Showing posts with label Education. Show all posts

ہمیں اپنے گلے کے بچھو نظر نہیں آتے اور دوسروں کی مکھیاں اڑانے کی فکر لگی ہوئی ہے۔




تحریر اشفاق احمد
نیا نیا دین پڑھنا شروع کیا تھا۔ نمازیں وقت پر ادا ہونے لگیں، اذکار، نوافل، تلاوتِ قرآن۔ میوزک کی جگہ دینی لیکچرز، پردہ۔ ایک کے بعد ایک تبدیلی۔۔ زندگی میں سکون تو تھا ہی لیکن اب سکون کی انتہا ہونے لگی۔ تشکر سے دل بھر گیا۔ جہاں ایک طرف سب کچھ perfection کی طرف جا رہا تھا، وہاں ساتھ ہی ایک بہت بڑی خرابی نے ہلکے ہلکے دل میں سر اٹھانا شروع کیا۔ تکبر! جی۔ یہی شیطان کی چالیں ہیں۔ اول تو وہ دین کی طرف آنے نہیں دیتا۔ اگر اس مرحلے میں ناکام ہو جائیں تو ریا کاری کروا کے نیکی ضائع کرواتا ہے ، دل میں تکبر ڈال کر ضائع کرواتا ہے۔مجھے یہ تو نظر آتا تھا کہ فلاں نے تین ہفتے سے نمازِ جمعہ ادا نہیں کی تو اسکے دل پر مہر لگ گئی ہے، مجھے یہ بھول جاتا تھا کہ اللّٰہ تعالٰی نے ساری زندگی زنا کرنے والی اس عورت کو پیاسے کتے کو پانی پلانے پر بخش دیا۔ مجھے یہ تو دکھائی دیتا کہ فلاں لڑکی نے پردہ نہیں کیا، مجھے یہ بھول جاتا کہ رائی جتنا تکبر مجھے کہیں جہنم میں نہ گرا دے۔ مجھے یہ تذکرہ کرنا تو یاد رہتا کہ فلاں نے داڑھی رک لی اور نماز ادا نہیں کی، مجھے یہ بھول جاتا کہ کسی کی غیبت کر کے مردار بھائی کا گوشت کھانے کی مرتکب تو میں بھی ہو رہا ہوں۔
یہ سلسلہ کچھ عرصہ یونہی چلتا رہا۔ پھر ایک بار کسی نے بڑے پیارے انداز میں ایک قصہ سنایا۔ قصہ ایک فقیر کا تھا۔ وہ مسجد کے آگے مانگنے بیٹھا۔ نمازی باہر نکلے تو انہیں اپنی نمازوں پر بڑا زعم تھا۔ فقیر کو ڈانٹ کر بھگا دیا۔ وہاں سے اٹھ کر فقیر مندر گیا۔ پجاری باہر آئے تو اس کے ساتھ وہی سلوک یہاں بھی ہوا۔ تنگ آ کر وہ شراب خانے کے باہر بیٹھ گیا۔ جو شرابی باہر آتا اور اسے کچھ دے دیتا، ساتھ میں دعا کا کہتا کہ ہم تو بڑے گناہگار ہیں، کیا پتہ تجھے دیا ہوا ہی بخشش کا باعث بن جائے۔
مجھے سمجھ آ گئی تھی کہ گناہ کر کے شرمندہ ہونا نیکی کر کے تکبر کرنے سے بہتر ہے۔
یہ قصہ میرے لئے turning point ثابت ہوا۔ ہم سب کو اپنے آپ کا جائزہ لینے کی شدید ضرورت ہے۔ ضرور امر بالمعروف اور نہی عن المنکر کریں لیکن judgement کا کام رب کے لئے چھوڑ دیں۔ نیکی کا کام دل میں امت کا درد اور محبت لے کر کرنے سے ہو گا، اپنے آپکو باقیوں سے برتر سمجھ کر نہیں۔ کانٹے بچھا کر پھولوں کی توقع کیسے کی جا سکتی ہے؟
نفرتیں پھیلا کر محبتیں کسیے سمیٹی جا سکتی ہیں؟
دوسروں کی اصلاح کریں لیکن اپنے رویئے پر کڑی نگاہ رکھنا نہ بھولیں۔
بابا جی اشفاق احمد صحیح کہتے ہیں، ہمیں اپنے گلے کے بچھو نظر نہیں آتے اور دوسروں کی مکھیاں اڑانے کی فکر لگی ہوئی ہے۔

Where does Pakistan stand in World Economic Freedom Index 2018?


