بحث هذه المدونة الإلكترونية

أروع قصيدة سمعتها في حياتي


أروع قصيدة سمعتها في حياتي
 
 
قصيده من ذهب للشاعرة / ريوف الشمري 

قٌـمْ للمغنِّـيْ وفِّـهِ التصفـيـرا
كاد المغنِّـيْ أن يكـون سفيـرا
يا جاهلاً قـدر الغنـاء و أهلِـهِ
اسمع فإنك قـد جَهِلـتَ كثيـرا
http://www.sogarab.com/news/images/articles/2009_06/921/u1_3051465487.jpg
أرأيتَ أشرفَ أو أجلَّ من الـذي
غنَّى فرقَّـصَ أرجُـلاً و خُصُـورا
يكفيهِ مجـدا أن يخـدرَ صوتُـهُ
أبنـاء أُمـة أحـمـدٍ تخـديـرا
http://farm4.static.flickr.com/3228/2652859102_0336847743.jpg?v=0
يمشي و يحمل بالغنـاء رسالـةً
من ذا يرى لها في الحياة نظيرا
يُنسي الشبابَ همومَهم حتى غدوا
لا يعرفـون قضيـةً و مصيـرا
http://www.alriyadh.com/2009/05/19/img/195051nn.jpg
الله أكبـر حيـن يحيـي حفلـةً
فيهـا يُجعِّـرُ لاهيـاً مـغـرورا
من حوله تجدِ الشباب تجمهـروا
أرأيت مثل شبابنـا جمهـورا؟
thbestconcerts32xp2.png
يا حسرةً سكنت فؤاديَ و ارتوتْ
حتى غَدَتْ بين الضلوعِ سعيـرا
يا عين نوحي حُقَّ لي و لكِ البُكا
ابكـي شبابـا بالغنـا مسحـورا
http://m.3bir.com/files/571.jpg


يـا لائمـي صمتا فلستُ أُبالـغُ
فالأمرُ كان و ما يـزالُ خطيـرا
أُنظر إلى بعض الشبـابِ فإنـك
ستراهُ في قيـد الغنـاءِ أسيـرا
http://www.hiwaveevents.com/gallery/guc%20welcome%20party%2007/photos/g%20u%20c%20welome%20party%202007%20(11).jpg
يا ليت شعري لو تراهُ إذا مشـى
متهزهـزاً لظننتـهُ مخـمـورا
ما سُكرُهُ خمـرٌ و لكـنَّ الفتـى
من كأسِ أُغنيـةٍ غـدا سِكّيـرا
http://www.saidaonline.com/newsgfx/raghebalama5-saidaonline.JPG
أقْبِح بهِ يمشي يُدنـدنُ راقصـاً
قتلَ الرجولـةَ فيـهِ و التفكيـرا
لولا الحياءُ لصحـتُ قائلـةً لـهُ
يَخْلفْ على امٍ قد رعتكَ صغيرا
http://www.cbc.ca/gfx/images/arts/photos/2008/04/30/arts_mideastTV_584.jpg
في السوقِ في الحمامِ أو في دارهِ
دوماً لكـأس الأُغنيـاتِ مُديـرا
إنَّ الـذي ألِـفَ الغنـاءَ لسانُـهُ
لا يعـرفُ التهليـلا و التكبيـرا
http://cache.daylife.com/imageserve/0f75dAQfFS4NE/610x.jpg
حاورهُ لكنْ خُـذْ مناديـلاً معـك
خُذها فإنك سوف تبكـي كثيـرا
مما ستلقى مـن ضحالـةِ فكـرهِ
و قليـلِ علـمٍ لا يُفيـدُ نقيـرا
http://images.abunawaf.com/2007/07/28/hani1.jpg

