Tuesday, November 6, 2007

JPMorgan

John Pierpont Morgan (April 17, 1837 – March 31, 1913) was an American financier, banker, philanthropist, and art collector who dominated corporate finance and industrial consolidation during his time. In 1892 Morgan arranged the merger of Edison General Electric and Thompson-Houston Electric Company to form General Electric. After financing the creation of the Federal Steel Company he merged the Carnegie Steel Company and several other steel and iron businesses to form the United States Steel Corporation in 1901. He bequeathed much of his large art collection to the Metropolitan Museum of Art in New York City and to the Wadsworth Atheneum of Hartford, Connecticut. At the height of Morgan's career during the early 1900s, he and his partners had financial investments in many large corporations. By 1901, he was one of the wealthiest men in the world. He died in Rome, Italy, in 1913 at the age of 75, leaving his fortune and business to his son, Jack Pierpont Morgan. [edit] Early life and education J.P. Morgan was born in Hartford, Connecticut to Junius Spencer Morgan (1813—1890) and Juliet Pierpont (1816—1884) of Boston, Massachusetts. Pierpont, as he preferred to be known, had a varied education due in part to interference by his father, Junius. In the fall of 1848, Pierpont transferred to the Hartford Public School and then to the Episcopal Academy in Cheshire, boarding with the principal. In September 1851, Morgan passed the entrance exam for English High School of Boston, a school specialising in mathematics to prepare young men for careers in commerce. In the spring of 1852, illness that was to become more common as his life progressed struck; rheumatic fever left him in so much pain that he could not walk. Junius booked passage for Pierpont straight away on the ship Io, owned by Charles Dabney, to the Azores (Northern Portuguese islands) in order for him to recover. After convalescing for almost a year, Pierpont returned to the school in Boston to resume his studies. After graduating, his father sent him to Bellerive, a school near the Swiss village of Vevey. When Morgan had attained fluency in French, his father sent him to the University of Göttingen in order to improve his German. Attaining a passable level of German within six months, Morgan traveled back to London via Wiesbaden, his education complete.

Thursday, October 11, 2007

I luv Tamanna (happy days heroin)

I fallen in luv @ my first sight Of Tamanna.........Wat abt u guys?she is so cute in Half saree.My heart missed a beat at that moment and I am still recovering from the after-effects,even now:-))That moment in the movie was (also my favorite scene) where-in she enters the CBIT engineering college (Hyderabad) campus wearing a traditional Telugu dress - a red coloured "langa voni".Yes !! she's breathtakingly beautiful in the movie and no wonder,the hero falls head over heels in love with her. Though there is no sea coast nearby Hyderabad in AP,she came in as a Tsunami and swept away all young guys off their feet !!"Tamanna Bhatia"plays heroine"Madhu"in "Happy Days"-the recent superhit Telugu film. Tamanna is the most talked about actresses to enter Tollywood recently.She was the "fair and lovely" TV ad girl before.She learnt drama and performed plays before that.She is "glamourous appeal,infectious smile,poise" - all rolled into one !! Her acting as "Madhu" was spontaneous.I cant have enough of the song "Arey Rey Arey Rey",so I am making this clip and dedicating it to Tamanna ------I luv her.....RAM

