Sunday, 29 May 2016

اگر آپ نے جینا سیکھ لیا تو یقین جانیں آپ نے ھر فن سکھ لیا اس کے بعد اس سوال کی گنجایش ھی نھین کہ آپ نے اور کیا ہنر سیکھا۔۔۔۔۔۔
Muhammad Shahzad

Saturday, 28 May 2016

C++

The C-Style Character String:
S.N.Function & Purpose
1strcpy(s1, s2); Copies string s2 into string s1.
2strcat(s1, s2); Concatenates string s2 onto the end of string s1.
3strlen(s1); Returns the length of string s1.
4strcmp(s1, s2); Returns 0 if s1 and s2 are the same; less than 0 if s1<s2; greater than 0 if s1>s2.

String

C# string function
String FunctionsDefinitions
GetHashCode()This method returns HashValue of specified string.
GetType()It returns the System.Type of current instance.
GetTypeCode()It returns the Stystem.TypeCode for class System.String.
IndexOf()Returns the index position of first occurrence of specified character.

C library

The string.h header defines one variable type, one macro, and various functions for manipulating arrays of characters.

Library Variables

Following is the variable type defined in the header string.h:
S.N.Variable & Description
1
size_t
This is the unsigned integral type and is the result of the sizeofkeyword.

Library Macros

Following is the macro defined in the header string.h:
S.N.Macro & Description
1
NULL
This macro is the value of a null pointer constant.

Library Functions

Following are the functions defined in the header string.h:
S.N.Function & Description
1
Searches for the first occurrence of the character c (an unsigned char) in the first n bytes of the string pointed to, by the argument str.
2
Compares the first n bytes of str1 and str2.
3
Copies n characters from src to dest.
4
Another function to copy n characters from str2 to str1.
5
Copies the character c (an unsigned char) to the first n characters of the string pointed to, by the argument str.
6
Appends the string pointed to, by src to the end of the string pointed to by dest.
7
Appends the string pointed to, by src to the end of the string pointed to, by dest up to n characters long.
8
Searches for the first occurrence of the character c (an unsigned char) in the string pointed to, by the argument str.
9
Compares the string pointed to, by str1 to the string pointed to bystr2.
10
Compares at most the first n bytes of str1 and str2.
11
Compares string str1 to str2. The result is dependent on the LC_COLLATE setting of the location.
12
Copies the string pointed to, by src to dest.
13
Copies up to n characters from the string pointed to, by src to dest.
14
Calculates the length of the initial segment of str1 which consists entirely of characters not in str2.
15
Searches an internal array for the error number errnum and returns a pointer to an error message string.
16
Computes the length of the string str up to but not including the terminating null character.
17
Finds the first character in the string str1 that matches any character specified in str2.
18
Searches for the last occurrence of the character c (an unsigned char) in the string pointed to by the argument str.
19
Calculates the length of the initial segment of str1 which consists entirely of characters in str2.
20
Finds the first occurrence of the entire string needle (not including the terminating null character) which appears in the string haystack.
21
Breaks string str into a series of tokens separated by delim.
22
Transforms the first n characters of the string src into corrent locale and places them in the string dest.

Tuesday, 24 May 2016

What is DDOS attack ?

A distributed denial-of-service (DDoSattack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example a botnet) flooding the targeted system with traffic.

Details about hacker

What is a Hacker?

Brian Harvey
University of California, Berkeley

In one sense it's silly to argue about the ``true'' meaning of a word. A word means whatever people use it to mean. I am not the Academie Française; I can't force Newsweek to use the word ``hacker'' according to my official definition.
Still, understanding the etymological history of the word ``hacker'' may help in understanding the current social situation.
The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s. Popular opinion at MIT posited that there are two kinds of students, tools and hackers. A ``tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As. A ``hacker'' is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground.
What does this have to do with computers? Originally, nothing. But there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair. It can be telephones, or railroads (model, real, or both), or science fiction fandom, or ham radio, or broadcast radio. It can be more than one of these. Or it can be computers. [In 1986, the word ``hacker'' is generally used among MIT students to refer not to computer hackers but to building hackers, people who explore roofs and tunnels where they're not supposed to be.]
A ``computer hacker,'' then, is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking.)
A hacker is an aesthete.
There are specialties within computer hacking. An algorithm hacker knows all about the best algorithm for any problem. A system hacker knows about designing and maintaining operating systems. And a ``password hacker'' knows how to find out someone else's password. That's what Newsweek should be calling them.
Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief. A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker. It's a matter of emphasis.

