்роХு ро╡ைро░ро╕் родொро▒்ро▒ு роХாро░рогрооாроХро▓ாроо். роХுро│ிро░்роХாро▓род்родுро▓ роЗрои்род роЕро╡родிроХро│் роЕродிроХрооாроХроХ் роХாро░рогроо், роЗрои்род роЪீроЪрой்ро▓ роЙрог்роЯாроХிро▒ роГрокроЩ்роХро▓் рооро▒்ро▒ுроо் ро╡ைро░ро╕் роЗрой்роГрокெроХ்ро╖рой். роироо்рооூро░்ро▓ роХுро│ிро░் роЖро░роо்рокிроЪ்роЪродுрооே роХாро▒்ро▒ு ро╡ீроЪро▒родு роХроо்рооிропாропிроЯுродு.

родொро▒்ро▒ுроХ் роХிро░ுрооிроХро│் роЕрок்рокроЯிропே родроЩ்роХிроЯுродு. роЕродройாро▓родாрой் роХுро│ிро░்роХாро▓род்родுро▓ рокாродிрок்рокுроХро│் роЕродிроХрооா роЗро░ுроХ்роХு. рокெро░ிропро╡роЩ்роХро│ுроХ்роХு рооூроЪ்роЪுрод்родிрогро▒ро▓ுроо், роХுро┤рои்родைроЩ்роХро│ுроХ்роХு роиிро▒ைроп роЗро░ுрооро▓ுроо் роЗро░ுроХ்роХுроо். роЪிро░рок்рокை роХுроЯிроЪ்роЪுроХ் роХроЯ்роЯுрок்рокроЯுрод்родிроХ்роХிро▒ро╡роЩ்роХ рокро▓ро░். роЖройா, роЗродெро▓்ро▓ாроо் роЖро╕்родுрооாро╡ுроХ்роХாрой роЕро▒ிроХுро▒ிроХро│ா роЗро░ுрои்родா, рокிро▒்роХாро▓род்родுро▓ рокாродிрок்рокு роЕродிроХрооாроХுроо். роиெроЮ்роЪுрок்рокроХுродிроХ்роХாрой роЪிроо்рокிро│ாрой роОроХ்ро╕் ро░ே рооூро▓рооா роЖро╕்родுрооா роЗро░ுроХ்роХாроЩ்роХிро▒родைрод் родெро░ிроЮ்роЪுроХ்роХро▓ாроо். родேро╡ைрок்рокроЯ்роЯா ‘ро╕்рокைро░ோрооெроЯ்ро░ி’ройு роЪொро▓்ро▓роХ்роХூроЯிроп ро╡ிроЪேро╖ роЯெро╕்роЯ் рооூро▓рооா роиுро░ைропீро░ро▓ோроЯ рооொрод்род роХрог்роЯிро╖ройைропுроо் родெро░ிроЮ்роЪுроХ்роХ рооுроЯிропுроо்.

роЖро╕்родுрооா роЙро▒ுродி роЪெроп்ропрок்рокроЯ்роЯா, роХроЯ்роЯுрок்рокாроЯ்роЯுро▓ ро╡ைроХ்роХிро▒родுроХ்роХு роЗрой்ройிроХ்роХு роиிро▒ைроп рооро░ுрои்родுроХро│் роЗро░ுроХ்роХு. роХாро▒்ро▒ுроХ் роХுро┤ாроп்роХро│ை ро╡ிро░ிроХ்роХிро▒родுроХ்роХாрой ‘рокிро░ாроЩ்роХோроЯைро▓ேроЯ்роЯро░்ро╕்’ рооро░ுрои்родுроХро│் роЗро░ுроХ்роХு. роХுро┤рои்родைроХро│ுроХ்роХுрод் родройிропாро╡ுроо், рокெро░ிропро╡роЩ்роХро│ுроХ்роХுрод் родройிропாро╡ுроо் роЗрой்ро╣ேро▓ро░்роХро│் роЗро░ுроХ்роХு.

 роОрои்род роиோроп்роХ்роХுроо் рооро░ுрои்родுроХро│ைрод் родро╡ро▒ாроо роОроЯுрод்родுроХ்роХ ро╡ேрог்роЯிропродு ро░ொроо்рок рооுроХ்роХிропроо். роЖро╕்родுрооா роЗро░ுроХ்роХிро▒родு родெро░ிроЮ்роЪாро▓ுрооே, роЕродு родீро╡ிро░рооாроХிро▒рок்рок роороЯ்роЯுроо் рооро░ுрои்родு роОроЯுрод்родுроХ்роХாроо, роОро▓்ро▓ா роиாро│ுроо் роОроЯுрод்родுроХ்роХிро▒родுродாрой் рокாродுроХாрок்рокாройродு. родூроЪி, рооாроЪு, роХுро│ிро░் роХாро▒்ро▒ு рооாродிро░ிропாрой роОрои்род ро╡ிро╖ропроо் роПрод்родுроХ்роХро▓ைропோ, роЕродுро▓ேро░்рои்родு ро╡ிро▓роХி роЗро░ுроХ்роХ ро╡ேрог்роЯிропродு рооுроХ்роХிропроо்.