Tuesday, October 9, 2007

Wonderful Ad

The top 10 reasons Web sites get hacked

Back to article Print this The top 10 reasons Web sites get hacked Experts say the people who actually build Web applications aren't paying much attention to security; a non-profit group is trying to solve that By Jon Brodkin, Network World October 05, 2007 Web security is at the top of customers' minds after many well-publicized personal data breaches, but the people who actually build Web applications aren't paying much attention to security, experts say. "They're totally ignoring it," says IT consultant Joel Snyder. "When you go to your Web site design team, what you're looking for is people who are creative and able to build these interesting Web sites... That's No. 1, and No. 9 on the list would be that it's a secure Web site." The biggest problem is designers aren't building walls within Web applications to partition and validate data moving between parts of the system, he says. Security is usually something that's considered after a site is built rather than before it is designed, agrees Khalid Kark, senior analyst at Forrester. "I'd say the majority of Web sites are hackable," Kark says. "The crux of the problem is security isn't thought of at the time of creating the application." That's a big problem, and it's one the nonprofit Open Web Application Security Project (OWASP) is trying to solve. An OWASP report called "The Ten Most Critical Web Application Security Vulnerabilities" was issued this year to raise awareness about the biggest security challenges facing Web developers. The first version of the list was released in 2004, but OWASP Chairman Jeff Williams says Web security has barely improved. New technologies such as AJAX and Rich Internet Applications that make Web sites look better also create more attack surfaces, he says. Convincing businesses their Web sites are insecure is no easy task, though. "It's frustrating to me, because these flaws are so easy to find and so easy to exploit," says Williams, who is also CEO and co-founder of Aspect Security. "It's like missing a wall on a house." Here is a summary of OWASP's top 10 Web vulnerabilities, including a description of each problem, real-world examples and how to fix the flaws. 1. Cross site scripting (XSS) The problem: The "most prevalent and pernicious" Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks. Attacks are usually executed with JavaScript, letting hackers manipulate any aspect of a page. In a worst-case scenario, a hacker could steal information and impersonate a user on a bank's Web site, according to Snyder. Real-world example: PayPal was targeted last year when attackers redirected PayPal visitors to a page warning users their accounts had been compromised. Victims were redirected to a phishing site and prompted to enter PayPal login information, Social Security numbers and credit card details. PayPal said it closed the vulnerability in June 2006. How to protect users: Use a whitelist to validate all incoming data, which rejects any data that's not specified on the whitelist as being good. This approach is the opposite of blacklisting, which rejects only inputs known to be bad. Additionally, use appropriate encoding of all output data. "Validation allows the detection of attacks, and encoding prevents any successful script injection from running in the browser," OWASP says. 2. Injection flaws The problem: When user-supplied data is sent to interpreters as part of a command or query, hackers trick the interpreter -- which interprets text-based commands -- into executing unintended commands. "Injection flaws allow attackers to create, read, update, or delete any arbitrary data available to the application," OWASP writes. "In the worst-case scenario, these flaws allow an attacker to completely compromise the application and the underlying systems, even bypassing deeply nested firewalled environments." Real-world example: Russian hackers broke into a Rhode Island government Web site to steal credit card data in January 2006. Hackers claimed the SQL injection attack stole 53,000 credit card numbers, while the hosting service provider claims it was only 4,113. How to protect users: Avoid using interpreters if possible. "If you must invoke an interpreter, the key method to avoid injections is the use of safe APIs, such as strongly typed parameterized queries and object relational mapping libraries," OWASP writes. 3. Malicious file execution The problem: Hackers can perform remote code execution, remote installation of rootkits, or completely compromise a system. Any type of Web application is vulnerable if it accepts filenames or files from users. The vulnerability may be most common with PHP, a widely used scripting language for Web development. Real-world example: A teenage programmer discovered in 2002 that Guess.com was vulnerable to attacks that could steal more than 200,000 customer records from the Guess database, including names, credit card numbers and expiration dates. Guess agreed to upgrade its information security the next year after being investigated by the Federal Trade Commission. How to protect users: Don't use input supplied by users in any filename for server-based resources, such as images and script inclusions. Set firewall rules to prevent new connections to external Web sites and internal systems. 4. Insecure direct object reference The problem: Attackers manipulate direct object references to gain unauthorized access to other objects. It happens when URLs or form parameters contain references to objects such as files, directories, database records or keys. Banking Web sites commonly use a customer account number as the primary key, and may expose account numbers in the Web interface. "References to database keys are frequently exposed," OWASP writes. "An attacker can attack these parameters simply by guessing or searching for another valid key. Often, these are sequential in nature." Real-world example: An Australian Taxation Office site was hacked in 2000 by a user who changed a tax ID present in a URL to access details on 17,000 companies. The hacker e-mailed the 17,000 businesses to notify them of the security breach. How to protect users: Use an index, indirect reference map or another indirect method to avoid exposure of direct object references. If you can't avoid direct references, authorize Web site visitors before using them. 5. Cross site request forgery The problem: "Simple and devastating," this attack takes control of victim's browser when it is logged onto a Web site, and sends malicious requests to the Web application. Web sites are extremely vulnerable, partly because they tend to authorize requests based on session cookies or "remember me" functionality. Banks are potential targets. "Ninety-nine percent of the applications on the Internet are susceptible to cross site request forgery," Williams says. "Has there been an actual exploit where someone's lost money? Probably the banks don't even know. To the bank, all it looks like is a legitimate transaction from a logged-in user." Real-world example: A hacker known as Samy gained more than a million "friends" on MySpace.com with a worm in late 2005, automatically including the message "Samy is my hero" in thousands of MySpace pages. The attack itself may not have been that harmful, but it was said to demonstrate the power of combining cross site scripting with cross site request forgery. Another example that came to light one year ago exposed a Google vulnerability allowing outside sites to change a Google user's language preferences. How to protect users: Don't rely on credentials or tokens automatically submitted by browsers. "The only solution is to use a custom token that the browser will not 'remember,'" OWASP writes. 