According to the Time of Islamabad  report World Economic Freedom report has surfaced and Pakistan has not performed well even this year. *
Pakistan has achieved an economic freedom score of 54.4 in the “Economic Freedom Index” 2018 conducted by the Heritage Foundation.
Pakistan’s economy was ranked the 131stfreest in the 2018 index and its overall score rose by 1.6 points with a major improvement in fiscal health offsetting falls in government integrity and business freedom.
In the Asia-Pacific region, Pakistan’s economy was ranked at 31st amongst forty-three countries. The overall score of 54.4 remains below the world and regional averages which stood at 61.1 and 61.0 respectively.
In the last few years, some elements of economic freedom have proceeded timidly in Pakistan according to the “Economic Freedom Index” but years of internal political rows and low levels of foreign investment contributed to unpredictable growth and underdevelopment.
The immense meddling of the state in the economic affairs of the country and the inefficient but pre-eminent regulatory agencies discourage private business formation, the report said.
It added that a lack of access to bank credit threatened entrepreneurship and innovation had slowed down due to the isolation of the financial sector from the outside world.
Also, the “Economic Freedom Index” 2018 report said the judicial system was severely affected by a serious backlog and poor security and corruption keeps on tarnishing the civil service and judiciary.
In the rule of law section, property rights score stood at 36.0, down 0.4 from the previous year. Judicial effectiveness score was 34.0, down 0.1 and government integrity at 27.3, recording a fall of 3.2.
The report said “Pakistan’s legal system provides incomplete protection for the acquisition and disposition of property rights. Although technically independent, the justice system is marred by such endemic problems as corruption, intimidation, a large backlog of cases, and insecurity. Corruption is pervasive. Many public officials face allegations of bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement.”
In the government size section, tax burden recorded a score of 78.5, down 0.4 from the previous year. Government spending stood at 88.2, recording an increase of 0.9 and fiscal health saw the biggest up of 23.2 points, touching 54.0.
The regulatory efficiency section saw a score of 55.3 in the business freedom benchmark, down 5.9 points. Labour freedom benchmark saw a score of 40.6 points, up 2.8 points and monetary freedom benchmark posted a score of 40.6, registering a rise of 2.9 points.
The report highlighted business freedom was lagging in the country, with entrepreneurs facing major licensing and other bureaucratic hiccups. Also, legal protections for laborers was cited as very weak.
In the open market section of the report, the country scored 65.9 in trade freedom benchmark, registering a 1.3-point fall from the previous year, with investment freedom benchmark remaining unchanged at 55.0. Financial freedom benchmark score stood unchanged at 40.0

The Index of Economic Freedom is based on 10 categories:
1. Business Freedom,
2. Trade  Freedom,
3. Tax Burden,
4. Freedom from Government,
5. Monetary Freedom,
6. Investment Freedom,
7. Financial Freedom,
8. Property Freedom,
9. Freedom From Corruption,
10. Labor Freedom,

Thank U for reading


Stay Connect with us: amadahmad.blogspot.com

Session Cookie Based SQL Injection

Short Description: SQL injection is most dangerous attack for web application, there are a lot of different websites are vulnerable to SQL injection. There are different variant for SQL injection like a simple SQL injection, blind SQL injection and Cookies based SQL injection. As you know the basic idea about cookies and their importance, cookies are represent some session and normally they count in cross site scripting attack (XSS) but what is cookies based SQL injection. In this article we will discuss cookies or session based SQL injection attack. 

Did you say a “Cookie” 

A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user’s browser and for the browser to return the state information to the origin site. The state information can be used for authentication, identification of a user session, user’s preferences, shopping cart contents, or anything else that can be accomplished through storing text data.
Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install malware on the host computer. However, they can be used by spyware to track user’s browsing activities – a major privacy concern that prompted European and US law makers to take action. Cookies could also be stolen by hackers to gain access to a victim’s web account.[1]


Where can I find my cookies?