Ethics and Aesthetics

Throughout most of the history of the human race, right and wrong were relatively easy concepts. Each person was born into a particular social role, in a particular society, and what to do in any situation was part of the traditional meaning of the role. This social destiny was backed up by the authority of church or state.
This simple view of ethics was destroyed about 200 years ago, most notably by Immanuel Kant (1724-1804). Kant is in many ways the inventor of the 20th Century. He rejected the ethical force of tradition, and created the modern idea of autonomy. Along with this radical idea, he introduced the centrality of rational thought as both the glory and the obligation of human beings. There is a paradox in Kant: Each person makes free, autonomous choices, unfettered by outside authority, and yet each person is compelled by the demands of rationality to accept Kant's ethical principle, the Categorical Imperative. This principle is based on the idea that what is ethical for an individual must be generalizable to everyone.
Modern cognitive psychology is based on Kant's ideas. Central to the functioning of the mind, most people now believe, is information processing and rational argument. Even emotions, for many psychologists, are a kind of theorem based on reasoning from data. Kohlberg's theory of moral development interprets moral weakness as cognitive weakness, the inability to understand sophisticated moral reasoning, rather than as a failure of will. Disputed questions of ethics, like abortion, are debated as if they were questions of fact, subject to rational proof.
Since Kant, many philosophers have refined his work, and many others have disagreed with it. For our purpose, understanding what a hacker is, we must consider one of the latter, Sören Kierkegaard (1813-1855). A Christian who hated the established churches, Kierkegaard accepted Kant's radical idea of personal autonomy. But he rejected Kant's conclusion that a rational person is necessarily compelled to follow ethical principles. In the book Either-Or he presents a dialogue between two people. One of them accepts Kant's ethical point of view. The other takes an aesthetic point of view: what's important in life is immediate experience.
The choice between the ethical and the aesthetic is not the choice between good and evil, it is the choice whether or not to choose in terms of good and evil. At the heart of the aesthetic way of life, as Kierkegaard characterises it, is the attempt to lose the self in the immediacy of present experience. The paradigm of aesthetic expression is the romantic lover who is immersed in his own passion. By contrast the paradigm of the ethical is marriage, a state of commitment and obligation through time, in which the present is bound by the past and to the future. Each of the two ways of life is informed by different concepts, incompatible attitudes, rival premises. [MacIntyre, p. 39]
Kierkegaard's point is that no rational argument can convince us to follow the ethical path. That decision is a radically free choice. He is not, himself, neutral about it; he wants us to choose the ethical. But he wants us to understand that we do have a real choice to make. The basis of his own choice, of course, was Christian faith. That's why he sees a need for religious conviction even in the post-Kantian world. But the ethical choice can also be based on a secular humanist faith.
A lesson on the history of philosophy may seem out of place in a position paper by a computer scientist about a pragmatic problem. But Kierkegaard, who lived a century before the electronic computer, gave us the most profound understanding of what a hacker is. A hacker is an aesthete.
The life of a true hacker is episodic, rather than planned. Hackers create ``hacks.'' A hack can be anything from a practical joke to a brilliant new computer program. (VisiCalc was a great hack. Its imitators are not hacks.) But whatever it is, a good hack must be aesthetically perfect. If it's a joke, it must be a complete one. If you decide to turn someone's dorm room upside-down, it's not enough to epoxy the furniture to the ceiling. You must also epoxy the pieces of paper to the desk.
Steven Levy, in the book Hackers, talks at length about what he calls the ``hacker ethic.'' This phrase is very misleading. What he has discovered is the Hacker Aesthetic, the standards for art criticism of hacks. For example, when Richard Stallman says that information should be given out freely, his opinion is not based on a notion of property as theft, which (right or wrong) would be an ethical position. His argument is that keeping information secret is inefficient; it leads to unaesthetic duplication of effort.
The original hackers at MIT-AI were mostly undergraduates, in their late teens or early twenties. The aesthetic viewpoint is quite appropriate to people of that age. An epic tale of passionate love between 20-year-olds can be very moving. A tale of passionate love between 40-year-olds is more likely to be comic. To embrace the aesthetic life is not to embrace evil; hackers need not be enemies of society. They are young and immature, and should be protected for their own sake as well as ours.
In practical terms, the problem of providing moral education to hackers is the same as the problem of moral education in general. Real people are not wholly ethical or wholly aesthetic; they shift from one viewpoint to another. (They may not recognize the shifts. That's why Levy says ``ethic'' when talking about an aesthetic.) Some tasks in moral education are to raise the self-awareness of the young, to encourage their developing ethical viewpoint, and to point out gently and lovingly the situations in which their aesthetic impulses work against their ethical standards.