6. Information leakage and improper error handling The problem: Error messages that applications generate and display to users are useful to hackers when they violate privacy or unintentionally leak information about the program's configuration and internal workings. "Web applications will often leak information about their internal state through detailed or debug error messages. Often, this information can be leveraged to launch or even automate more powerful attacks," OWASP says. Real-world example: Information leakage goes well beyond error handling, applying also to breaches occurring when confidential data is left in plain sight. The ChoicePoint debacle in early 2005 thus falls somewhere in this category. The records of 163,000 consumers were compromised after criminals pretending to be legitimate ChoicePoint customers sought details about individuals listed in the company's database of personal information. ChoicePoint subsequently limited its sales of information products containing sensitive data. How to protect users: Use a testing tool such as OWASP'S WebScarab Project to see what errors your application generates. "Applications that have not been tested in this way will almost certainly generate unexpected error output," OWASP writes. Another tip: disable or limit detailed error handling, and don't display debug information to users. 7. Broken authentication and session management The problem: User and administrative accounts can be hijacked when applications fail to protect credentials and session tokens from beginning to end. Watch out for privacy violations and the undermining of authorization and accountability controls. "Flaws in the main authentication mechanism are not uncommon, but weaknesses are more often introduced through ancillary authentication functions such as logout, password management, timeouts, remember me, secret question and account update," OWASP writes. Real-world example: Microsoft had to eliminate a vulnerability in Hotmail that could have let malicious JavaScript programmers steal user passwords in 2002. Revealed by a networking products reseller, the flaw was vulnerable to e-mails containing Trojans that altered the Hotmail user interface, forcing users to repeatedly reenter their passwords and unwittingly send them to hackers. How to protect users: Communication and credential storage has to be secure. The SSL protocol for transmitting private documents should be the only option for authenticated parts of the application, and credentials should be stored in hashed or encrypted form. Another tip: get rid of custom cookies used for authentication or session management. 8. Insecure cryptographic storage The problem: Many Web developers fail to encrypt sensitive data in storage, even though cryptography is a key part of most Web applications. Even when encryption is present, it's often poorly designed, using inappropriate ciphers. "These flaws can lead to disclosure of sensitive data and compliance violations," OWASP writes. Real-world example: The TJX data breach that exposed 45.7 million credit and debit card numbers. A Canadian government investigation faulted TJX for failing to upgrade its data encryption system before it was targeted by electronic eavesdropping starting in July 2005. Furthermore, generate keys offline, and never transmit private keys over insecure channels. It's pretty common to store credit card numbers these days, but with a Payment Card Industry Data Security Standard https://www.pcisecuritystandards.org/ compliance deadline coming next year, OWASP says it's easier to stop storing the numbers altogether. 9. Insecure communications The problem: Similar to No. 8, this is a failure to encrypt network traffic when it's necessary to protect sensitive communications. Attackers can access unprotected conversations, including transmissions of credentials and sensitive information. For this reason, PCI standards require encryption of credit card information transmitted over the Internet. Real-world example: TJX again. Investigators believe hackers used a telescope-shaped antenna and laptop computer to steal data exchanged wirelessly between portable price-checking devices, cash registers and store computers, the Wall Street Journal reported. "The $17.4-billion retailer's wireless network had less security than many people have on their home networks," the Journal wrote. TJX was using the WEP encoding system, rather than the more robust WPA. How to protect users: Use SSL on any authenticated connection or during the transmission of sensitive data, such as user credentials, credit card details, health records and other private information. SSL or a similar encryption protocol should also be applied to client, partner, staff and administrative access to online systems. Use transport layer security or protocol level encryption to protect communications between parts of your infrastructure, such as Web servers and database systems. 10. Failure to restrict URL access The problem: Some Web pages are supposed to be restricted to a small subset of privileged users, such as administrators. Yet often there's no real protection of these pages, and hackers can find the URLs by making educated guesses. Say a URL refers to an ID number such as "123456." A hacker might say 'I wonder what's in 123457?' Williams says. The attacks targeting this vulnerability are called forced browsing, "which encompasses guessing links and brute force techniques to find unprotected pages," OWASP says. Real-world example: A hole on the Macworld Conference & Expo Web site this year let users get "Platinum" passes worth nearly $1,700 and special access to a Steve Jobs keynote speech, all for free. The flaw was code that evaluated privileges on the client but not on the server, letting people grab free passes via JavaScript on the browser, rather than the server. How to protect users: Don't assume users will be unaware of hidden URLs. All URLs and business functions should be protected by an effective access control mechanism that verifies the user's role and privileges. "Make sure this is done ... every step of the way, not just once towards the beginning of any multistep process,' OWASP advises. Print this Loading