Here is one way to get your stored cookies using your browser. This method is applied for Mozilla Firefox:


  1. From the Tools menu, select Options. If the menu bar is hidden, press Alt to make it visible.

  2. At the top of the window that appears, click Privacy.

 4. To modify settings, from the drop-down menu under “History”, select Use custom settings for history. Then enable or disable the settings by checking or unchecking the boxes next to each setting:


  • To allow sites to set cookies on your computer, select Accept cookies from sites. To specify which sites are always or never allowed to use cookies, click Exceptions.
  • To accept third-party cookies, check Accept third-party cookies. In the drop-down menu next to “Keep until:”, select the time period you wish to keep cookies on your computer.
  • To view the cookies stored on your computer, click Show Cookies… . In the window that appears, you can view the cookies on your computer, search for cookies, and remove any or all of the listed cookies.
  • To specify how the browser should clear the private data it stores, check Clear history when Firefox closes. Then, click Settings… . You can specify the items to be cleared when you close Firefox.

  4. Click OK until you return to the Firefox window.

To remove all cookies, from the Tools menu, select Clear recent history… . Check the items you want to clear, and then click Clear Now.



Are you talking about a Cookie Poisoning-like attack?


Cookie Poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user’s computer) in order to bypass security mechanisms. Using cookie poisoning attacks, attackers can gain unauthorized information about another user and steal their identity.
Cookie poisoning is a known technique mainly for achieving impersonation and breach of privacy through manipulation of session cookies, which maintain the identity of the client. By forging these cookies, an attacker can impersonate a valid client, and thus gain information and perform actions on behalf of the victim. The ability to forge such session cookies (or more generally, session tokens) stems from the fact that the tokens are not generated in a secure way.[4]
To sum up, cookie-based SQL Injection is far to be a kind of Cookie Poisoning.

Cookie variables as a vector of SQL Injections:


SQL injection overview

A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.
All data sent by the browser to a Web application, if used in a SQL query, can be manipulated in order to inject SQL code: GET and POST parameters, cookies and other HTTP headers. Some of these values ​​can be found in the environment variables. The GET and POST parameters are typically entered into HTML forms, they can contain hidden fields, i.e. information that is in form but not shown. GET parameters are contained in the URL and POST parameters are passed as HTTP content. Nowadays, and with the growth of Web 2.0 technologies, the GET and POST requests can also be generated by JavaScript.

Injecting malicious code in cookie:

Unlike other parameters, cookies are not supposed to be handled by users. Outside of session cookies which are (usually) random, cookies may contain data in clear or encoded in hexadecimal, base64, hashes (MD5, SHA1), serialized information. If we can determine the encoding used, we will attempt to inject SQL commands.



 function is_user($user) {

global $prefix, $db, $user_prefix;

if(!is_array($user)) {

        $user = base64_decode($user);

        $user = explode(“:”, $user);

$uid = “$user[0]“;

$pwd = “$user[2]“;

} else {

$uid = “$user[0]“;

$pwd = “$user[2]“;

}

if ($uid != “” AND $pwd != “”) {

    $sql = “SELECT user_password FROM “.$user_prefix.”_users WHERE user_id=’$uid’”;

$result = $db->sql_query($sql);

$row = $db->sql_fetchrow($result);

$pass = $row[user_password];

if($pass == $pwd && $pass != “”) {

return 1;

}

}

return 0;

}

The cookie contains base64 encoded form identifier, a field that is unknown and a password. If we use as a cookie 12345 ‘UNION SELECT’ mypass ‘:: mypass base64 encoded, the SQL query becomes:


  SELECT user_password FROM nk_users WHERE user_id=’12345′ UNION SELECT ‘mypass’

This query returns the password mypass, the same password as we have to provide. So we are connected.

How to inject the code in Cookies?

There are many HTTP interceptors and HTTP editors that can intercept the HTTP request before it is sent to the server. Then the tester can introduce his malicious SQL statement in the cookie field.
It’s like a get/post based SQL Injection, except that certain characters can’t be used. Forexample, ‘;‘ and ‘,‘ are typically treated as delimiters, so they endthe injection if they aren’t URL-encoded.

Conclusion

Cookie variables sometimes are not properly sanitized before being used in SQL query. This can be used to bypass authentication or make any SQL query by injecting arbitrary SQL code. For the web application audits, cookie variables should be added to the list of parameters to be checked.

