ہر غم ہنسی کے پیچھے چھپانے سے میں رہا
اس بار زندگی کو نبھانے سے میں رہا
دیتا بھلے ہے تیری جفا کا دھواں یہ اب
پھر بھی چراغ ِ عشق بجھانے سے میں رہا
اب ماند پڑ گئی ہیں مری سب حرارتیں
اس شخص کو تو روز منانے سے میں رہا
جن میں ہے تیرے لمس کی خوشبو بسی ہوئی
اے یار! اُن خطوں کو جلانے سے میں رہا
گر تیری شرط ہے کہ یہ حل ہوں گی اشک سے
ان مشکلوں پہ اشک بہانے سے میں رہا
ان سب اذیتوں نے تو پاگل ہی کر دیا
ہوش اپنے اب ٹھکانے پہ لانے سے میں رہا
حساسیت سے چیخ کے یہ کہہ رہا ہوں میں
گر یہ زمانہ ہے تو زمانے سے میں رہا
مانا کہ فہد ؔزندگی بھی ہے بہت کٹھن
پر آسماں تو سر پہ اُٹھانے سے میں رہا
A comparison of the Islamic Banking products offered in the two countries of Pakistan and Malaysia has been discussed in this paper. The research paper uses document analysis to identify different products offered by five full-fledged Islamic banks in Malaysia and Pakistan. It is evident from the research that Islamic banking sector in Pakistan is not tapping its full growth potential as in case of Malaysia. It is also concluded that the trade financing and asset financing products offered by Islamic banks in Malaysia are more diverse than the products offered by its counterparts in Pakistan. The paper gives insight to the Shariah complaint board to introduce new products while learning from the experience of other countries. This research does not focus on investigating the reasons behind these differences; however, it initiates a discourse in this direction.
Different access control mechanisms are used to secure the database against an unauthorized access by either an intruder or extruder. Currently employed orthodox mechanisms, failed considerably to secure the database from authorized misuses by malicious users.There are various techniques that were previously employed to detect SQL anomalies and to impede the query from execution. Although the solution was appropriate to some extent, but there is no appropriate mechanism to embark a resolution against the reconstruction of queries to minimize the occurrence of denial of service DoS. There are various reasons for the occurrence of denial of service DoS in the database. The DoS may happen when an SQL query is detected as anomalous and intercepted by the database. Things get embroiled when some process issues a query and waiting a reply from the database; certainly that process has to wait forever for the response by the database. The denial of service situation is not justifiable for the organizations which are working with databases in the real time environments. To overcome the issues of DoS, this work proposes a technique of SQL injection detection and purifies those queries from the malicious codes, injected by intruders. This work is formed as the next section represents the introduction, literature review, methodology and finally the reference phase.