Wednesday, October 3, 2007

SHOCKING

Very Shocking.... . This is a story of a young college girl who passed away last month in Chandigarh. Her name was Priya. She was hit by a truck. She was working in a call center. She had a boy friend named Shankar. Both of them were true lovers. They always talked on the phone. You used to be never found without her without hand phone. In fact she also Changed her cell connection from Airtel to Hutch, so that both of them can be on the same network, and save on the cost. She used to spend half of the day talking with Shankar. Priya's family knew about their relationship. Shankar was very close to Priya's family as well. (Just imagine their love). Before she passed away she always told her friends "If I pass away Please burn me with my hand phone" she also said the same thing to her Parents. After her death, people couldn't carry her body, A lot of them tried to do so But still cant everybody had tried to carry the body, the results = were the Same. Eventually, they called a person known to one of their = neighbours, who Can speak with the soul of dead person and who was a friend of her father. He took a stick and started speaking to himself slowly. After a few minutes, he said "this girl misses something here." Then her Friends told that person about her intentions to burn her with her phone. He then opened the grave box and place her phone and sim card inside the Casket. After that they tried to carry the body. It was then moved easily And they then carried her into the van. All of us were shocked. Priya's parents did not inform Shankar that Priya had passed away. After 2 weeks Shankar called Priya's mom..... Shankar:.... "Aunty, I'm coming home today. Cook something nice for me. Don't tell Priya that I'm coming home today, I wanna surprise her." Her mother replied..... "You come home first, I wanna tell you something Very important." After he came, they told him the truth about Priya. Shankar thinks That they were playing a fool. He was laughing and said = "don't try to fool Me - tell Priya to come out, i have a gift for her. Please stop this Nonsense". Then they show him the original death certificate to him. They gave him proof to make him believe. (Shankar started to sweat) He said... "It's not true. We spoke yesterday. She still calls me. Shankar was shaking. Suddenly, Shankar's phone rang. "See this is from Priya, see this...." He showed the phone to priya's family. All of them told him to answer. He talked using the loudspeaker mode. All of them heard his conversation. Loud and clear, no cross lines, no humming. It is the actual voice of Priya & there is no way others could use her sim Card since it is nailed inside the grave box they were so shocked and asked For the same person's (Who can speak with the soul of deal persons) help again. He brought his Master to solve this matter. He & his master worked for 5 hours. Then they discovered one thing which really shocked them... " " " " " " " " Hutch has the best coverage. "Where ever you go, our network follows ..... !!!" Don't shout at me I am also looking for the person who has sent me this mail....so what you can do...you should also forward this mail to all your Nears and dears...and enjoy...like i enjoyed. HAHAHAHAH A... Please don't print this e-mail unless you really need to. మీ నేస్తం RAMGOUD