أما إذا كان الحـوارُ عـن الغنـا
و سألتَ عنْ أحلام أو شاكيرا
أو قلت أُكتب سيرةً عن مطـربٍ
لوجدتِـهُ علمـاً بـذاك خبيـرا
http://mjjgallery.free.fr/20032005/various/rally/005.jpg
أو قلتَ كمْ منْ أُغنيـاتٍ تحفـظُ
سترى أمامـك حافظـاً نحريـرا
أمـا كتـابُ الله جـلَّ جـلالـه
فرصيدُ حفظهِ ما يـزالُ يسيـرا
http://vb.shathawi.com/imgcache/2/28400alsh3er.jpg
لا بيـتَ للقـرآن فـي قلـبٍ إذا
سكن الغناءُ به و صـار أميـرا
أيلومني مـن بعـد هـذا لائـمٌ
إنْ سال دمعُ المقلتيـن غزيـرا
http://www.alarab.net/data/news/2009/12/17/3qqqqqqqqqqq_1712090a6.JPG
بلْ كيف لا أبكي و هـذي أمتـي
تبكـي بكـاءً حارقـاً و مريـرا
تبكي شبابا علَّقـتْ فيـهِ الرجـا
ليكونَ عنـد النائبـاتِ نصيـرا
63825472co3.jpg

وجَدَتْهُ بالتطريـبِ عنهـا لاهيـاً
فطوتْ فؤاداً في الحشا مكسـورا
آهٍ..و آهٍ لا تــداوي لوعـتـي
عيشي غــدا مما أراه مريـرا
4ac945e8228599foc2.jpg

فاليومَ فاقـتْ مهرجانـاتُ الغنـا
عَدِّي فأضحى عَدُّهـنَّ عسيـرا
في كـل عـامٍ مهرجـانٌ يُولـدُ
يشدوا العدا فرحاً بهِ و سـرورا
http://www.iraq-ina.com/admin/upload/News-123617.jpg

أضحتْ ولادةُ مطربٍ فـي أُمتـي
مجداً بكـلِ المعجـزاتِ بشيـرا
و غـدا تَقدُمُنـا و مخترعاتُنـا
أمراً بشغلِ القومِ ليـس جديـرا
http://photos-a.ak.fbcdn.net/hphotos-ak-snc3/hs097.snc3/16438_250152894950_19705124950_4385811_607948_n.jpg
ما سادَ أجدادي الأوائـلُ بالغنـا
يوماً و لا اتخذوا الغناء سميـرا
http://www.alriyadh.com/2009/08/05/img/586665889818.jpg
سادوا بدينِ محمدٍ و بَنَـتْ لهـمْ
أخلاقُهمْ فـوقَ النجـومِ قُصُـورا
و بصارمٍ في الحرب يُعجِبُ باسلاً
ثَبْتَ الجنانِ مغامـرا و جسـورا
http://forums.ozkorallah.com/up/8798/1204933434.jpg
مزمـارُ إبليـس الغنـاءُ و إنـهُ
في القلبِ ينسجُ للخرابِ سُتُـورا
صاحبْتُـهُ زمنـاً فلمـا تَرَكْـتُـه
ُأضحى ظلامُ القلبِ بعـدَهُ نـورا
http://vb.arabseyes.com/images/usersimages/952_1147835870.jpg
تبـاً و تبـاً للغنـاءِ و أهـلِـهِ
قد أفسدوا في المسلميـن كثيـرا
http://www.alraimedia.com/AlRai.Web/UserFiles/78.33(1).jpg

يا ربِّ إهدِهِـمُ أو ادفـع شَرَّهُـمْ
إنَّا نـراك لنـا إلهـي نصيـرا
***
فَخَلَفَ مِنْ بَعْدِهِمْ خَلْفٌ أَضَاعُوا الصَّلَاةَ وَاتَّبَعُوا الشَّهَوَاتِ فَسَوْفَ يَلْقَوْنَ غَيًّا
إِلَّا مَنْ تَابَ وَآمَنَ وَعَمِلَ صَالِحًا
فَأُولَئِكَ
يَدْخُلُونَ الْجَنَّةَ وَلَا يُظْلَمُونَ شَيْئًا
سورة مريم الآية 59 -60
http://www.abohassan.net/images/muslimcry.jpg