 роРро╕்роХிро░ீроо் роЖроХாродு, роХூро▓்роЯ்ро░ிроЩ் роХூроЯாродுроЩ்роХிро▒ рооாродிро░ிропாрой роОродுро╡ுроо் ро╡ிроЮ்роЮாройро░ீродிропா роиிро░ூрокிроХ்роХрок்рокроЯро▓ை. роЖройாро▓ுрооே роХுро│ிро░்роЪ்роЪிропா роЪாрок்рокிроЯро▒родைро╡ிроЯ, роЪூроЯா роЪாрок்рокிроЯро▒родு роЗродрооா роЗро░ுроХ்роХிро▒родாро▓ роЕрок்рокроЯிропே роЪாрок்рокிроЯро▒ோроо். ро╡ропிро▒ு рооுроЯ்роЯ роЪாрок்рокிроЯро▒родை родро╡ிро░்род்родே роЖроХрогுроо்.

 роЕроЯிроХ்роХроЯி ро╡ெрои்роиீро░் роХுроЯிроХ்роХிро▒родு, роЪூрок் роЪாрок்рокிроЯро▒родெро▓்ро▓ாроо் рооройро░ீродிропா роЖро▒ுродро▓் роХொроЯுроХ்роХிро▒ ро╡ிро╖ропроЩ்роХро│். роЪெроп்ропро▒родாро▓ропுроо் родрок்рокிро▓்ро▓ை. роЪெроп்ропாроо ро╡ிроЯ்роЯாро▓ுроо் рокாродроХрооிро▓்ро▓ை’’ роОрой்роХிро▒ாро░் роЯாроХ்роЯро░் родாрооро╕்.

роЖро░்.ро╡ைродேроХி

роХрог்роХро│ைропுроо் родாроХ்роХுрооா роЪிроХ்роХுрой்роХுрой்ропா?

роХрог்роХро│ைропுроо் родாроХ்роХுрооா роЪிроХ்роХுрой்роХுрой்ропா?


роХрог் роОро░ிроЪ்роЪро▓், роЪிро╡рои்родு рокோродро▓், рокாро░்ро╡ை роороЩ்роХிрой роЙрогро░்ро╡ு рокோрой்ро▒ро╡ро▒்ро▒ாро▓் роЕро╡родிрок்рокроЯ்роЯ роЪிро▓ро░ைрок் рокро░ிроЪோродிрод்родрокோродு,
роЕро╡ро░்роХро│ுроХ்роХு роЪிроХ்роХுрой்роХுрой்ропா роЗро░ுрок்рокродு роЪрооீрокрод்родிро▓்
роХрог்роЯுрокிроЯிроХ்роХрок்рокроЯ்роЯுро│்ро│родு.

родிроЯீро░் родிроЯீро░ெрой рооாро▒ுроо் рокро░ுро╡роиிро▓ைроХро│ாро▓் родрооிро┤роХрод்родிро▓் рооீрог்роЯுроо் роЪிроХ்роХுрой்роХுрой்ропா рокீродி! родро▓ைро╡ро▓ிропா, роХாроп்роЪ்роЪро▓ா, роХை, роХாро▓் ро╡ро▓ிропா... роЪிроХ்роХுрой்роХுрой்ропாро╡ாроХ роЗро░ுроХ்роХுрооோ роОрой роороХ்роХро│் рокропрои்родு рокோропிро░ுроХ்роХிро▒ роиிро▓ைропிро▓், роХрог்роХро│ிро▓் роПро▒்рокроЯுроХிро▒ родிроЯீро░் рооாро▒்ро▒роЩ்роХро│ுроо் роЪிроХ்роХுрой்роХுрой்ропாро╡ிрой் роЕро▒ிроХுро▒ிропாроХ роЗро░ுроХ்роХро▓ாроо் роОрой்рокродு рокுродிроп рокропроо்.