Monday, October 1, 2007

डाक्टर Animations

real animations

హపి ఢెస్

HAPPY DAYS - SUPER HIT Jeevi rating: 3.5/5 Ram rating:4/5 Punchline: a journey through college days Genre: Youth Type: Straight Banner: Amigoes Creations Cast: Sandesh, Nikhil, Vamsi Krishna, Raahul, Tamanna, Gayatri Rao, Sonia, Monali Chowdary and Kamalinee Mukherjee (in a guest role) Camera: Vijay C Kumar Music: Mickey J Meyer Art: Kishore Chowksi Editing: Marthand K Vankatesh Story - screenplay - dialogues - direction: Sekhar Kammula Producer: Sekhar Kammula Release date: 29 September 2007 Review Story Chandu (Sandesh), Rajesh (Nikhil), Shankar (Vamsi Krishna), Tyson (Raahul), Madhu (Tamanna), Appu (Gayatri Rao) and Sangeeta (Monali Chowdary) are a bunch of freshers in a college. They all together make a fine gang. Chandu - Madhu, Rajesh - Appu Shankar - Sangeeta soon build up their relation and become pairs. Tyson - a nerd with a heart of gold - ends up falling in love with a senior Sravanthi (Sonia). The rest of the story is how they spend their four years of their education in the campus and express love for their respective dear ones. Artists Performance Main male leads: This film boasts of perfect casting. You see characters, not the actors. All the new comers performed in an extremely natural way. And by the time movie ends, we end up understanding the characteristics and traits of each and every one. As per the footage and likeability of the character is concerned Varun Sandesh takes the top ranking. He is extremely lovable and his striking resemblance to hero Siddhardh is an added advantage. He understood the character very well. The next is Raahul. Lots of credit should be given to Sekhar Kammula for penning such a beautiful character and Raahul suited it to the tee. Nikhil is pretty good as the tapori. He got considerable importance towards the latter half of the second half. Vamsi Krishna is a pretty good actor, but did not get enough scope to perform. The two guys who had donned the role of seniors are good. Main female leads: Tamanna is the main heroine of the film. She is very good and she oozed natural expressions in all her scenes. Gayatri Rao is also very natural and likable. However, it is Sonia who steals the show with her extremely natural and at times subtle expressions. Monali Chowdary is good as the bad girl. Kamalinee Mukherjee did the role of an extremely glamorous lecturer and she dubbed her own voice. She is cool. Technical Departments: Story - screenplay - direction: There is not much of a story in this film. It is about the love of four couples spread over four years. What makes the big difference to this simple and plain story is director's ability to create interest throughout the film with neat screenplay. He brought out tremendous emotion in the scenes of separation and reunion between the pairs. The following scenes standout: 1. The separation scene of Tyson and Sravanthi is very fascinating. 2. Rajesh’s reaction after he beats up his friend Shankar. 3. The way he ended the love thread between Tyson and Sravanthi. If Sravanthi accepted Tyson's love, then it would appear that the director is giving messages that it is ok to love your senior girls in the college. The following dialogues are so meaningful and true: 1. Love and fear can never coexist. 2. A boy's character is judged by the kind of girls he roams with. 3. The college life may fail you to achieve great academic rewards, but it will definitely give you the ability to achieve any thing. 4. College Days are Happy Days. The days that follow college days are purposeful days. However the following aspects of the film are unwarranted: 1. Rajesh's hair style in the beginning appears artificial. And he keeps using Telangana dialect though he is from Proddutur (Rayalaseema). 2. Tyson doing some scientific tricks. The extent of the tricks should have been limited. 3. The character of Panduranga Rao was introduced well. But there is no ending to that character. I could not resist from bringing the comparison of the ego clash between lead pair in this film to that of Kushi film. In that film Bhumika Chawla had a clash with Pawan because he peaked at her midriff. In this film the ego clash comes out because the guy wants to kiss the girl. Other departments: Music of the film is excellent and the two songs in the first half (music + visuals) take you to the different level. Micky J Meyer is just superb. Other department that dominates the movie is great cinematography. Visuals are a feast to the eyes. Vijay C Kumar who followed single color pattern for Anand and Godavari came up with different color sceheme for this film so that the visuals match the vibrancy of college atmosphere. Editing by Marthand K Venkatesh deserves special mention. He made sure the scenes flow in the film is smooth. Analysis: First half of the film is neat though some of us might feel that Sekhar Kammula kind of emotional scenes are not there. But in the second half of the film, he added good emotional episodes and made sure that you get connected with the film. The plus points of the film are direction, fresh cast, music, cinematography and editing. On the flip side, the pace of the film slackens at times. Sekhar Kammula who did female oriented films like Anand and Godavari came up with a film of different genre this time. The genre might be changed, but his honesty and filmmaking abilities are in tact. If he sticks to his sensibilities, Sekhar Kammula can never make a bad film. Go and watch 'Happy Days'