For more Updates Visit: amadahmad.blogspot.com


What Is A DNA computer? How Can It Beat The World’s Fastest Supercomputers?

Short Description: The concept of DNA computing was first introduced in 1994. It deals with the “bio-chips” made of DNA that are able to perform billions of calculations at once by multiplying themselves in number. In other words, a DNA computer grows as it computes. In a recent development, the researchers from the University of Manchester have shown that the creation of this conceptual computer is possible in real life.
   I
ntel is struggling to increase the speed of their CPU's due to the limitations of Moore’s law. The other processor makers are also working hard to beat the speed records. There’s no denying the fact that researchers and scientists need to look for silicon alternatives for faster computing. The silicon-based computers have a finite number of processors and, thus, their capabilities are also finite.

What is a DNA computer? How does it work?

Long back in 1994, the concept of computing with DNA was first proposed to make calculations faster even with a small footprint. Its major highlight was the ability to multiply itself and carry out numerous calculations simultaneously. In other words, unlike a normal computer that performs calculations one after another, a DNA computer does those calculations at once by making multiple copies of itself.
Coming back to the introduction of the concept of DNA computing in 1994, it was invented by the famous cryptographer Leonard Adleman who used DNA to solve the “traveling salesman” problem. The problem aimed at finding out the shortest route between a number of cities by going through each city only once. Adleman showed that billions of molecules in a drop of DNA had so much computational power that can simply overpower silicon and the powerful human-based computers.
In his experiment, the strands of DNA represented 7 cities. The sequences of genetic alphabets A, T, C, and G represented cities and the path. After this, when the DNA molecules were mixed in a test tube, some DNA strands stuck together and the chains of strands were the possible answers. Using some chemical reactions, wrong molecules were removed. You can read more about the process in detail in this paper written by Adleman himself.
These DNA molecules are able to store billions of times more data as compared to tradition storage devices. Due to an abundance availability of DNA, it’s a cheap resource. Also, a DNA computer will be environment-friendly and compact in size.

What’s the latest progress? Is DNA computing going to be a reality very soon?

In 1997, the researchers at the University of Rochester developed basic DNA logic gates, which was seen as a breakthrough. Recently, a major development in the field of DNA computing was made by the researchers from the University of Manchester, which is famous for creating first stored memory electronic computer.
The researchers have shown that it’s possible to build a DNA computer that’ll grow as it’ll compute. This concept is also being called a nondeterministic universal Turing machine (NUTM).
As the DNA molecules are very tiny, a desktop “DNA” computer can utilize more processors than all the electronic computers in the world combined. “And therefore outperform the world’s current fastest supercomputer, while consuming a tiny fraction of its energy,” according to Professor King of Manchester’s School of Computer Science.
In a research paper, they have described the physical design for an NUTM that implements a universal Thue system. This design uses the DNA’s ability to replicate to execute an exponential number of paths. Their paper shows that this design works using in vitro molecular biology experimentation and computation modeling. You can read the research paper to know more details.
Currently, the field of DNA computing is in its nascent stage, and it’ll take a long time to develop a working DNA computer. But, whatever might be the rate of progress, the concept surely sounds exciting.
For more Updates Visit: amadahmad.blogspot.com

Most Popular Programming Languages, Frameworks, Libraries, And Databases | 2017


Stack Overflow has released its much-anticipated Developer Survey 2017. This year, over 64,000 developers took part in the survey and shared their preferences. The survey revealed that for the fifth time in a row, JavaScript was the most commonly used programming language, followed by SQL and Java.
Stack Overflow is the world’s largest online community for programmers where they can learn languages, share code, and help each other. The website also releases its annual developer survey which gives a pretty solid idea of current programming trends, the work lives of developers, their habits and preferences, etc.
Since 2011, Stack Overflow is conducting this survey each year. This year’s survey is the biggest in Stack Overflow’s history with 64,000 developers taking part. Over the course of next few days, I’ll be telling you about some of the major highlights of this survey.

