ایمان اسلام کو جزو لاینفک ہے اس کے بغیر اسلام قابل قبول نہیں کوئی بھی شخص مکمل ایمان لائے بغیر دائرہ اسلام میں داخل نہیں ہو سکتا ۔ فصل اول میں ایمانیات کے بارے میں قرآن مجید کی درج ذیل سورتوں کی ۲۰ آیات سے وضاحت کی گئی ہے۔
سورة آل عمران آیت نمبر ۱۶۰، سورة النساء آیت نمبر۸۲، سورة الاعراف آیت نمبر۱۸۵، سورة يونس آیت نمبر۳۴، سورة بنى اسرائیل آیت نمبر ۹۹، سورة الانبياء آیت نمبر ۴۲، سورة الحج آیت نمبر۷۰، سورة المؤمنون آیت نمبر ۸۵،۸۶،۸۷،۸۸،۸۹، سورة النور آیت نمبر ۵۰، سورة الروم آیت نمبر ۳۵،۳۷ ،سورةالزمر آیت نمبر ۴۳، سورة المؤمن آیت نمبر ۸۱،۸۲، سورة المرسلات آیت نمبر۲۰،۲۵، اس فصل میں ان آیات میں اللہ تبارک وتعالیٰ نے اپنے بندوں سے سوال فرمایا ہے۔
اس فصل میں ہر آیت کو بیان کرنے کے بعد اس کی تفسیر پر روشنی ڈالی گئی ہے اور اس آیت میں استفہام کے استعمال کی وضاحت کی گئی ہے کہ ہر آیت میں اللہ تبارک و تعالیٰ کا سوال کرنے کے پیشِ نظر جو مقصد کارفرما تھا اس کو واضح کیا گیا ہے۔
This paper encompassed the methods of contemporary historians in presenting the Prophet's biography: Shalabī and Shākir as a model. The purpose of this research was a comparative study of the methods of two different contemporary writers in the field of biography. The method used for the research was comparative. This fact was established that there are very few contemporary historians who contributed in writing of the Prophet's biography, but although these two important historians were diligent researchers with good works and successful writings, but much that they have benefited from history needs and objected even settled facts like some of the correct aḥādīth and some important events that took place in the in reference no is there as (صلى الله عليه وسلم) Muhammad Prophet Great the of biography the books to the sources relied on in the historical narratives, nor in the narration of the biography. There are many shortcomings in the two books which are in the most important Islamic arts, especially in the Encyclopedia of Dr. Shākir, and special research and books should be devoted to the answers to the silence of such shortcomings, and there is a strong need to compose valuable books in response to the shortcomings of such sporadic encyclopedias. Special books in such art must be devoted to the important Islamic arts, and do not include a variety of subjects on general history. (صلى الله عليه وسلم) biography Muhammad s'Prophet the of art the inc
Wireless local area network (WLAN) has changed the paradigm of communication and become
ubiquitous. As the number of devices connected on wireless is increasing, it is therefore,
essential to find vulnerabilities in the security of wireless networks. In this research, WLAN
security vulnerabilities are exposed in real time and digital forensics of WLAN for Windows and
Android operating system-based clients are conducted. A real time wardriving was conducted in
a residential area to emphasize the fact that WLAN broadcast sensitive information. The results
of wardriving showed that 97% of WLAN access points (AP) were using WPA2. According to
the data collected it was found that channel 11 and channel 1 were used by 52% WLAN APs and
the average number of clients per AP was 1.59. Tenda WiFi wireless access point was set up
with MAC filtering, hidden SSID and WPA2 security mechanisms in different combinations in
such a way as to add an additional layer of security to previous configuration. The vulnerability
assessment of security mechanisms of residential AP was performed with Kali Linux version
2017.1. A practical demonstration of exploiting MAC filtering, Hidden SSID with MAC filtering
and WPA2-PSK with hidden SSID and MAC filtering security mechanisms of AP was carried
out in real time. It was observed that the existing security mechanisms were vulnerable.
Furthermore, the digital traces left behind or stored in 802.11 based devices were also explored
in order to investigate wireless network attacks. Researchers have proposed probabilistic models
for detecting MAC spoofing attacks of WLAN clients. However, in this research, a live forensic
method based on changing position of legitimate client with respect to attack detector and
observing received signal strength of wireless packets to detect MAC filtering bypass attack was
proposed. De-authentication attacks on wireless networks were also detected. This thesis also
explored the methods of finding WLAN artifacts from Windows and Android OS devices to
determine whether a particular device was connected to an unauthorized wireless network or not.
Researchers have exploited many security mechanisms of WLAN focusing upon a single
parameter of WLAN security at a time. However, in this work, three available security
mechanisms were cascaded to produce a three-layer security mechanism which was exploited in
real-time.