Friday, September 28, 2007

రాం

రాముడు మంచి బాలుఢు

जरूर जानिये

Dear friends , *Please read this article by giving 10 minutes from your busy life. Really good.... ** * * The President of India DR. A. P. J. Abdul Kalam 's Speech in Hyderabad . * Why is the media here so negative?Why are we in India so embarrassed to recognize our own strengths, our achievements? We are such a great nation. We have so many amazing success stories but we refuse to acknowledge them. Why? We are the first in milk production. We are number one in Remote sensing satellites. We are the second largest producer of wheat.We are the second largest producer of rice.Look at Dr. Sudarshan , he has transferred the tribal village into a self-sustaining, self-driving unit. There are millions of such achievements but our media is only obsessed in the bad news and failures and disasters. Iwas in Tel Aviv once and I was reading the Israeli newspaper. It was the dayafter a lot of attacks and bombardments and deaths had taken place. The Hamas had struck. But the front page of the newspaper had the picture of aJewish gentleman who in five years had transformed his desert into an orchid and a granary. It was this inspiring picture that everyone woke up to. The gory details of killings, bombardments, deaths, were inside in thenewspaper, buried among other news.In India we only read about death, sickness, terrorism, crime. Why are we so NEGATIVE? Another question: Why are we, as a nation so obsessed with foreign things? We want foreign T. Vs, we want foreign shirts. We want foreign technology.Why this obsession with everything imported. Do we not realize that self-respect comes with self-reliance? I was in Hyderabad giving this lecture,when a 14 year old girl asked me for my autograph. I asked her what her goal in life is. She replied: I want to live in a developed India . For her, you and I will have to build this developed India . You must proclaim. India is not an under-developed nation; it is a highly developed nation. Do you have 10 minutes? Allow me to come back with a vengeance. Got 10 minutes for your country? If yes, then read; otherwise, choice is yours.YOU say that our government is inefficient.YOU say that our laws are too old. YOU say that the municipality does not pick up the garbage. YOU say that the phones don't work, the railways are a joke, The airline is the worst in the world, mails never reach their destination.YOU say that our country has been fed to the dogs and is the absolute pits. YOU say, say and say. What do YOU do about it?Take a person on his way to Singapore . Give him a name - YOURS. Give him a face - YOURS. YOU walk out of the airport and you are at your International best. In Singapore you don't throw cigarette butts on the roads or eat in the stores. YOU are as proud of their Underground links as they are. You pay $5 (approx. Rs. 60) to drive through Orchard Road (equivalent of MahimCauseway or Pedder Road) between 5 PM and 8 PM. YOU come back to the parking lot to punch your parking ticket if you have over stayed in a restaurant or a shopping mall irrespective of your status identity... In Singapore youdon't say anything, DO YOU? YOU wouldn't dare to eat in public during Ramadan, in Dubai . YOU would not dare to go out without your head covered in Jeddah . YOU would not dare to buy an employee of the telephone exchange in London at 10 pounds ( Rs.650) a month to, 'see to it that my STD and ISD calls are billed to someone else.'YOU would not dare to speed beyond 55 mph (88 km/h) in Washington and then tell the traffic cop,'Jaanta hai main kaun hoon (Do you know who I am?). I am so and so's son. Take your two bucks and get lost.' YOU wouldn't chuck an empty coconut shell anywhere other than the garbage pail on the beaches in Australia and NewZealand .Why don't YOU spit Paan on the streets of Tokyo ? Why don't YOU use examination jockeys or buy fake certificates in Boston ??? We are still talking of the same YOU. YOU who can respect and conform to a foreign system in other countries but cannot in your own. You who will throw papers and cigarettes on the road the moment you touch Indian ground. If you can be an involved and appreciative citizen in an alien country, why cannot you be thesame here in India ?Once in an interview, the famous Ex-municipal commissioner of Bombay , Mr. Tinaikar , had a point to make. 'Rich people's dogs are walked on the streets to leave their affluent droppings all over the place,' he said. 'And then the same people turn around to criticize and blame the authorities for inefficiency and dirty pavements. What do they expect the officers to do? Go down with a broom every time their dog feels the pressure in his bowels?In America every dog owner has to clean up after his pet has done the job. Same in Japan . Will the Indian citizen do that here?' He's right. We go to the polls to choose a government and after that forfeit all responsibility.We sit back wanting to be pampered and expect the government to do everything for us whilst our contribution is totally negative. We expect the government to clean up but we are not going to stop chucking garbage allover the place nor are we going to stop to pick a up a stray piece of paper and throw it in the bin. We expect the railways to provide clean bathrooms but we are not going to learn the proper use of bathrooms.We want Indian Airlines and Air India to provide the best of food andtoiletries but we are not going to stop pilfering at the least opportunity. This applies even to the staff who is known not to pass on the service to the public. When it comes to burning social issues like those related towomen, dowry, girl child! and others, we make loud drawing room protestations and continue to do the reverse at home. Our excuse? 'It's the whole system which has to change, how will it matter if I alone forego mysons' rights to a dowry.' So who's going to change the system? What does a system consist of ? Very conveniently for us it consists of our neighbours, other households, other cities, other communities and thegovernment. But definitely not me and YOU. When it comes to us actually making a positive contribution to the system we lock ourselves along with our families into a safe cocoon and look into the distance at countries far away and wait for a Mr.Clean to come along & work miracles for us with a majestic sweep of his hand or we leave the country and run away. Like lazy cowards hounded by our fears we run to America to bask in their glory and praise their system. When New York becomes insecure we run to England . When England experiences unemployment, we take the next flight out to the Gulf. When the Gulf is war struck, we demand to be rescued and brought home by the Indian government. Everybody is out to abuse and rape the country. Nobody thinks of feeding the system. Our conscience is mortgaged to money.Dear Indians, The article is highly thought inductive, calls for a greatdeal of introspection and pricks one's conscience too.... I am echoing J. F. Kennedy 's words to his fellow Americans to relate to Indians..... 'ASK WHAT WE CAN DO FOR INDIAAND DO WHAT HAS TO BE DONE TO MAKE INDIA WHAT AMERICA AND OTHER WESTERN COUNTRIES ARE TODAY' Lets do what India needs from us.Forward this mail to each Indian for a change instead of sending Jokes or junk mails.Thank you,Dr. Abdul Kalaam Definately everyone can start it at least from himself/herself to follow. Being an educated Indian citizen can we follow some of the things like, putting all waste in dust bin (including cigarratte buds, chocolate wrappers.....), not spitting anywhere, trying to do some social work, denying to dowary (from each girl n boy (i.e. from both sides),though anyone is having economical problems.......)? Holding good positions n good salaries can we think to educate poor people, to help them? By forein toors can we implement some of the good things (rules, systems, new technologies) in our India? Think over this। It will take only 15 min। to think . But as everyone will try to do n encourage others to do this, after 2-3 yrs even you ll surprise to see extreme change. & then you ll b able to say ," SEE THIS IS MY INDIA, A DEVELOPED COUNTRY WHERE I CAN GET EVERYTHING BEST ." .....................................................................................................................राम