Reference

MacIntyre, Alasdair. After Virtue. Notre Dame, Indiana: University of Notre Dame Press, 1981.

Darama-e-Allaaa

Try it

Try It (^_^)




Monday, 23 May 2016

.......ہوس کے پجاری………

یہاں تو نفس بھی ہمارا ہوس کا ہے پروردہ
اگر دل میں حیاء ہوتی تو پھر سیرت نظر آتی…

کہاں سے شروع کروں کس پہ ختم کروں..
الفاظ خودکشی کر لیں پر ہم نہیں سدھرے
 ارے ہم کس دور میں جی رہے ہیں..

.غیرت ہمارے دلوں میں کہاں دب چکی ہے ہم کیوں اسے کھود کر نکال نہیں لیتے....
کیوں ہمیں ہر چہرہ اپنے سا بد کردار اور فحاشی کا سامان لگتا ہے…
ہم کیسے ایک پاک دامن عورت کو دیکھ کر گندے گندے تصورات باندھ لیتے ہیں..
کس طرح ایک برقعہ میں ملبوس خاتون کی صرف آنکھیں دیکھ کر اس کا کردار جانچ لیتے ہیں…
ہمیں کیوں ہر چہرا ہی اپنے مقصد کا ذریعہ اور اپنے بھوک کی غذا لگتی ہے…
ہم بہن بیٹی ماں اور بیوی جیسے پاک رشتوں کو کیوں بھول جاتے ہیں.
ہماری غیرت اور عزت ان رشتوں میں اپنے گھر تک ہی کیوں محدود ہے..
بازار میں آئی لڑکی کیا صرف تمھارے حصول کی  چاہ میں آئی ہے… کیا اسے کوئی مجبوری کھینچ کہ نہیں لائی….
 ارے جا کر دیکھو تو ان صنف نازک کو جو زمانہ سے بچتے بچتے زمانہ کا لقمہ بن کر ہی رہ گئی…
ارے…..
       ٹٹول کر تو دیکھو ان کے دکھ,  ان کے غم ان کی پریشانیوں کو تو سمجھو….

ایک دفتر میں کام کرتی لڑکی اس لئے نہیں کام کر رہی کہ وہ اپنی پبلیسٹی کروائے…
غربت نے دھکیلا ہے انہیں ورنہ وہ بھی اپنے گھروں کو ہی اپنے سر کا تاج  سمجھتی ہیں اور تم اور ہم نجانے کیسے کیسے خیالات دل میں اجاگر کر لیا کرتے ہیں
تمہارے گھر کے کسی فرد کی طرف کوئی دیکھے تو تم مر مٹنے پر اتر جاتے ہو… اور جن کا کوئے سایہ نہیں ہوتا ان کے تو دوپٹہ کھینچنے میں لگے ہوئے ہوتے ہو
ارے….
 کوئی  تمہاری طرف دیکھ لے اگر ایک بار تو تمہاری زبان پتہ نہیں انہیں کہاں سے کہاں لا کھڑی کر دیتی ہے……
… .خدارا…
 اگر عزت نہیں دے سکتے تو کم سے کم ان کی عزتوں کو نیلام تو مت کرو…
اگر آنکھوں میں وہ بصیرت نہیں تو کم ازکم اندھے بن کر ہر جگہ پہ بے حیائی کی لاٹھی کو مت گھماتے پھرو…
یاد رکھنا یہ دنیا مکافات عمل ہے یہاں ہر چیز کا بدلہ فی الفور ادا کر  کے ہاتھ میں تھما دیا جاتا ہے…
عورت ایک کلی ہے اسے مسلنے کی ٹوہ میں نہ لگو….
میرے رب نے انہیں گھر کی زینت بنایا ہے تو رہنے دو انہیں گھر کی ہی زینت…..
اس زینت کو بازاروں میں مت لاؤ….
اپنے برے اعمال کا نتیجہ اچھی صورت میں دیکھنے کا تصور بند کرو… یہاں جو کرو گے وہی کیا جائے گا….
عزت کرو گے عزت ملے گی
ذلیل کرو گے ذلت ملے گی…..