Most popular programming languages:

For the fifth time in a row, JavaScript has topped the list of the most commonly used programming languages. JavaScript is followed by SQL and Java.
The growth of Python is notable. It has overtaken PHP for the first time in five years. Here’s the list of the most popular programming languages:

Most popular frameworks, libraries:

In this category, Node.js and AngularJS continue to be the most commonly used technologies:

Most popular databases:

For the first time in its survey, Stack Overflow asked the developers what databases they were using. MySQL and SQL Server turned out to be the biggest databases:

For more Updates Visit: amadahmad.blogspot.com

Paulo Coelho’s 5 Smartest Advices for Students


When Paolo Coelho wrote and released “The Alchemist,” his first publisher dropped the book because the sales were bad. Fortunately, he found another publisher who had more faith in it and the rest became history. “The Alchemist” encourages a person to reconsider how he views life and helped establish Coleho as an inspirational writer. Here are some of the smartest advice from the book that will prove helpful how you view life not only as a student but in general.
Action is the first step to success
Success will not come if you don’t take a step first. Taking action is also the only way to learn. You can study more, read more, listen more but if you don’t take any action, all those knowledge remains a knowledge. On the other hand, success comes when you turn that knowledge into action.
Compensate your weakness with your strength
All of us have their own weaknesses and strengths. However, weaknesses should not stop you from being successful and earning the respect of others. Instead, focus on your strength instead of your weakness.
Persevere
In “The Alchemist,” there’s a quote there that says if you really want something, the universe conspires in helping you get that dream. There might be something you’ll encounter that will make you doubt your dream but yo have to keep your focus and be obsessed with your dream.
Rejection is normal
Paulo loved writing and believes in himself. He recounted a story where he passed some of his poetry in a reputable magazine but got humiliated in return. He took it personally at first but eventually got over the rejection. The experience encouraged him to make himself better.
Getting a corporate job does not necessarily mean success
Getting a job in the corporate world might pay you a lot of money but that does not necessarily mean success. Doing what you love doing is a gift that only a few enjoys but not impossible to achieve.

Who's Tracking Your Smartphone?


 Safety should always be our top priority. With the help of just a few short codes, you can find out more about the settings of your phone and work out whether or not your messages and information are protected and whether you’re being tracked.

We has gathered together some of the most useful and important codes for smartphones all in one article, together with some instructions for those who’re worried about being tracked.

With this code, you can find out whether your calls, messages, and other data are being diverted. The status of the different types of diversions that are taking place along with the number the information is being transferred to will be displayed on your phone’s screen. This function is most often set up by either jealous partners or parents who are trying to protect their kids from spam or criminals. Elderly people often become victims of this practice when they lend their phone to a stranger to make a single call. If they do so, they risk having information about where they live, who their friends and family are, their habits and daily activities, and even their financial circumstances passed on to criminals.
Dial this code if you want to find out where calls, messages, and data are being redirected to if it seems that no one can get through to you. The chances are in this case that your voice calls are being redirected to one of your cell phone operator’s numbers.
This is a universal code for switching off all forms of redirection away from your phone. It’s a good idea to use this before you have to use roaming. In this case, money won’t be taken from your account for calls that are redirected by default to your voice mail.
With the help of this code, you can find out your IMEI (International Mobile Equipment Identifier). If you know this number, you can find your phone if someone steals it. When switched on, its location is automatically conveyed to the network operator even if a different SIM card is inserted. If someone knows your IMEI number, they can find out the model and technical characteristics of your phone.
Special codes exist that allow someone to track your location and also to determine whether someone is following you. For this, you need the utility net-monitor. Type in one of the following codes:

for iPhone: *3001#12345#* 
for Android: *#*#4636#*#* or *#*#197328640#*#*

Step 1. Go to the section called UMTS Cell Environment, then UMTS RR info, and write down all the numbers under Cell ID. These numbers are the basic stations located nearby. Your phone will connect by default to the one that emits the best signal.

Step 2. Go back to the main menu, and click on the MM info tab, then on Serving PLMN. Write down the numbers under Local Area Code (LAC).

Step 3. With the help of these two numbers and an ordinary website (the fourth tab to the left), you can determine the location on the map of the basic station that your phone is connected to.

The ones to be suspicious of are mobile basic stations — this could be a truck or small bus with a large antenna. These kinds of vehicles are used at rock festivals and in places where Internet coverage is poor. If there’s one of them nearby, seemingly without any logical reason, it’s just possible that someone is engaged in spying.
If you use Android, you should periodically check your phone for viruses. Place Raiders one of the most dangerous ones that can infect your device. Developed by American experts, it was meant to show how vulnerable our devices are. Once it gets onto a phone, this Trojan takes a series of photographs of the surrounding area, creates a 3D model of the building you’re in, and then takes advantage of any Internet connection to send the data that it’s gathered, adding along with it all the data on the phone and your passwords.
  • National security agencies in virtually all countries now cooperate with cell phone operators, who often provide the former with access to information on any of their customers provided they have a warrant from a court. As a minimum, they provide data from the last three months.