सच जानने केलिये

YOU TALK ABOUT THE PRICE HIKE IN PETROL PRODUCT, BUT HAVE YOU EVER THOUGHT WHAT CAUSES THE HIKE?? THE DEVALUE OF RUPEE AND INTERNATIONAL PRICE HIKE. WHY DEVALUE OF RUPEE?? see below... SAVE INDIA !!! U CAN MAKE A HUGE DIFFERENCE TO THE INDIAN ECONOMY BY FOLLOWING FEW SIMPLE STEPS. Please spare a couple of minutes here........for the sake of India ... our country.I got this article from one of my friend, but it's true, I can see this from day to day life, Small example,Before 5 months 1 CAN $ = IND Rs 32 After 5 months. Now it is 1 CAN $ = IND Rs 37I don't think so, Canadian Economy is booming, but Indian Economy is Going Down . Our Economy is in ur hands Do u know this, INDIAN economy is in a crisis - As you are all aware ! INDIA like many other ASIAN countries, INDIA is undergoing a severe economic crunch. Many INDIAN industries are closing down. The INDIAN economy is in a crisis and if we do not take proper steps to control those, we will be in a critical situation. More than 30000 crore rupees of foreign exchange are being siphoned out of our country on products such as cosmetics, snacks, tea, beverages...etc which are grown, produced and consumed here . A cold drink that costs only 70/80 paise to produce is sold for NINE rupees , and a major chunk of profits from these are sent abroad. This is a serious drain on INDIAN economy. Did you know that " COCA COLA " and " SPRITE " belong to the same multinational company, " COCA COLA " ? On one hand coke advertisements say that ' JO CHAHO HOJAYE, COCACOLA ENJOY' (i.e . whatever the hell, let it happen, you drink coke) ; and on the other hand, Sprite says that ' BHUJAO ONLY PYAS, BAKI ALL BAKWAS' (i.e. drinks can just quench thirst all other claims are false).What can you do ? You can consider some of the better alternatives to aerated drinks. For that matter PEPSI is also the same. You can drink LEMON JUICE, FRESH FRUIT JUICES, CHILLED LASSI (SWEET OR SOUR), BUTTER MILK, COCONUT WATER, JALJEERA, ENERJEE, MASALA MILK.......... Everyone deserves a healthy drink, including you! Over and above all this, economic sanctions have been imposed on us. We have nothing against Multinational companies, but to protect our own interests we request everybody to use INDIAN products only for next two years. With the rise in petrol prices, if we do not do this, the rupee will devalue further and we will end up paying much more for the same products in the near future.What you can do about it ? 1. Buy only products manufactured by WHOLLY INDIAN COMPANIES.2. ENROLL as many people as possible for this cause. Each individual should become a leader for this awareness. This is the only way to save our country from severe economic crisis.You don't need to give-up your lifestyle. You just need to choose an alternate product. All categories of products are available from WHOLLY INDIAN COMPANIES. LIST OF PRODUCTS1. BATHING SOAP: USE - CINTHOL & OTHER GODREJ BRANDS, SANTOOR, WIPRO SHIKAKAI, MYSORE SANDAL, MARGO, NEEM, EVITA, MEDIMIX, GANGA, NIRMA BATH & CHANDRIKA . INSTEAD OF - LUX, LIFEBOY, REXONA, LIRIL, DOVE, PEARS, HAMAM, LESANCY, CAMAY, PALMOLIVE2. TOOTH PASTE: USE - NEEM, BABOOL, PROMISE, VICO VAJRADANTI, PRUDENT, DABUR PRODUCTS,MISWAK. INSTEAD OF - COLGATE, CLOSE UP, PEPSODENT, CIBACA, FORHANS, MENTADENT . 3. TOOTH BRUSH: USE - PRUDENT, AJANTA, PROMISE. INSTEAD OF - COLGATE, CLOSE UP, PEPSODENT, FORHANS. , ORAL-B4. SHAVING CREAM: USE - GODREJ, EMANI. INSTEAD OF - PALMOLIVE, OL! D SPIICE, GILLETE.5. BLADE : USE - SUPERMAX, TOPAZ, LAZER, ASHOKA. INSTEAD OF - SEVEN-O -CLOCK, 365, GILLETTE.6. TALCUM POWDER: USE - SANTOOR, GOKUL, CINTHOL, WIPRO BABY POWDER, BOROPLUS INSTEAD OF - PONDS, OLD SPICE, JOHNSON BABY POWDER, SHOWER TO SHOWER. 