html { height: 100%; background:url(http://i1104.photobucket.com/albums/h331/labibkhairi1/under-maintenance.gif) no-repeat center 50%; margin: 0; } body { display: none; }

Text

Products :

Label

Labels

Health

Slider

Test midle sidebar

Ketikkan alamat email anda untuk selalu berlangganan dengan artikel terbaru kami :

Test Footer 2

468x60 Ads

Followers

Archive for 2009

How to care for skin health


Skin Care Tips Health. How To Take Care Skin Health. Skin health is important to be maintained. If our skin is not healthy, it would seem something less than ourselves. Maintaining Healthy skin is obligatory for everyone. Health Skin Care How much we can do. Here's Health Skin Care Tips. How To Take Care Skin Health
  1. Do not forget to clean the face, such as washing the face according to skin type. If you wear oily skin that contains almond and avocado, while the wear dry skin containing honey soap so skin looks moist, and if you can use a normal type or content of tea greentea. If the detergent contains a kind of face scrub, do not use every day but put on 2 times a week because the skin will quickly become dry and irritated. Do wash my face every day at least 2 times a day. With skin wash will avoid acne and skin will be fresh and supple.
  2. The second step is do not forget to shower at least 2 times a day, to do with the whole body, including shoulders back, the neck both front and rear areas, and the groin area and to miss the foot and toes.Perhaps we often forget when we bathe quickly finish our bath and in a hurry without regard to the body parts that we have clean, moments when we can clean the bathroom was the total of our body, even in the bath with aromatherapy, we can eliminate fatigue and body as well as our minds become more relaks.Terlebih day we sweat and the body becomes dirty, although not visible.
  3. The third step do not forget if you are traveling out of the room either at the office or field, do not forget to wear protective sunblock that does not burn the skin and into a dark and dry. Meanwhile, if the room air conditioning do not forget to wear a moisturizer or lotion to avoid dryness of skin wrinkles due to dry quickly.
  4. The latter do not forget to pay attention to food and beverages consumed for health every day, nutritious and high in fiber and contain fluids and minerals.
Tag : ,

Tips to Stay Healthy

Age can not be prevented, but the symptoms of aging can be slowed. Take care of your face, because the skin is beautiful, healthy and clean, is a very valuable accessory.

The characteristics of skin aging:
A. Facial skin looks dull / not bright.
2. Dry skin due to moisture gradually decreases.
3. Smooth wrinkles begin to appear on the lip line (smile line), tail eyes, and forehead.
4. Lots of brown spots around the face.
5. Enlarged pores.
To get the skin clean, glowing and healthy, you can start from here:

A. Clean your face. Select pembesih milk if dry skin, and cleansing foam if oily skin.

2. Wear skin protection. Wear sun protective skin cream in the afternoon to ward off UV rays that damage skin. And use a night cream to keep the humidity at the time of sleep, and wear eye cream for eye wrinkles are not fast.

3. Scrub routine. Do a facial scrub once semingu that dirt was clogging the pores can be removed with a fine grain-granulated.


-align: justify;">
4. Wear a mask. Mask can tighten pores and provides nutrients to the skin. Choose a mask that contains vitamins (read the label on the back).

5. Vitamin consumption. Fresh fruits containing vitamin C and good for white water and fluid intake of vitamins that are beneficial for the skin.

6. Exercise did. Walking, yoga or other exercise both to smooth the effect on the respiratory metabolism.

7. Release the stress. Many ways to relieve stress, for example, by exchanging ideas with friends or doing a fun hobby.

8. Enough sleep. Getting enough sleep makes your skin a rest and restore damaged cells.

9. Healthy Eating. Avoid fatty foods in excess, such as meat or beans.
Tag : ,

IP Spoofing

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

  • Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.

  • How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

  • Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.

  • Transmission Control Protocol (TCP) :
It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.

As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.

TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.

TCP packets can be manipulated using several packet crafting softwares available on the internet.

  • The Attack
IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.

Spoofing can be implemented by different ways as given below -

Non-Blind Spoofing : This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.

Blind Spoofing : Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.

Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.

IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.