*****
 أحبتي في الله

الكثير منا يعمل جاهدا ويحرص على ان يقاطع المنتجات الدنماركية 
ولكن للأسف الشديد لا يهتم بالأهم والأخطر
وهو مقاطعة من يفسدون أخلاق ودين الشباب المسلم
http://i38.tinypic.com/2cz6fxd.jpg

فأرجوا من كل مسلم غيورعلى دينه وعرضه
أن ينصح بالحكمة والموعظة الحسنة
اخوانه وأهله بمقاطعة أمثال هؤلاء المفسدين
http://www.elaph.com/elaphweb/Resources/images/Music/2006/5/thumbnails/T_5182aabe-9b91-40e3-a234-9757fc4999e8.jpg

حتى يحفظ عليهم دينهم ونفسهم وعقلهم ونسلهم ومالهم
مما هو مصلحة لهم في دنياهم و أخراهم
http://up.lm3a.net/uploads/c748118905.jpg

أما من تولى و أدبر، ولم يتعظ ويتدبر ويتفكر
فنقول له ما وعد وتوعد به رب البشر
http://360east.com/blogfileupload/DSCF0092.jpg

!!ووعده الحق

إِنَّ الَّذِينَ يُحِبُّونَ أَنْ تَشِيعَ الْفَاحِشَةُ فِي الَّذِينَ آمَنُوا لَهُمْ
 
عَذَابٌ أَلِيمٌ فِي الدُّنْيَا وَالْآخِرَةِ وَاللَّهُ يَعْلَمُ وَأَنْتُمْ لَا تَعْلَمُونَ
سورة النور آية 19
http://www.al-furqan.org/files/image/%D8%A8%D9%88%D9%85%D8%A8%D9%8A%201.jpg

لا تأمن مكر الله

و لا يأمن مكر الله إلا القوم الكافرون
اللهم إنا نسألك حسن الخاتمة
يــــــا اللــــــــــــه 






في الختام الحمد لله والصلاة والسلام على اشرف خلق وعلى آله وصحبه اجمعين

ولا إله الا الله عدد خلقة ورضا نفسه وزنة عرشه ومداد كلماته






www.afinis.co.cc : المصدر

What is Penetration Testing?


Definition of Penetration Testing:
Penetration testing can be described as a legal and authorized attempt to locate and successfully and effeciently exploit computer systems for the purpose of making those systems more secure and protected. Penetration testing is a form of security testing that provides information on the configuration of the ogranization’s system by using public-domain sources. Penetration testing methods includes probing for vulnerabilities as well as giving proof of concept (POC ) attacks to demonstrate the vulnerabilities are real. Proper penetration testing always ends with particular recommendations for addressing and fixing the issues that were discovered during the pen test. On the whole, this procedure is used to help secure and protect computers and networks against future attacks.

In penetration testing, knowing the difference between penetration testing and vulnerability assessment is important. As many people including vendors in the computer security community or the internet security community incorrectly use these terms interchangeably. A vulnerability assessment is the process of reviewing services and systems for possible security issues, whereas a penetration test essentially performs exploitation and provides proof of concept attacks to prove that a security concern exists. Penetration tests go a step above vulnerability assessments by simulating a malicious user activity and providing live payloads in order to test the computer systemer or the network itself. With regards to penetration testing, the procedure of vulnerability assessment is actually one of the steps utilized to complete a penetration test.
Penetration testing can reveal and show to network administrators, system engineers, IT managers, and executives the possible and potential penalties of a real attacker breaking into the network. Penetration testing shows and demonstrate security weaknesses missed by a common vulnerability scan.
A penetration test will point out vulnerabilities and report how those weaknesses can be exploited and taken advantage. It also shows how an attacker can exploit several minor vulnerabilities to compromise a computer or network system. Penetration testing reveals the gaps in the security model of an organization and helps organizations strike a balance between technical prowess and business functionality from the perspective of possible security breaches. Penetration testing also provides helpful information which is useful during disaster recovery and business continuity planning.
A penetration tester can be differentiated from an attacker only by intent, purpose and lack of malice. Therefore, employees, staff members or external experts must be cautioned against conducting penetration tests without having proper authorization. Incomplete and lacking quality penetration testing can result in a loss of services and disruption of business continuity.

