Search or add a thesis

Advanced Search (Beta)
Home > قران و سنت كى روشنى ميں يتيموں كے حقوق

قران و سنت كى روشنى ميں يتيموں كے حقوق

Thesis Info

Author

رابعه خالد

Program

MA

Institute

International Islamic University

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2015

Thesis Completion Status

Completed

Page

73

Language

Urdu

Other

297.567 ر ا ق

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676722340834

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

حاجی محمد صالح

حاجی محمد صالح
دوسرا افسوسناک سانحہ۶/مئی کی شام کو محترم حاجی محمد صالح صاحب کی وفات کاپیش آیا۔ صالح صاحب کئی سال سے معذور ہوگئے تھے اورصاحب فراش تھے،یوں بھی عمر طبعی کی سرحد پارکرچکے تھے لیکن چل رہے تھے اوران کے صاحبزادے حاجی خواجہ محمد سلیم صاحب دل وجان سے ان کی خدمت کر رہے تھے۔ اس طویل مدت میں کبھی کبھی حالت نازک بھی ہوجاتی تھی مگرسنبھل جاتے تھے۔ ۶/مئی کی صبح کو آخری سانس لینے لگے اورشام کے ۵بجے ہمیشہ کے لیے رخصت ہوگئے۔ حاجی محمد صالح صاحب اپنی گوناگوں اورغیر معمولی خصوصیات کی وجہ سے دہلی والوں میں ممتاز بلکہ لاجواب تھے اوراپنی ذات سے صحیح معنی میں ایک انجمن تھے۔ اجتماعات اورمجالس کی رونق اورجان۔ سوسائٹی کے ہرطبقے میں مذہب و ملت کے امتیاز کے بغیر مقبول تھے اور قدرو منزلت کی نظر سے دیکھے جاتے تھے۔ان کی فرم ’’حاجی علی جان‘‘نہ صرف دہلی بلکہ پورے ملک کی روایتی فرم تھی، ایک زمانے میں اس کا کاروبار نہایت وسیع تھا،اوردہلی اورحجاز دونوں جگہ بڑے پیمانے پرلین دین ہوتاتھا۔ فرم حاجی علی جان کی امانت ودیانت کاعام شہرہ تھااس فرم میں لاکھوں روپے کی امانتیں رہتی تھیں۔حج کوجانے والے بے جھجک لاکھوں روپے اس فرم کو جمع کراتے تھے اورمکہ معظمہ میں صرف رقعہ دکھا کر رقم لے لیتے تھے۔ یہ کہنا شاید مبالغہ سے پاک ہے کہ فرم حاجی علی جان مسلمانوں کے لیے ریزرو بینک سے بھی زیادہ معتبر ومستند تھی۔ حاجی صاحب مرحوم اس تاریخی فرم کے مالک تھے، قومی اورملی کاموں میں بڑھ چڑھ کرحصہ لیتے تھے۔ ایک وقت میں بڑے بڑے اہم اجتماعات کوٹھی حاجی علی جان ہی میں ہواکرتے تھے۔ حاجی صاحب کے والد محترم حاجی عبدالغفار صاحب جن کی ہم نے بارہا زیارت کی تھی، حکیم محمد اجمل خاں اورڈاکٹر مختار احمد انصاری کے ندیم خاص...

الأخبار الموضوعة في سنن ابن ماجه: دراسة نقدية

The scholars of Hadith gave special attention to the fabricated hadith and they explained it to others and warned about its danger. They all agreed upon it that transmission of fabricated report is unlawful only one way is lawful if the status of this report is narrated with its transmission. Some great scholars of hadith like Mizzi, Zahabi and Ibn Hajr have pointed out that in the sunan of Ibn Maja there are some fabricated and false ahadith. I took interest in study of these fabricated ahadith and I separated them and studied these ahadith according to the Principles of research of this filed. You will find during the study of this paper the importance of Sunan among the six books. You will study comments of scholars about this book. After complete study of this paper, we can conclude following points: 1. There are forty-four fabricated ahadith in Sunan of Ibn Maja. 2. These ahadith are found in five books except one, hadith is narrated by only Ibn Maja. 3. Ibn Maja declared about only one hadith that it is baseless. 4. Ibn Juzi mentioned only seven ahadith in his book fabricated ahadith. 5. Imam Bausairi showed indefference in commenting and declaring these ahadith as fabricated in his book Misbah-uz- zujazah. Although there are clear signs of fabrication in these ahadith.