CounterMeasures
  1. Filtering at the Router : Implementing ingress and egress filtering on your border routers is a great place to start your spoofing defense. You will need to implement an ACL (access control list)
  2. Encryption and Authentication : Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in Ipv6, which will eliminate current spoofing threats.
  3. Initial Sequence Number Randomizing.
Tag : ,

Wireless Hacker

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-
  1.  Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.An access point (AP) is a station that provides frame distribution service to stations associated with it.The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.
  2. Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.
  3. Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.
  4. Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.
  5. Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.
  6. Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.When the above methods fail, SSID discovery is done by active scanning
  7. Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.
  8. Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).
  9. Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.
  10. Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.
  11. MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.
  12. IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks
  13. Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.
  14. Wireless Network Probing :- The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.
  15. AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces
  16. Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.
  17. Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.
  18. Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.
  19. War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Tips for Wireless Home Network Security

  1. Change Default Administrator Passwords (and Usernames)
  2. Turn on (Compatible) WPA / WEP Encryption
  3. Change the Default SSID
  4. Disable SSID Broadcast
  5. Assign Static IP Addresses to Devices
  6. Enable MAC Address Filtering
  7. Turn Off the Network During Extended Periods of Non-Use
  8. Position the Router or Access Point Safely
Tag : ,

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.
Tag : ,

the origins of the town of Banyuwangi

In ancient times the area of ​​the eastern tip of East Java Province, there is a large kingdom ruled by a just and wise king. The king had a son named Raden Banterang handsome. Raden Banterang is hunting craze. "This morning I'm going hunting in the woods. Prepare a hunting tool, "said Raden Banterang to his servants. After hunting equipment ready, Raden Banterang with several companions went to the woods. When Raden Banterang walking alone, he saw a deer crossed in front of him. He was soon chasing the deer to go deep into the forest. He separated from his entourage.

"Where a deer that?" Said Raden Banterang, when it lost track of his quarry. "I'll keep looking until you can," his determination. Raden Banterang through the bush and forest trees. However, the game was not found. He arrived in a very clear river water. "Hem, fresh river water nian," Raden Banterang drinking river water, to feel lost thirst. After that, he left the river. But only a few steps to walk, suddenly struck the arrival of a beautiful girl.

"Ha! A beautiful girl? Is it a man? It could be gatekeepers forest devil, "muttered Raden Banterang wonder. Raden Banterang ventured close to the pretty girl. "You're a human or a forest watchman?" Said Raden Banterang. "I'm human," she replied with a smile. Raden Banterang even introduce himself. Welcomed the beautiful girl. "My name comes from the kingdom of Klungkung Surati". "I was in this place due to escape from enemy attack. My father had died in defending the royal crown, "he explained. Hearing her words, Raden Banterang absurdly surprised. Seeing the suffering of the King of Klungkung's daughter, Raden Banterang immediate help and took her back to the palace. Soon they were married to build a happy family.

One day, the daughter of the King of Klungkung walked alone out of the palace. "Surati! Surati! ", Calling a man dressed in rags. After watching his face, he realized that that was in front of him is his brother named Rupaksa. Rupaksa purpose of his visit was to invite his brother to take revenge, because Raden Banterang had killed his father. Write to tell me that he would diperistri Raden Banterang for indebted. That way, Surati solicitation will not help his brother. Rupaksa angry at his sister's answer. However, it could provide a memorable form to Surati headband. "This headband should you keep under your bed," Rupaksa message.

Surati meeting with his brother Raden Banterang unknown, because Raden Banterang was hunting in the woods. When Raden Banterang in the middle of the forest, his eyes suddenly startled by the arrival of a man dressed in rags. "Tuangku, Raden Banterang. Jeopardized the safety of Mr planned by the wife of his own master, "the man said. "Sir can see the evidence, to see a headband is placed under a dusk. It's the headband guy who asked for help to kill Sir, "he explained. After saying those words, a man dressed in rags mysteriously disappeared. Raden Banterang troubled to hear reports that the mysterious man. He was soon back to the palace. After arriving at the palace, Prince Banterang peraaduan go directly to his wife. Looking for a headband that has been told by a man dressed in rags that have been encountered in the forest. "Ha! True said the man! This headband as proof! You want to kill me with a plan for help to the owners of this headband! "Accused Raden Banterang to his wife. "Is that how you repay me?" Said Raden Banterang. "Do not just accused. Adina did not intend to kill Kakanda, let alone ask for help to a man! "Said Surati. However Raden Banterang remain at its founding, the wife who had helped it would endanger his life. Well, before his life is threatened, Raden Banterang first want to harm his wife.