роПроЯிро╕் роОройрок்рокроЯுроХிро▒ роХொроЪுроХ்роХро│் роХроЯிрок்рокродாро▓் роЙрог்роЯாроХிро▒ ро╡ைро░ро╕் роХாроп்роЪ்роЪро▓ே роЪிроХ்роХுрой்роХுрой்ропா. роЗрои்род ро╡роХைроХ் роХொроЪுроХ்роХро│் рокுродுрод்родрог்рогீро░ிро▓் рокро▓்роХிрок் рокெро░ுроХроХ்роХூроЯிропро╡ை. роЗро╡ро▒்ро▒ிрой் роЗро▓роХ்роХு рооройிродро░்роХро│்! роЪிроХ்роХுрой் роХுрой்ропா родாроХ்роХிроп роТро░ுро╡ро░ிроЯрооிро░ுрои்родு, роЗрой்ройொро░ுро╡ро░ுроХ்роХு роЗрои்роиோроп் родொро▒்ро▒ுро╡родிро▓்ро▓ை. роЕродாро╡родு роЗродு роТроЯ்роЯிрок் рокро░ро╡роХ்роХூроЯிроп родрой்рооை роХொрог்роЯродро▓்ро▓. роЖройாро▓், роЗрои்роиோроп் ро╡рои்род роирокро░ைроХ் роХроЯிроХ்роХிро▒ роХொроЪு, роЕроЯுрод்родு роЗрой்ройொро░ு роирокро░ைроХ் роХроЯிроХ்роХிро▒рокோродு, рооுродро▓் роирокро░ிро▓ிро░ுрои்родு роЕроЯுрод்родро╡ро░ுроХ்роХுроо் роиோроп்роХ்роХிро░ுрооி роХроЯрод்родрок்рокроЯுроХிро▒родு.

роиோроп் ро╡рои்родро╡ро░்роХро│ுроХ்роХு роЕродிроХ роХாроп்роЪ்роЪро▓், родро▓ைро╡ро▓ி, роЬро▓родோро╖роо், рооூроЯ்роЯுро╡ро▓ி рокோрой்ро▒ роЕро▒ிроХுро▒ிроХро│் роЪроХроЬроо். роХрог் роОро░ிроЪ்роЪро▓், роЪிро╡рои்родு рокோродро▓், рокாро░்ро╡ை роороЩ்роХிрой роЙрогро░்ро╡ு рокோрой்ро▒ро╡ро▒்ро▒ாро▓் роЕро╡родிрок்рокроЯ்роЯ роЪிро▓ро░ைрок் рокро░ிроЪோродிрод்родрокோродு, роЕро╡ро░்роХро│ுроХ்роХுроо் роЪிроХ்роХுрой்роХுрой்ропா роЗро░ுрок்рокродு роЪрооீрокрод்родிро▓் роХрог்роЯுрокிроЯிроХ்роХрок்рокроЯ்роЯுро│்ро│родு. роЕродைропроЯுрод்родு роХрог்роХро│ிро▓் роЙрог்роЯாроХிро▒ рооேро▒்роЪொрой்рой роЕро▒ிроХுро▒ிроХро│ை ‘рооெроЯ்ро░ாро╕் роР’ роОройрод் родро╡ро▒ாроХ роиிройைрод்родு роЕро▓роЯ்роЪிропрок்рокроЯுрод்род ро╡ேрог்роЯாроо், роЕродு роЪிроХ்роХுрой்роХுрой்ропாро╡ாроХро╡ுроо் роЗро░ுроХ்роХро▓ாроо் роОрой்роХிро▒ роОроЪ்роЪро░ிроХ்роХை роХிро│роо்рокிропிро░ுроХ்роХிро▒родு.роХрог்роХро│ைропுроо் родாроХ்роХுрооா роЪிроХ்роХுрой்роХுрой்ропா? ро╡ிро┤ிрод்родிро░ை роЪிро▒рок்рокு рооро░ுрод்родுро╡ро░் ро╡роЪுроородிропிроЯроо் роХேроЯ்роЯோроо்
‘‘роЪிроХ்роХுрой் роХுрой்ропாро╡ுроХ்роХு роХாро░рогрооாрой ро╡ைро░ро╕் роороЯ்роЯுрооிро▓்ро▓ாроо, ро░ூрокெро▓்ро▓ா рооாродிро░ிропாрой роород்род ро╡ைро░ро╕் родொро▒்ро▒ுроХро│் роЪிро▓родுроо் рооройிродро░்роХро│ோроЯ роЙроЯро▓் рооுро┤ுроХ்роХ рокро░ро╡ро▓ாрой рокாродிрок்рокை роЙрог்роЯாроХ்роХுроо். рокொродுро╡ா рокாроХ்роЯீро░ிропா родொро▒்ро▒ு, роХாроп்роЪ்роЪро▓ைропோ, роЙроЯро▓்ро╡ро▓ிропைропோ роороЯ்роЯுроо் роХொроЯுроХ்роХுроо். роЖройா, ро╡ைро░ро╕் родொро▒்ро▒ு роЙроЯро▓் рооுро┤ுроХ்роХ роХроЯுрооைропாрой рокாродிрок்рокை роЙрог்роЯாроХ்роХிро▒ роЕро│ро╡ுроХ்роХுрод் родீро╡ிро░рооாройродு. роЙродாро░рогрод்родுроХ்роХு ро░ூрокெро▓்ро▓ா. роХро░்рок்рокிрогிрок் рокெрог்роХро│ுроХ்роХு роЗрои்род роиோроп் родாроХ்роХுроХிро▒рокோродு, роЕродு роХро░ுро╡ுро▓ роЙро│்ро│ роХுро┤рои்родைропோроЯ роЗродропроо், рооூро│ை, роХрог்роХро│், роХாродுроХро│்ройு рокро▓ роЙро▒ுрок்рокுроХро│ைропுроо் рокாродிроХ்роХுроо். роЕродாро╡родு роЕрои்родрок் рокாродிрок்рокுро▓ роХрог்роХро│ுроо் роЕроЯроХ்роХроо். роЕродுроХ்роХாроХ рокிро▒рои்род роХுро┤рои்родைропோроЯ роХрог்роХро│் рокாродிроХ்роХрок்рокроЯ்роЯா, роЕродுроХ்роХு ро░ூрокெро▓்ро▓ா роороЯ்роЯுрооே роХாро░рогроо்ройு роЪொро▓்ро▓ рооுроЯிропாродு.