  • If your phone has been tapped by a security agency, the chances are you won’t even notice. If a phone makes odd noises during a conversation, loses battery power rapidly, overheats, or unexpectedly restarts, this is merely an indication that you need to get it repaired rather than a telltale sign that you’re being listened to.

  • People generally don’t reveal all that much in phone conversations, so from the point of view of those who want to listen in it’s much more worthwhile to set up special devices ("bugs") in someone’s home. Radio wave detectors can be used to work out whether such bugs are present in a building.
  • Use messaging apps that are completely closed to outsiders, such as Telegram, Chare, Wickr, or Signal.

  • Determine what information it’s safe to make accessible to all. Should everyone really be able to find out your phone number or have access to information about your family, loved ones, or your lifestyle? Be very careful when posting photographs of children.

  • Don’t install unknown programs on your phone, keep close track of the apps you have installed, and use multiple security locks wherever you can. Don’t click on unsafe links, and don’t connect your phone to suspicious "free" charging points.

  • Only your cell phone operator should ever offer you tracking services, and they should only turn them on with your explicit agreement. Websites and applications that offer to find out the location of other people are almost certainly acting with criminal intent. Be careful!

For More Visit : www.amadahmad.blogspot.com

Our Education System

10 Powerful Life Lessons from The Alchemist



The Alchemist by Paulo Coelho is one of the best-selling books in history. The story of Santiago, the shepherd boy on a journey to realize his “Personal Legend” has inspired people all over the world to live their dreams.
Here are ten of the most popular passages and lessons to apply to your life:
1. Fear is a bigger obstacle than the obstacle itself
“Tell your heart that the fear of suffering is worse than the suffering itself. And that no heart has ever suffered when it goes in search of its dreams, because every second of the search is a second’s encounter with God and with eternity.”
Any new pursuit requires entering uncharted territory — that’s scary. But with any great risk comes great reward. The experiences you gain in pursuing your dream will make it all worthwhile.
2. What is “true” will always endure
“If what one finds is made of pure matter, it will never spoil. And one can always come back. If what you had found was only a moment of light, like the explosion of a star, you would find nothing on your return.”
Truth cannot be veiled by smoke and mirrors — it will always stand firm. When you’re searching for the “right” decision, it will be the one that withstands the tests of time and the weight of scrutiny.
3. Break the monotony
“When each day is the same as the next, it’s because people fail to recognize the good things that happen in their lives every day that the sun rises.”
Gratitude is the practice of finding the good in each day. Life can easily become stagnant, mundane, and monotonous, but that changes depending on what we choose to see. There’s always a silver lining, if you look for it.
4. Embrace the present
“Because I don’t live in either my past or my future. I’m interested only in the present. If you can concentrate always on the present, you’ll be a happy man.”
There’s no point dwelling in the past and letting it define you, nor getting lost and anxious about the future. But in the present moment, you’re in the field of possibility — how you engage with the present moment will direct your life.
5. Your success has a ripple-effect
“That’s what alchemists do. They show that, when we strive to become better than we are, everything around us becomes better, too.”
Growth, change, and evolution are weaved into the fabric of reality. Becoming a better version of yourself creates a ripple effect that benefits everything around you: your lifestyle, your family, your friends, your community.
6. Make the decision
“When someone makes a decision, he is really diving into a strong current that will carry him to places he has never dreamed of when he first made the decision.”
It’s easy to get overwhelmed by the unknowns and finer details of your dreams. Actions will flow out of having confidence in your decision; sitting on the fence will get you nowhere.
7. Be unrealistic
“I see the world in terms of what I would like to see happen, not what actually does.”
Some of the greatest inventions would not have happened if people chose to accept the world as it is. Great achievements and innovations begin with a mindset that ignores the impossible.
8. Keep getting back up
“The secret of life, though, is to fall seven times and to get up eight times.”
Because the eighth time could be your breakthrough. Some of the greatest novels in history were published after receiving hundreds of rejections. Thankfully, those authors never gave up.
9. Focus on your own journey
“If someone isn’t what others want them to be, the others become angry. Everyone seems to have a clear idea of how other people should lead their lives, but none about his or her own.”
It’s easy to be influenced by others, but you’ll be miserable if you end up living someone else’s life. There’s nothing wrong with taking advice and learning from others, but make sure it aligns with your desires and passions.
10. Always take action
“There is only one way to learn. It’s through action.”
You can study, read, and listen until you turn blue in the face, but the full experience is when you take action, and let the rubber meet the road. Once you’re done aiming, pull the trigger.