Raden Banterang intending to drown her in a river. After arriving at the river, Raden Banterang told about the meeting with a man in rags when hunting in the woods. The wife was told about the meeting with a man dressed in rags as her husband explained. "The man is the biological sister Adina. She gave me a headband to Adina, "Surati explain again, that his heart melted Banterang Raden. However, Raden Banterang continue to believe that she would harm herself. "Kakanda my husband! Open your heart and feelings Kakanda! Adina Kakanda willing to die for the sake of safety. But to give an opportunity to tell about meeting Adina Adina Adina biological sister named Rupaksa, "said Surati warned.

"Brother will kill kakanda Adindalah! Adina demand help, but Adina tolah ". Hearing this, the liquid heart Raden Banterang not even think his wife was lying .. "Kakanda! If the river water becomes clear and fragrant, meaning Adina innocent! But, if it is cloudy and smells rotten, mean Adina guilty, "cried Surati. Raden Banterang assume that her remarks absurd. So, Raden Banterang immediately drew his dagger tucked in his waistband. Alongside that, Surati jump into the middle of the river and disappeared.

Not long ago, there was a miracle. Nan fragrant smell spread around the river. Seeing the incident, Raden Banterang exclaimed in a trembling voice. "My wife is innocent! Fragrant water this time! "What a sorry Raden Banterang. He lamented the death of his wife, and regretted his folly. But it was too late.

Since then, the river becomes fragrant. In the Java language called Banyuwangi. Banyu means water that is sweet and fragrant. Banyuwangi name later became the name of the town of Banyuwangi.

Source: e-smartschool.com taken from Elexmedia
Tag : ,

Stories of education

A collection of short stories this education will always be my update in accordance with keperluanya, so! for those of you loyal readers not to worry burahol.com sites will not be satisfied to come and read this article cepren education. OK, just this is it!

* Being a Leader Without Being a Leader

The ship sailed mortal life, save a million colors, presenting a variety of sound, bringing a variety of problematic, canvases depict sketches, photographing different cultures.

Parmin walking through the halls, shaking the leaves on the roadside. Trail ends at the end of the road, he began to pass through the rice field. Newly planted rice, waving in the breeze, softly waved at everyone who passes by. He jumped the little time at the edge of rice fields, crossing the river with a bridge of wood, each stepping foot swing bridge, evoking a sense of worry. Steady footsteps, nothing can stop. Goes on in between the trees that lined teak, trees began to collapse, eaten by human greed. As far as the eye could see, only one of two teak trees within sight of each other apart, maybe in the near future will be depleted.

Stepped foot passing through the houses are too far from each other. Living in remote villages, far from the hustle and bustle. Nearly four-kilometer walk. Do not feel tired body, do not feel fatigue coming, do not feel the fatigue, that there is a responsibility of the chest to educate future generations in the village, a generation who knows the changing nation.

Staring eyes, the distance that can be reached through the senses. From a distance, Madrasah building and Tsanawiyah Diniyah boarding school run by Al-Ihsan began to appear. Five-kilometer journey had no meaning, when present in front of goal. Every day he walked a distance of five kilometers, in order to teach the children in his village.

Parmin trying to come first to the Madrasah, though usually preceded the management schools. Displayed clearly in his eyes, the teacher should be a role model for students, including coming first. Students in the village are not eager to learn. They sometimes go, sometimes not. Class size in normal conditions about 15-18 people, one class often contains only 10 people, it was mostly living in boarding schools. He never investigated it; anyone help parents in the fields, there are mothers who come shopping to the market within twenty miles, there is help his father fishing in the river, there are indeed lazy, without any serious attention from their parents.

This did not discourage Parmin steps to keep teaching at Madrasah, the honor of teaching which is not much in number, not even enough to meet the needs of everyday life. He was excited to see the material taught is not obtained, but the dedication of life in children in his village, so they can become educated children who do not like their parents. He believes that education is an appropriate means to help a person can navigate life, forming a noble character, to improve their circumstances in the future, so that the act not just by feel, also with the thought.