роЪிроХ்роХுрой்роХுрой்ропா ро╡ைро░ро╕ுроо் роХிроЯ்роЯрод்родроЯ்роЯ роЕрок்рокроЯிрод்родாрой். роЗрои்род роиோроп்роХ்роХுроХ் роХாро░рогрооாрой ро╡ைро░ро╕் роХрог்роХро│ைрок் рокாродிроХ்роХிро▒родுроЩ்роХிро▒родு ро░ொроо்рок ро░ொроо்рокроХ் роХроо்рооி. роЙро▓роХро│ро╡ுро▓ропே роЗрои்родрок் рокாродிрок்рокு роЪродро╡ிроХிродроо் ро╡ிро░ро▓் ро╡ிроЯ்роЯு роОрог்рогроХ்роХூроЯிроп роЕро│ро╡ுро▓родாрой் роЗро░ுроХ்роХு. роХрог்роХро│்ро▓ роЕроХ்ропுро╡ெро╕் ро╣ுропூрооро░் роЪொро▓்ро▓роХ்роХூроЯிроп роТро░ு родிро░ро╡роо் роЗро░ுроХ்роХு. роЕродை рокி.роЪி.роЖро░் рооுро▒ைро▓ роЯெро╕்роЯ் рокрог்рогிрок் рокாро░்роХ்роХрогுроо். роироо்рооро│ோроЯ рооро░рокрогுроХ்роХро│்ро▓ роЯி.роОрой்.роП. рооро▒்ро▒ுроо் роЖро░்.роОрой்.роП. рокுро░родроЩ்роХро│் роЗро░ுроХ்роХு. роЪிроХ்роХுрой்роХுрой்ропா ро╡ைро░ро╕ுроХ்роХு ро╡ெро▒ுроо் роЖро░்.роОрой்.роП. роороЯ்роЯுроо்родாрой் роЗро░ுроХ்роХுроо்.

 роХрог்роХро│்ро▓ேро░்рои்родு роОроЯுроХ்роХрок்рокроЯро▒ родிро░ро╡род்родை рокி.роЪி.роЖро░். роЯெро╕்роЯ் рокрог்рогி, роЕродுро▓ роЗрои்род роЖро░்.роОрой்.роП. роЗро░ுроХ்роХாройு родெро░ிроЮ்роЪுроХ்роХிро▒родு рооூро▓рооா роХрог்роХро│்ро▓ роЪிроХ்роХுрой்роХுрой்ропா рокாродிрок்рокு роЗро░ுроХ்роХாроЩ்роХிро▒родை роЙро▒ுродி роЪெроп்ропро▓ாроо். роЕрокூро░்ро╡рооாрой роТро░ு ро╡ிро╖ропрод்родை роиிройைроЪ்роЪு роороХ்роХро│் роЗрои்родро│ро╡ுроХ்роХுрок் рокропрок்рокроЯ ро╡ேрог்роЯிроп роЕро╡роЪிропрооிро▓்ро▓ை’’ роОрой்роХிро▒ роЯாроХ்роЯро░் ро╡роЪுроородி, роХрог்роХро│ிро▓் родிроЯீро░ெрой роЙрог்роЯாроХிро▒ роОрои்род роЕроЪாродாро░рог рооாро▒்ро▒роЩ்роХро│ைропுроо் роЕро▓роЯ்роЪிропрок்рокроЯுрод்родாрооро▓், роЙроЯройроЯிропாроХ роХрог் рооро░ுрод்родுро╡ро░ைроХ் роХро▓рои்родாро▓ோроЪிрок்рокродே рокாродுроХாрок்рокாройродு роОрой்ро▒ுроо் роЕро▒ிро╡ுро▒ுрод்родுроХிро▒ாро░்.
 роЖро░்.ро╡ைродேроХி