محنت میں عظمت
محنت میں عظمت سے مراد یہ ہے کہ کام کر کے ،دست و باز وکو با مقصد متحرک کر کے، قلوب و اذہان کو طمانیت بخشتے ہوئے حصولِ عظمت کی خاطر جہد مسلسل کرنا، گورا ہو، کالا ہو، پست ہو، طویل القامت ہو، دُبلا پتلا ہو یا لحیم شحیم ہو، یہودی ہو، نصرانی ہو یا ٓتش پرست، الغرض جس مسلک یامشرب سے منسلک ہواس بات کا وہ ضرور معترف ہے کہ اگر کوئی عظمت، آن اور تفوق کے سہرے کو اپنے سر پر سجانا چاہتا ہے تو وہ صرف اور صرف محنت سے ہی ایسا کر سکتا ہے۔
فرمانِ باری تعالیٰ ہے ’’انسان کے لیے وہی کچھ ہے جس کے لئے وہ کوشش اور محنت کرتا ہے‘‘بنی نوع انسان کی تاریخ کے اوراق کا اگر مطالعہ اورمشاہدہ کریں تو یہ بات اظہر من الشمس ہے کہ جن سلف صالحین اور نابغۂ روز گار ہستیوں نے نام پیدا کیا وہ شب و روز محنت و مشقت کی چکی میں پستی رہیں۔ اقبال نام کے ہزاروں ہوں گے لیکن علامہ اقبال رحمۃاللہ علیہ ایک ہی ہے۔ اسی طرح غزالی رحمۃ اللہ علیہ ، رازی رحمۃ اللہ علیہ نفیسی رحمۃاللہ علیہ جیسے زعماء جو آسمان علم و دانش پر آفتاب و ماہتاب بن کر چمکے یہ سب ان کی محنت لگن ، کاوش اور انتھک جد و جہد کا نتیجہ تھا۔ محنت شاقہ اور جذبہ صادق ہوتو کہساروں سے بھی جوئے شیر نکالی جاسکتی ہے۔
نامی کوئی بغیر مشقت نہیں ہوا
سو بار جب عقیق کٹا تب نگیں ہوا
حضور اکرم صلی اللہ علیہ و آلہٖ وسلم کی حدیث پاک ہے کہ’’ حلال روزی کمانے والا ( محنت کر نیوالا ) اللہ تعالیٰ کا دوست ہوتا ہے۔‘‘ نماز پنجگانہ ایک اہم عبادت ہے، ز کوٰ ۃ ارکان اسلام سے ایک اہم رکن ہے، حج ایک اہم عبادت...
In modern times, the conventional means of warfare are increasingly becoming less usable. However, the states are involved in waging hybrid warfare to the maximum to fulfill their foreign policy goals. In nuclearized South Asia, direct war between India and Pakistan seems unlikely given that both the states know that escalation could lead to nuclear catastrophe in the region. This compels both the states to find other means of warfare to undermine each other’s interests. India wants to weaken Pakistan so that it may abandon claim on Indian occupied Jammu and Kashmir. For that, India is using all tools of hybrid warfare against Pakistan. In this context, this paper aims at to unearth India’s hybrid warfare in the region and its implications for Pakistan. The main focus of the paper is to explain tools and methods of India hybrid warfare. At the same time the research also tries to unravel few other case studies. It also notes how Pakistan can counter hybrid threats posed by its arch rival.
One of the most critical issue to the wide adoption of cloud-based services is the concern about the client data confidentiality and computation integrity. Research work [Wang et al., 2015][Vasudevan et al., 2016] in the past on cloud platforms security has predominantly focused either on protecting these platforms from malicious cloud clients or on protecting cloud clients from each others unwanted activities. The problem of protecting clients from the possible malicious acts of insiders such as cloud providers is not adequately addressed. In this dissertation, we present a practical approach to protect client data confidentiality and computation integrity from cloud insiders, such as cloud administrator, in an infrastructure-as-a-service (IaaS) based cloud environment. Our approach makes use of remote attestation[Coker et al., 2011], and a late launch based technique, called Flicker[McCune et al., 2008], to verify the integrity of the cloud platform. This technique secures the virtual machine (VM) launch operation and further allows the launched VM to perform operations on sensitive data in full isolation. We have demonstrated through a real-world scenario of how the origin integrity and authenticity of health-care multimedia content processed on the cloud providers platform can be verified using digital watermarking in a secure and isolated execution environment without revealing the watermark details to the cloud administrator. We have also demonstrated using formal verification tool ProVerif that cryptographic operations and protocol communication cannot be compromised using a realistic attacker model. Performance analysis of our implementation demonstrates that it adds negligible overhead. In this dissertation, we have also presented a framework to rank cloud platform nodes according to the security guarantees they provide. Platform ranking helps to meet the needs of organizations with different security requirements. The framework introduces averification is indirectly perform Trusted Party (TP) for the verification of security properties of a cloud platform to the clients. The given framework is also thin client friendly as platform attestation and verification is indirectly performed through TP without the direct involvement of clients. Performance analysis shows that the cost of our presented approach is lower in order of magnitude when compared with traditional trusted computing based solutions.