یوم دفاعِ پاکستان
نحمدہ ونصلی علی رسولہ الکریم امّا بعد فاعوذ بااللہ من الشیطن الرجیم
بسم اللہ الرحمن الرحیم
صدرِذی وقار اور میرے ہم مکتب شاہینو!
آج مجھے جس عنوان پر اظہار خیال کرناہے وہ ہے:’’یوم دفاع پاکستان ‘‘
جنابِ صدر!
اقوام کی زندگی میں ایسے دن بھی آئے کہ انہیں اپنی بقاء کے لیے تن من دھن کی بازی لگانا پڑی۔ انہیں اپنی مسرتوں کو خیر آباد کہنا پڑا، انہیں اپنی آبادیوں اور بستیوں کو چھوڑنا پڑا، انہیں طوفانوں کا مقابلہ کرنا پڑا۔
صدرِذی وقار!
کسی چیز کا حصول جتنا مشکل ہے، اس سے بڑھ کر اس کی حفاظت مشکل ہے، اس کا تحفظ ضروری ہے، اس کے لیے وقت کی قربانی ہے، اس کے لیے مال و اسباب کی قربانی ہے، عزیز واقارب چھوڑنے پڑتے ہیں، اس کے لیے اعزاء واقربا کی جدائی برداشت کرنی پڑتی ہے۔
جنابِ صدر!
’’یوم دفاع پاکستان ‘‘کسی الٰہ دین کے چراغ کانام نہیں ہے ،کسی تفریحی مقام کا نام نہیں ہے۔ کسی بادِ نسیم کے جھونکوں کا نام نہیں ہے ،کسی نورافشاں کہکشاں کا نام نہیں ہے،کسی آفتابِ جہاں تاب کی کرنوں کا نام نہیں ہے۔
صدرِذی وقار!
یہ ایک ایسی قوم کی جہداورمساعی کا نام ہے جس نے شب خون مارنے والی قوم کو ناکوں چنے چبوائے ، جس نے دشمن کی رات کی نیندیں حرام کر دیں، جس نے دشمن قوم کے گھٹیا عزائم کو نیست و نابود کر دیا، جس نے ابرِ رحمت کی موسلا دھار بارش سے آتش اعداء کو سردکر دیا۔
جنابِ صدر!
اس جنگ میں ہر ایک نے حصہ بقدر جُثّہ لیا، نوجوان شمشیر بکف ہوکر میدان میں آ گئے ، بوڑھوںاور بچوں نے کفن پوش ہو کر دشمن کا ڈٹ کر مقابلہ کیا۔ مضمون نگار نے اخبار میں مضامین لکھ کر دشمن کے عزائم کو طشت از...
This research shows the value of tolerance in Islam, which is the basis of the ethics of the religion of Islam. This great value has created the bonds of love and harmony between Muslims and all human beings. This was the main reason for spreading the message of Islam to various parts of the world without coercion. There have been many attempts to accuse Islam of intolerance, terrorism and intimidation. Hence, this research is concerned with showing the truth about the ethics of Islam and its noble high values. To achieve the desired goal, the research was divided into an introduction, a preface, three chapters and a conclusion. The introduction addressed the importance of the topic and the reason for its selection. In the preface, the meaning of the word "tolerance" was shown and compared with the Quranic words used in this topic. In the first chapter, the researcher deals with the value of tolerance is the origin of Islam. It characterized the Prophet Muhammad (prayer and peace be upon him). The second chapter says tolerance is the cause of the spread of Islam, and the voluntary entry of people into it. The third chapter shows that tolerance is the root of solving problems and resolving all forms of conflict between nations, individuals, parties and groups. The researcher in conclusion suggests the most important findings and recommendations.
One of the most critical issue to the wide adoption of cloud-based services is the concern about the client data confidentiality and computation integrity. Research work [Wang et al., 2015][Vasudevan et al., 2016] in the past on cloud platforms security has predominantly focused either on protecting these platforms from malicious cloud clients or on protecting cloud clients from each others unwanted activities. The problem of protecting clients from the possible malicious acts of insiders such as cloud providers is not adequately addressed. In this dissertation, we present a practical approach to protect client data confidentiality and computation integrity from cloud insiders, such as cloud administrator, in an infrastructure-as-a-service (IaaS) based cloud environment. Our approach makes use of remote attestation[Coker et al., 2011], and a late launch based technique, called Flicker[McCune et al., 2008], to verify the integrity of the cloud platform. This technique secures the virtual machine (VM) launch operation and further allows the launched VM to perform operations on sensitive data in full isolation. We have demonstrated through a real-world scenario of how the origin integrity and authenticity of health-care multimedia content processed on the cloud providers platform can be verified using digital watermarking in a secure and isolated execution environment without revealing the watermark details to the cloud administrator. We have also demonstrated using formal verification tool ProVerif that cryptographic operations and protocol communication cannot be compromised using a realistic attacker model. Performance analysis of our implementation demonstrates that it adds negligible overhead. In this dissertation, we have also presented a framework to rank cloud platform nodes according to the security guarantees they provide. Platform ranking helps to meet the needs of organizations with different security requirements. The framework introduces averification is indirectly perform Trusted Party (TP) for the verification of security properties of a cloud platform to the clients. The given framework is also thin client friendly as platform attestation and verification is indirectly performed through TP without the direct involvement of clients. Performance analysis shows that the cost of our presented approach is lower in order of magnitude when compared with traditional trusted computing based solutions.