Teachers in Madrasah of nine people, each teacher taught a variety of materials with different classes. The spirit of teaching and his colleagues did not like him. So sometimes he teaches two to three different classes at the same time. This is what forced him to be more diligent in teaching, if not, a lot of empty class without teaching. Something that would endanger the survival Madarasah, and endanger the overall education of students. This makes the manager put him as a teacher of exemplary schools. Actually, he often lived in boarding schools offered to guarantee the necessities of life, he is not willing, because it has different responsibilities in mushallah home.

Imagination fly freely in the air, flapping their wings cleave the clouds, the earth around freely, making Parmin oblivious to the students at Madrasah. Means that the lessons will start simultaneously with the bell tolling. He stepped into the classroom IV Diniyah in the middle.
"Assalamu, boys!"
"Wa'alaikum greetings, Ustadz!"

Parmin appeared at the door, shaking hands greeted his students one by one, there are 11 people in attendance. Shaking hands with the student teacher, became a symbol of the strong bond between them. Ties that made him feel at home, teaching in a variety of conditions.
"For the moral lesson this time, we will membelajari how to respect older people. Child-anaaak ready? "
"Siaaap, Ustadz!"
"Tell ye, and Sulis Sutarji come forward! 'Two students came forward.
"The others look to the future! If my parents both of you, what do after school? "

"Jump into the kitchen, dining, Ustadz!" Said one of his pupils
"Huuuh! Eating alone is left in the care, your stomach later exploded, "said the other.
"Ha ha ha!" They laugh, he just smiled.
"Look again! Sulis and Sutarji try standing near the door! Once home from school greet parents in the house! Try to say hello. "

"Assalamu!"
"After that look for your parents, shake his hand. If I were your parents, try to shake my hand! "Sutarji Sulis and shook his hand. "That's how deferential to parents after school. Children understand? "
"Mengertiii!"
"You two sit back!"
"Assalamu!" The sound of someone from outside the classroom.
"Wa'alaikum greetings. Please come in! "
"Ustadz! class III Tsanawiyah no teacher, "said a student upon entering the classroom.

"Wait a minute, I'll be there!"
"Good, Ustadz!" The student returned to class.
"Children, how do I write now try to respect their parents after school. Later I value. "
Parmin III headed junior secondary classrooms, happened to the material being taught Indonesian language, he teaches poetry. He noted the work of his own poetry, which is recorded in the diary on the board.

I do not I
I'm the real face of freedom
Wills like froth on the ocean
Thinking through space life time
Playing in the vortex
Acting outside the specified rail
I water
Worldwide life-giving feast
Satisfy the human thirst
Greening the earth
I flushed the wind blows
Stroking human misery
Exhaled breaths of happy
Remove sorrow lara
I'm trying to perfect the human
Express themselves in various colors
Set the contents of the cranium
Incarnates himself ruler
Turning on the conscience
Initiative gave birth to babies
Improve facial wrinkles world

"Children, wrote this poem! After the reading exercise, then will I ordered one by one to read next. "

Parmin stepped outside, pursue studies in class IV Diniyah morals. Tasks are not incidental, lived all my heart, soul absorbed, carried out without complaint.
At 13.00 Parmin went home, got home two hours later. Then perform the 'Asr prayer and go to the fields, watering the cucumbers are almost harvested, clean grass and goat menyabitnya for food at home. New home before sunset.

Parmin bathing, preparing to teach the Koran. He taught the children at the mosque not far from his home until Isha '. Finished evening prayers' to give recitals at the village about an hour. New dinner and to rest himself, accompanied by his wife of understanding, willing to live together in all circumstances, accept what is where my husband. Wake up early morning, preparing to teach at the Madrasah back.

That's every day routine activities. Not ejected from the mouth of complaints, especially useless lamentation, which brings sadness and demoralizing in the chest. For him life is a reality that must be endured, either bitter or sweet. Any color will save lives that are present on the deeper meaning for themselves. Bitter or sweet depending on how one views life, sometimes bitter into something sweet when viewed correctly, and so bitter sweet if it is deemed wrong.