Behavior Driven Host Based Insider Threats Detection of Misuse of Information for Windows Environment.

With the evolution of information technology in the corporate sector, the working paradigm shifted from manual to automated. On one side, it has leveraged human efforts of managing and maintaining the document files efficiently while on the other hand, it demands more security efforts for confidential documents because of the availability of large number of access channels. So the horizon of information security has also expanded from physical to electronic. This laid the foundation of developing more security mechanisms for protecting valuable information. The need and use of internet inside the organizations made this security problem quite nontrivial. Organizations not only have to protect those documents from external (outside the organization) attackers but also have to do the same for insiders (their legitimate users). Time has proven that majority of the attacks to tamper the confidentiality of information of an organization comes from external attackers but most of the attacks that get successful are from insiders. This is due to an obvious fact that insiders already possess the information external attackers would need to find out to penetrate into a system. It has always been an intricate job to protect your critical assets from those who not only have your trust but are also privileged to access those assets. This also holds good for insiders who (normally) are the rightful users of confidential information in the organization. Their privileged access to secret resources, knowledge about critical information and security mechanisms implemented inside the organization and their ability to bypass the existing security arrangements make the insider threats detection problem quite a significant one. The criticality of the problem can be vindicated by the fact that even a little misuse of the confidential informational assets of the organization may bring the reputation of the organization down from first-rate standing to below-par and can adversely affect the its financial position. To cope up with the aforementioned challenges, a host based framework for insider threats detection of information misuse has been presented in this dissertation. This research work has broad applicability with reference to the organizations of Pakistan especially those which work on missioncritical projects and products like Khan Research Laboratories, National Development Complex, Atomic Energy Commission, National Engineering and Scientific Commission. Private sector organizations can also benefit if the confidentiality of their secret information is critically significant for them. This framework will enable these organizations to cope up with the security threats posed by the insiders even if they already use a third party tool for detection. Such organizations can get advantage from the framework in their efforts to avoid/reduce possible insider attacks. Tunable parameters of the framework make it flexible and organizations can use it according to their need and security requirements. The framework in its nature is a comprehensive one. It not only comprehends technical measures but also covers psychological indicators to handle the misuse of information by insiders. Compared with the available methodologies, it incorporates a more practical approach. It provides a novel methodology of risk assessment which practically quantifies the risks and assigns threats level to each user depending upon his/her behavior, a problem which has not been handled in detail in the current literature of insiders. It also denies the famous assumption of no covert channel’s presence in the mechanisms used for detection. It proves the aforementioned assumption as unrealistic and a great threat to the organization. It discusses a deployment methodology to avoid this assumption. In this deployment, the source code of the developed application is accessible only to the higher management of the organization in order to detect any illegal changes in the source files through different techniques like code reviews etc. Besides describing efficient behavioral classification mechanism through fuzzy classifier, development of information sensors to capture necessary information, reduction in overall processing overheads by deploying non uniform security policies and the way to minimize false alarms by filtering insiders in different stages, it also provides an exhaustive blue print of scenario building and testing methodology in order to validate the framework. This validation methodology is quite closer to the real world environment of the organizations by simulating the real attack scenarios on the framework instead of theoretically providing a validation methodology. In epitome, the framework provides sufficient contributions to the knowledge of the insider threats detection domain. We, here in Pakistan would have remained unaware of the latest research in the field of networks and information security had HEC (Higher Education Commission of Pakistan) not taken revolutionary steps like providing free access to many digital resources and libraries, facilitating students with laptops, providing research grants and scholarships. The vision of HEC has enabled researchers to reveal the positive value that their research can bring into this country. Its technical and financial support has been a beacon for individuals who want to pursue their research work in the area of their interest. It is also due to the support of HEC that we have been able to conduct this research. HEC facilitated us in all ways during the course of this research work. From providing the supervision of knowledgeable academic professionals to the facilitation of modern literature, tools, accommodation and arrangements, HEC’s role has been very sublime and encouraging.