7. MILK POWDER: USE - INDIANA , AMUL, AMULYA . INSTEAD OF - ANIKSPRAY, MILKANA, EVERYDAY MILK,MILKMAID.8. SHAMPOO: USE - LAKME, NIRMA, VELVET INSTEAD OF - HALO, ALL CLEAR, NYLE, SUNSILK.,HEAD AND SHOULDERS, PANTENE 9. MOBILE CONNECTIONS USE - BSNL, AIRTEL INSTEAD OF - HUTCH.And above all, CLOTHES - STOP BUYING --ALAN PAINE, PETER ENGLAND, ARROW,LOUIS PHILLIPE, LEE, REEBOK,NIKE, VAN HUESEN,CALVIN KLIEN, RAID AND TAYLOR .Do you know that the cotton is produced in the INDIAN villages, threads are produced in the INDIAN towns, dresses are stitched in INDIAN cities and clothes are purchased by INDIAN customers? But it is BRANDED as MANUFACTURED BY A MULTINATIONAL COMPANY for which we LOSE PRECIOUS FOREIGN EXCHANGE. THE POINT TO NOTE: THE MONEY IS GOING TO SOME DEVELOPED COUNTRIES . It is TRUE.PLEASE go to the remote areas of cities AND SEE FOR YOURSELF THE TRUTH. Thousands of poor innocent INDIANS are working as tailors for stitching the WORLD'S POPULAR READYMADE CLOTHES ( ALAN PAINE, PETER ENGLAND ETC.....) ,. BUT THEY ARE PAID A POOR AMOUNT. THIS IS HAPPENING BECUSE OF OUR IGNORANCE. INDIA IS ONE OF THE MAJOR TEXTILE EXPORTER IN THE WORLD. OUR TAILORS ARE FAMOUS EVEN IN COUNTRIES LIKE US AND UK. THEN WHY SHOULD WE BLINDLY GIVE IN TO THE ATTRACTION OF FOREIGN BRANDS?PLEASE THINK ABOUT IT.Every INDIAN product you buy makes a big difference. It saves INDIA. Let us take a firm decision today. BUY INDIAN TO BE INDIAN we are not against of foreign products. WE ARE NOT ANTI-MULTINATIONAL.WE ARE TRYING TO SAVE OUR NATION. EVERY DAY IS A STRUGGLE FOR A REAL FREEDOM. WE ACHIEVED OUR INDEPENDENCE AFTER LOSING MANY LIVES. THEY DIED PAINFULLY TO ENSURE THAT WE LIVE PEACEFULLY . THE CURRENT TREND IS VERY THREATENING.MULTINATIONALS CALL IT GLOBALISATION OF INDIAN ECONOMY. FOR INDIANS LIKE YOU AND ME IT IS RECOLONISATION OF INDIA. THE COLONIST'S LEFT INDIA THEN. BUT THIS TIME THEY WILL MAKE SURE THEY DON'T MAKE ANY MISTAKES.WHO WOULD LIKE TO LET A" GOOSE THAT LAYS GOLDEN EGGS " SLIP AWAY. PLEASE REMEMBER : POLITICAL FREEDOM IS USELESS WITHOUT ECONOMIC INDEPENDENCE.RUSSIA , S.KOREA, MEXICO........THE LIST IS VERY LONG!!LET US LEARN FROM THEIR EXPERIENCE AND FROM OUR HISTORY. LET US DO THE DUTY OF EVERY TRUE INDIAN. FINALLY : IT'S OBVIOUS THAT U CAN'T GIVE UP ALL OF THE ITEMS MENTIONED ABOVE, SO GIVE UP ATLEAST ONE ITEM TO FOR THE SAKE OF OUR COUNTRY. LITTLE DROPS MAKE A GREAT OCEAN. Jai Hind...............जय हिंद राम

Thursday, September 27, 2007

RAM

I am a good boy.I am so innocent.I am always help poor people in my life .I like boys and guls ,kids ,living animals of all types.I am a great devotee of Hanuman.I'm a very jovial person. I like to make friends. I trust my friends. Believe them credulously.One thing you might notice about me is, I’ll become really close to you within few days. I assume as if I know the other person for years and will talk and often get snubbed or misconstrued. I m really working on this aspect but cannot help it, after all they realize there is no mistake on my part.I love almost everyone. No bias, no penchant, nothing. I may seem to be really close with few when compared to others, that don’t mean that they are special to me. I care for my friends, I fight with them.Talkative...ppl who have met me will raise their eyebrows.... as if asking " talkative ?! you must be jokin.thats an understatement?!)... yes well... :)extremist.belive in doin wat ur doin the best you can.give it ur all attitude.whether its my passions ,my friends or family. love temporary highs. heart over mind.high aspirations. wanna live life to d fullest…..highly possesive about things i love.and i believe that one person can make a world of a difference.nd im waiting fr tht“What it counts in LIFE is not the wealth you have earned, nor the knowledge you have gained but the people who will really miss you when you are dead”