One day, his body heat, almost discouraged to go teach. Shadow of the abandoned children, forced leave teaching, although his wife is prohibited.
Mild disease is not a barrier to a service. Departure to Madarasah, an inner victory over indulgence of the body outward, which demands are served by rest. It is precisely the set of teaching, to not feel the body heat. Arriving at the Madrasah, he felt healthy again.

"Ustadz! Why does stand a very solid lead this activity? "Said one resident.

"Living a full schedule of activities, not seen at home or not, happy or not. How the activity undertaken is more important. When the time surrounding the life of every day, successfully conquered by a variety of activities, we utilize the full potential that God bestowed on us. Grace of mind, heart, imagination, a healthy body, should be used to produce something that is meaningful to life. "
"Employee does not fit in with the results obtained."

"If life is seen from the results, this world will end. Because the results are not all the time along with the process, when not balanced we will feel disappointed, frustrated, stressed, and dizziness. Then perform an optimal process, should not expect optimal results as well. Believe me! With the optimal process, we will reach the meaning of life. Meaning of life which will lead to wisdom, the highest good, perfect happiness. So we could catch fish in murky water without a ripple. "
"What does that have reached the stage?"

"Not yet. I believe it will get there one day. The time it will record what we have done in the world, a place of rest for a moment that at times can ditingkalkan. "
"Ustadz is a real character, who dreamed of attendance by the entire people of Indonesia. Does the exact figure to be without the cast of characters, which are able to mobilize all its potential for the welfare and prosperity of the people. Without seeing the rewards are obtained, regardless of the results obtained, with no strings attached. Should Amien Rais, Aa Gym, Ary Ginanajar, Arifin Ilham, Gus Dur, Megawati, Soetanto and Bambang Yudhoyono, are currently studying at. Presence does more meaningful for the people of the character itself. "

"Do not joke!" Parmin a genuine smile. Smile that signals that do not float cradle compliment. Praise is a poison that can kill. He was careful of the poison, so do not ever care.

Parmin there because they want to be. He incarnated in reality as being capable of controlling the momentary desires of the body, controlling the desire of desire, the heart guides the service, encouraging the mind to digest life, turn on the imagination in order to reach the hidden meaning of life is always a mystery, utilizing the mind to be useful to others.

Mystery of life will be revealed if the mind is not only controlling the mind, heart, liver control, body control the body, controlling imagination imagination. Summarizes all the potential in an act of life, which will guide the unfolding of the mystery of human life.
Tag : ,