زیادہ لکھنے کی نہ ہی جسارت کرنا چاہتا ہوں اور نہ ہی لکھنا آتا ہے

بس آج درد لکھا ہے ہو سکے تو سمجھنے کی کوشش کیجئے گا…..

….. محمد شہزاد…….

Thursday, 19 May 2016

Biology defination

Biology is a natural science concerned with the study of life and living organisms, including their structure, function, growth, evolution, distribution, identification and taxonomy. Modern biology is a vast and eclectic field, composed of many branches and subdisciplines.

Physics

Physics (from Ancient Greek: φυσική (ἐπιστήμη) phusikḗ (epistḗmē) "knowledge of nature", from φύσις phúsis "nature") is the natural science that involves the study of matter and its motion through space and time, along with related concepts such as energy and force.

Chemistry defination

Chemistry is a branch of  science that studies the composition, structure, properties and change of matter.

Growth hormones

Growth hormone


"HGH" redirects here. For other uses, see HGH (disambiguation).
Growth hormone 1
Somatotropine.GIF
Growth hormone
Identifiers
SymbolGH1
Entrez2688
HUGO4261
OMIM139250
RefSeqNM_022562
UniProtP01241
Other data
LocusChr. 17 q22-q24
Growth hormone 2
Identifiers
SymbolGH2
Entrez2689
HUGO4262
OMIM139240
RefSeqNM_002059
UniProtP01242
Other data
LocusChr. 17 q22-q24
Growth hormone (GH), also known as somatotropin (or as human growth hormone [hGH or HGH] in its human form), is a peptide hormone that stimulates growth, cell reproduction, and cell regeneration in humans and other animals. It is thus important in human development. It is a type of mitogen which is specific only to certain kinds of cells. Growth hormone is a 191-amino acid, single-chain polypeptide that is synthesized, stored, and secreted bysomatotropic cells within the lateral wings of the anterior pituitary gland.
GH is a stress hormone that raises the concentration of glucose and free fatty acids.[1][2] It also stimulates production ofIGF-1.
recombinant form of hGH called somatropin (INN) is used as a prescription drug to treat children's growth disorders and adult growth hormone deficiency. In the United States, it is only available legally from pharmacies, by prescription from a doctor. In recent years in the United States, some doctors have started to prescribe growth hormone in GH-deficient older patients (but not on healthy people) to increase vitality. While legal, the efficacy and safety of this use for HGH has not been tested in a clinical trial. At this time, HGH is still considered a very complex hormone, and many of its functions are still unknown.[3]
In its role as an anabolic agent, HGH has been used by competitors in sports since at least 1982, and has been banned by the IOC and NCAA. Traditional urine analysis does not detect doping with HGH, so the ban was unenforceable until the early 2000s, when blood tests that could distinguish between natural and artificial HGH were starting to be developed. Blood tests conducted by WADA at the 2004 Olympic Games in Athens, Greece targeted primarily HGH.[3] Use of the drug for performance enhancement is not currently approved by the FDA.
GH has been studied for use in raising livestock more efficiently in industrial agriculture and several efforts have been made to obtain governmental approval to use GH in livestock production. These uses have been controversial. In the United States, the only FDA-approved use of GH for livestock is the use of a cow-specific form of GH called bovine somatotropin for increasing milk production in dairy cows. Retailers are permitted to label containers of milk as produced with or without bovine somatotropin.
========================Special Thanxx to Wikipedia for info=========================