Present Education System


Our present educational system is not playing a significant role in shaping the future of our youth. It makes students corrupt and teaches them only indulgence and self-centeredness. Some of the major problems with this system are as under.
Single Aim – To Make Money 
The aim of this system has become to make money for the owners of the institutes and in turn this education also makes youth who are hungry for indulgence, power and money. They just think of partying, sex, fashion, food, gadgets and vehicles. They blindly follow western styles and culture. For these youth, earning money is the only goal of the life and their only motivational force is money. They want to go abroad and earn money and stay there forever. These youths perceive the education as a means of making money.
Literate not Educated
This education only gives degrees/diplomas without any basic knowledge. It tries to make people literate, not educate. It prepares them for a job in an MNC and totally ignores their overall development.
Making fools seem “bright”
The present examination system & evaluation system ignores skills, and aptitudes among students. This examination system is not a true test of child’s capacity. This does injustice to those who are really intelligent and genius. By the virtue of this system, those who are routine, regular, and average in their thinking, approach and intellect appear bright and intelligent; and those who are unconventional, out of box, above ordinary in their thinking, approach and intellect appear as losers and fools. At an advance stage in life, these seemingly “bright” people take higher positions in society and organizations and thus the whole society is downgraded by the mess they create.
Followers instead of leaders
This system produces followers instead of leaders. These “bright” people have no vision and have short term goals. When they grow in life they are not able to give shape to their life, to the society, to the country and to the new generation.
Ineffective Evaluation System
No doubt that present educational system is making engineers, doctors, CAs and other officers but there is lack of values. The present system tests only what a student has crammed or is able to copy. It does not test what the student has learned and what ideas they have of life and work. It does not test the character, the aptitude and the attitude of the student. This is the reason why our bureaucrats and police officers become corrupt (even if their intention at the beginning may not have been such).
Lack of Moral Values
It does not emphasize on patriotism and humanity. Youth have very little or no value for our heritage and culture. It only prepares the youth as the job seekers or job mongers with low value system. There are very little or no human values. People don’t respect human life now. Honesty is laughed at by the people; sincerity and hard work are considered foolish, elders are not respected, women are considered as sex objects only. There is no sense of duty and sacrifice.
Lack of Total Personality Development
There is lack of total personality development. The system churns out indifferently trained, poorly motivated students, who have few job prospects. For these students, success means having money whatever the means. This education is not able to develop leadership qualities in students.
No Emphasis on Creativity and Innovation
There is less emphasis on research activities and knowledge orientation. The system doesn’t inspire children to go beyond what is set to be the limits. What the students learn is routine and regular. Students are forced to do lot of routine work just to get marks. Students are not encouraged to take activities of their interest.
No Focus on Learning
There is too much stress on getting marks and this encourages children to mug up & pass exams rather than learning concepts. Institutions are giving more stress on completing syllabus and help the students to pass the exam instead of building their character and enhancing their personalities.
No Intellectual Development
This education system is detached from the real world. It doesn’t make children ready to face the world outside. The system aims to create a complacent labor force which is driven by the large MNCs and the MNC friendly governments. The system only teaches to memorize things. It makes children workers who are best at repetition. The aim is simply to reduce as many individuals as possible to the same safe level, to breed and train them to a standard level or the common level. There is no originality whatsoever in any way. There is too much focus on reaching to the top but there is absolutely no guidance about the means to reach there. There are no intellectual discussions happening. It only trains them to memorize things. Those who come triumphant in this system has only three qualities - perseverance, ability to memorize ideas, concepts and rules and ability to write what they have memorized.  [Content Source]

For more visit: www.amadahmad.blogspot.com