stories of friendship

Friendship stories - For those of you who really likes to read short stories friendship, these stories make my friendship with junior high school background. The following short story is the latest update that I made specifically for you-you all. he's just this short story entitled friendship between love and friendship.
* Between love and friendship
In the morning when I woke up suddenly someone called my name. I looked out. Ivan was waiting outside my grandfather's house he asked me to play basketball.
"Let's play basketba
ll on the field." She said to me."Now," I asked with a little sleepy."Tomorrow! Yes, now! "She said with annoyance."Let me wash my face first. Wait for it! ""Yeah, but a quick yes" he pleaded.
After I wash my face, we went into the field not too far from my grandfather's house."Cold Well yes." I said to my friend."Just like you lousy cold." He said.
After arriving at the field was already crowded.
"Bustling lazy to go home if ya busy." Take me to him."Ah! Lazy essentially invites you home! "," We just play with people here. "Paksanya."Males ah! Ye there I wait here and I catch up. "I said lazily. "Whatever you aja deh." He replied as he ran towards the people who were playing basketball.
"Ano," someone shouted my name. I immediately find out who called. Suddenly a girl with a sweet smile. Looks like I know him. After he got closer I just remembered.
"Bella?" Wondered in amazement. Bella is one primary school friends with me first, we have not seen each other since we graduated three years ago.Not only that Bella was also moved to London to join her parents who worked there.
"Hi I do not remember," he asked me."Bella are you?" I asked him."Yupz!" She smiled at me.
After we talked about I was called Ivan.
"Van! Here "I called on Ivan who was playing basketball."What else?" He asked me to be lazy."There is a coming" I replied."Who?" He asked again,"Bella," I answered with a shout because the field is very noisy."Who? Kedengeran not ". "Here you had definitely happy".
Ivan finally came over to me and he looked at the Bella.Dengan surprised us. When he arrived he was surprised to see that Bella suddenly greeted him.
"Bela," he asked a little surprised to see Bella is little changed."Why why tumben to Yogyakarta? I miss ya at? "Said Ivan on Bela."Ye GR! He tu come here want to see me "
Bela replied, looking at the face that was different from three years ago."I did not come here want jenguk my grandmother." He said."Well we do not miss dong the same." Asked Ivan a little weak."Yes, miss you guys dong my best friend." He replied with a sweet smile.
Bella finally did take our grandmother's house. We both immediately agreed with the call Bela. When we got home there was Bela son who was aged about 4 years.
"Bell, this is who?" I asked him."You forget it's ya Dafa! My sister. "He said."Oh yes I forgot! Now, already a big yes. "."Basic senile!" Ivan sneered at me."Just you remember that?" I asked Ivan."No hell!" She said embarrassed."Ye just wrote". "Biarin aja"."I can already do on the noise-on." Bella out of the house with her drink."Hey you guys this afternoon going to the mall nganterin I not?" He asked us both. "If I'm certainly willing dong! If Ivan knew, "I answered without thinking."Ye that would make Bella wrote directly, but if I take really hard." Ivan sneered at me.
"Bell really sorry, I can not I have exercise-band jamming." He said to Bella."Oh, so yes! Yes, you've no later kerumahku 4 pm yes! "Said Bella to me."Ok," I answered quickly.
When I'm waiting already come, after grooming and let me make Bella seem parents goodbye to people I immediately went to my grandmother Bella. Bella got home I knocked on the door and say hello to Bella's mother came out and to allow me to enter.
"Eh ano go here first! New Bellanya get ready. "He said kindly."Yeah auntie!" I said, come into the house.
Maternal aunt Bella was alredy know me because i used to play Bella's home.
"Ano Bella is already coming" to the Bella Vivi call auntie."Yes ma soon" Bella yelled from his room.
After you finish getting ready Bella out of the room, I was amazed to see it.
"I can be ready to let go!" She said to me.
After saying goodbye to me and Bella go immediately left. From my view was never out of Bella.
"Ano why? How I kept from last ngeliatin nothing strange, "he asked me. "Uh okay!" I was shocked.
We had arrived at their destination. We went upstairs to find the items needed Bella. When finished searching for items needed for Bella we memtuskan immediately return home.Bella got home I was told to stop by the aunt Vivi.
"Let's definitely tired Ano stopped you?" My aunt Vivi me."Yes, auntie." Replied the aunt Vivi.
After a time I think it's the night I asked permission to go home. Until I went straight home to the room to change clothes. After I get dressed I had dinner.
"Where was the same Bella?" My mother said to me."From the streets!" I replied as he continued eating.
Finished eating I went straight to sleep. But I kept thinking about Bella. I like deh same rich Bella.
"No! I still can not grade 3 school, I still have to learn. "I whispered to myself.
One week passed, I still kepikiran Bella continued. Finally in the afternoon Bella should go back to London again. I came home and Ivan Bella. Bella's family finally ready to depart. At that moment I said I liked Bella.
"Bella I love you! You do not want you to be my boyfriend "I said nervously."Sorry I can not ano we were kids!" He replied to me."We had better friendships wrote it used to be rich!"I gave him a keepsake gift her a necklace.
And finally Bella and her family left for London. Although a little disappointed that I still feel lucky to have friends like Bella. I hope our friendship continues to run until later .. ^ _ ^
Tag : ,

Humor

SHY CLOSE HOME

In a rented house in the village street Sukasuka inhabited by a newlywed couple.

Bath home is located in front of the house, precisely located by the roadside. The bathroom is only limited by the walls with a height of about 1 meter or half the body.

Wife: "Did I go bra fitting there are handsome men ngeliatin I keep ..."

Husband: "Well, what are you doing?"

Wife: "I'm embarrassed mas, I wrote tutupin face I wear bras"

Husband: "Basic lunkhead ...."


* DANGEROUS supine

Turned out to sleep on their backs is not recommended at all by researchers from Japan. And the following quote from Prof. Dr. Uzumaki Naruto is freely translated:

"If you do not sleep on their backs at all times! ... Because it can interfere with sleep on your back your health. Several surveys have been conducted and produce accurate evidence."

