مولانا محمد منظور نعمانی
گزشتہ مہینے کا معارف اشاعت کے مرحلے میں تھا کہ یہ افسوسناک خبر ملی کہ مولانا محمد منظور نعمانی ۴، ۵؍ مئی کی درمیانی شب میں انتقال فرماگئے۔ انا ﷲ وانا الیہ راجعون۔
اس قحط الرجال میں مولانا جیسے حکمت دین سے واقف صاحب فہم و بصیرت اور مدبر عالم، قوم کے درد مند مصلح اور ملت کے ہمدرد و غم گسار کا اٹھ جانا کس قدر المناک سانحہ ہے۔
مولانا ایک عالم و مصنف اور صاحب سلوک و عرفان بزرگ ہی نہ تھے بلکہ زمانے کے نبض شناس، وقت کے تقاضوں اور حالات سے باخبر اور عاقبت بیں بھی تھے جن کا عمل اس پر تھا کہ:
نکل کر خانقاہوں سے ادا کر رسمِ شبیری
کہ فقرِ خانقاہی ہے فقط اندوہ و دل گیری
وہ مذہبی، اصلاحی، قومی، ملی، تعلیمی اور اجتماعی جدوجہد کے ہر محاذ پر سرگرم اور متحرک دکھائی دیتے تھے، انہیں مسلمانوں کی موجودہ پستی و زبوں حالی کا پوری طرح احساس بھی تھا اور وہ اس کے ازالے کے لیے نہایت فکر مند بھی رہتے تھے، آزاد ہندوستان میں جن مسائل نے مسلمانان ہند کی زندگی تلخ اور مکدر کر رکھی ہے، ان پر شور و غوغا مچانے لچھے دار باتیں اور دھواں دار تقریریں کرنے اور پُرجوش تحریریں لکھنے والے تو بہت سارے لوگ ہیں لیکن ان پر مولانا کی طرح تڑپنے، بے چین ہوجانے، درد و کرب خلش و اضطراب میں مبتلا ہونے والے بہت کم لوگ ہیں، وہ مسلمانوں کی فلاح و بہود کے لیے دعا و مناجات میں بھی مصروف رہتے تھے اور ملک کے گوشے گوشے کی خاک بھی چھانتے رہتے تھے، ان کے گریہ شب اور دعا ہائے سحر گاہی سے گھبرا کر ابلیس بھی یہ کہتا رہا ہوگا کہ
خال خال اس قوم میں اب تک نظر آتے ہیں وہ
Dysfunctional Audit Behavior (DAB) poses a significant threat to the integrity of audit practices and ethical standards. This research delves into the intricate web of ethical violations within DAB, examining the deviations from established ethical principles in the field of auditing. The study employs a comprehensive qualitative research methodology, incorporating interviews, case analyses, and ethical frameworks to unravel the underlying factors contributing to these violations. The research uncovers the multifaceted nature of ethical breaches within DAB, focusing on issues related to impartiality, integrity, objectivity, professionalism, and confidentiality. Through in-depth analyses of real-world cases and interviews with auditors, clients, and regulatory bodies, this study aims to identify patterns and motivations driving auditors towards unethical practices. Moreover, the research explores the impact of these violations on the credibility of audit reports and the overall trust in the auditing profession. The findings of this research not only shed light on the root causes of ethical misconduct but also offer valuable insights for regulatory bodies, audit firms, and educators. By understanding the complexities of DAB, stakeholders can develop targeted strategies to prevent and mitigate these violations effectively. Strengthening ethical education, enhancing regulatory oversight, and fostering a culture of integrity within audit organizations emerge as key recommendations from this study.
802.11 based Mobile Ad hoc networks are low energy and spontaneous networks. However, the absence of a central identity management system to keep a track of identities in network and broadcast nature, these networks are always prone to identity attacks. In such attacks, multiple illegitimate (arbitrary or spoofed) identities are created on a physical device for various malevolent reasons, such as to launch DoS or DDoS attacks to escape detection and accountability in the network. In this thesis, two main identity attack scenarios i.e., Sybil attack and replication attack have been considered. In the former scenario, more than one identities are created for a single physical device; whereas, in the latter scenario, duplicate identities are created for many physical devices in the same network. Collectively, these attacks are referred to as identity attacks. The current literature proposed solutions where such attacks are counteracted separately. We have proposed an Identity Attack Detection System (IADS) that considers the fluctuation in the RSS value of nodes to identify malevolent nodes. The detected malevolent nodes can be quarantined and can be blacklisted for future correspondence by the system. The IADS can identify both attacks in a single shot. The IADS can detect: i) duplicate node, ii) change in node position, iii) change in RSS both abrupt or gradual, iv) the status (ON/OFF) of the node, v) the location of a node whether at the start or the end of the ad hoc topology. In addition, IADS do not require any additional hardware such as GPS or Trusted Third-party or Certification authority. The proposed scheme has been assessed using: first, mathematical evaluation via graph theory, second statistical evaluation via Minitab and third simulation via NS-2 simulator. It is worth mentioning that the data for the statistical analysis has been obtained from real test beds. The results obtained from statistical, mathematical and simulation show, comparatively, the overall improvement of the proposed detection system with high rate of accuracy and without adding extra overhead. Overall, the IADS deliver at average 4 % FPR while 96.56%, 96.01% and 100% TPR using three different evaluation techniques simulation, statistical and mathematical respectively.