Incoming search terms:

  • penetration testing tutorial
  • penetration testing tools
  • penetration test tutorial
  • system penetration tools
  • pen test tools
  • pen testing tools
  • network penetration testing tools
  • penetration testing complete tutorials
  • pentest tools and tutarials
  • complete pen testing tutorial




www.the3kira.blogspot.com : المصدر

Network and System Penetration Testing


Network and System Penetration Testing

iViZ's Network Penetration Test is more comprehensive than conventional Network vulnerability assessment by using an attacker-oriented approach. By going beyond simple vulnerability testing, iViZ's network testing also exploits them to find the real threats thereby enabling organization to effectively prioritize and remeditate them to drastically improve overall security posture.




Comprehensive Internal & External Network Security Testing

iViZ Security solution provides exhaustive network security testing on your internet network security infrastructure either from within your network or outside over the Internet. While black-box testing is best conducted from outside your network, a comprehensive "Multi-Stage Attack Path" testing as well as protocol link analysis is most effective when done from within your network. iViZ's Network Testing simulates the same methods that an attacker would follow to exploit multiple network security weaknesses in different combinations. Individually, some network vulnerability may not be critical, but when combined in certain ways, they can compromise your business-critical data or computer network.





How Network Penetration Testing works?

Internal On-Demand Network Testing:

Network penetration testing on internal servers and network devices are carried out using iViZ Security Appliance from within your network. The appliance comes with pre-installed with iViZ Security patent-pending technology software and conducts comprehensive testing without having to go over the Internet. Further this appliance can conduct additional network protocol link analysis and multi-stage attack analysis inside your computer network. The below section details the methodology used in the network vulnerability assessment to optimize the network security testing system.
Network Penetration Testing, Network Security Testing

External On-Demand Network Testing:

Network penetration testing on external facing servers and public network devices are carried out from iViZ Security SOC (Security operations center) remotely over the Internet using iViZ's patent-pending technology. The section below details the methodology used in the network security testing process.
Network Vulnerability Assessment, Vulnerability Testing 





iViZ Network Assessment Methodology

iViZ Security uses comprehensive methodology to perform the network assessment. The result of the network vulnerability Assessment is further used to do deeper Protocol Link Analysis as well as Multi-Stage Attack Analysis. iViZ Security conducts vulnerability assessments for small businesses to large regional infrastructures and has made significant strides in the network security communities for identifying, quantifying, and prioritizing the vulnerabilities in a system.


Internal On Demand Assessments:

network vulnerability assessment


External on Demand Assessments:

network security testing 






Solution Delivery

iViZ Security provides on-demand delivery for all Over-The-Internet testing solutions. In the case of Internal Network Testing, it is done using iViZ Security Appliance with pre-installed software. In both cases, the test reports and remediation recommendations are accessible anytime on the iViZ Security Management Portals.


Internal On-Demand Testing:

network penetration testing

Delivery Features of Internal On-Demand Testing

  • Assisted registration of internal network and server devices on your network.
  • Assisted test scheduling at your convenience.
  • Assisted installation of iViZ Security Appliance within your net.
  • Generation of comprehensive report based on automated testing coupled with expert validation on the tests to provide in-depth and comprehensive coverage.
  • Anytime access to vulnerability testing results & remediation reports on iViZ Security on-demand portal.

External On-Demand Testing:

vulnerability testing

Delivery Features of External On-Demand Testing

  • Self-Service registration and maintenance of your hosts & applications using iViZ Security on-demand portal.
  • Test scheduling at your convenience.
  • Automatic test launch based on your schedule directly and remotely from iViZ Security SOC (Security Operation Center).
  • Email alerts to keep you updated on test progress.
  • Generation of comprehensive report based on automated testing coupled with expert validation on the tests to provide in-depth and comprehensive coverage.
  • Anytime access to vulnerability testing results & remediation reports on iViZ Security on-demand portal.



www.the3kira.blogspot.com : المصدر
 
Copyleft © 2011. مدونة الهكر الاخلاقي العربي - All lefts Reserved
تعريب the3kira