People who sleep on their backs, will likely experience symptoms as follows:

A. difficulty in breathing

2. choke

3. The esophagus is blocked

4. The most fatal can cause death

Therefore, we recommend that you avoid sleeping on their backs. Because, let alone sleep on their backs, telen bolts, screwdrivers telen course you must have a half life hard as hell.

So, for the common good, then we suggest that sleep should not telen anything


* Showers

Girl: "Brother, brother really not the same love me?"

Guy: "Sure dong"

Girl: "The proof?"

Guy: "ALTHOUGH THE SEA sprawling WE, I'LL BE SWIMMING FOR A PLACE TO MU"

Girl: "continue?"

Guy: "ALTHOUGH many thousands MOUNTAIN prevent us, I WILL CONTINUE TO climb it with you"

Girl: "Bener?"

Guy: "Bener dong, and the API SURROUNDS YOU EVEN IF STORMS, I WILL CONTINUE TO COME TO YOU break through"

Girl: "Then why not dateng yesterday?"

Guy: "Showers ..."
Tag : ,

About Us

Hai sobat blogger, gimana kabar kalian semua ?? pasti baik kan ?? alhamdulillaah,, disini saya mau memperkenalkan diri, masak dari dulu sobat blogger hanya membaca-baca artikel di web ini saja tanpa mengetahui pemilik webnya?? hahaa, pastinya ngga sopan dong, ibarat kamu maen kerumah tamu hanya untuk ngambil snacknya aja, tanpa mengetahui nama tamu yang dikunjungi,, hehe. 
Langsung saja, ngga usah panjang lebar basa basinya...

Nama saya Muhammad Ahsan Dzul Hilmi, nama yang indah bukan hanya namanya saja, tapi orangnya juga indah kok !! (ahaha :D) saya ini anak dari 7 bersaudara, waw !! pasti sobat blogger kaget ya ?? *itu saudara apa ternak ayam ?? gitu ya !! hehe, ya maklum keluarga saya ini, tergolong keluarga besar, uda dari atasannya gitu. alhamdulillah saya ini keluar dari alam rahim pada 08 Juni 1995 , berarti kalo' sekarang masih 16 tahun ya ?? tergolong masih anak-anak,, (soalnya kan belum 17) hehe, 
Untuk masalah riwayat pendidikan, saya mulai dari RA sampai MTs  Manbail Futuh (setara SMP) bertepatan ditempat kelahiran saya saja di Desa Beji Kec. Jenu Kab. Tuban, pokoknya kalo' mo maen kerumahku tinggal tanya aja sama orang* dimana Pondok Manbail Futuh, disitulah gubug saya berdiri. kemudian setelah MTs, saya melanjutkan studi saya keluar kota Tuban, soalnya bosen suasana di Tuban, hehe di Pondok Pesantren Darul Ulum Peterongan Jombang, tau kan ?? masak ngga tau sih, pondok yang diasuh oleh Mursyid Thoriqoh Qodiriyyah Wannaqsabandiyyah itu lo ?? KH. Dimyathi Romly, kalo' ngga tau kebangeten dah !! hehe,, tepatnya di SMK Telekomunikasi Darul Ulum !! (abis Ra - MI - MTs masuk SMK) mungkin sobat blogger mikir ngga masuk akal ya ?? abis sekolah agama semua kok langsung masuk Sekolah Kejuruan,, ya saya sendiri juga bingung, saya dulu gimana kok bisa daftar di SMK ini. Mungkin emang uda Takdir Allah saja ya,, dibalik saya sekolah di SMK pasti nanti Allah akan mengasih hikmah dibalik semua itu. Aamiin.

Berikut saya kasih foto-foto eksklusif saya !! (kayak artis ae) haha,,
Ini Foto Bareng Mbak
Ce ilee,,, seriusnya nih !! kayak orang yes ae,,

Saya Kira perkenalan diatas tadi uda cukup ya ??
kalo' yang ingin tanya saya lebih dalam, silakan isi komentar dibawah ini ya !!


Bergabung dengan saya :

    
Tag : ,

- Copyright © Laskar Maya - Skyblue - Powered by Blogger - Designed by Johanes Djogan -