Author Topic: Share Informative Articles Here - सूचनाप्रद लेख  (Read 93349 times)

Ajay Tripathi (Pahari Boy)

  • Sr. Member
  • ****
  • Posts: 296
  • Karma: +3/-0
Re: Share Informative Articles Here - सूचनाप्रद लेख
« Reply #280 on: April 09, 2010, 03:18:38 PM »
भला आदमी

एक धनी पुरुष ने एक मन्दिर बनवाया। मन्दिर में भगवान् की पूजा करने के लिये एक पुजारी रखा। मन्दिर के खर्चके लिये बहुत-सी भूमि, खेत और बगीचे मन्दिर के नाम लगाये। उन्होंने ऐसे प्रबन्ध किया था कि जो मन्दिर में भूखे, दीन-दुःखी या साधु-संत आवें, वे वहाँ दो-चार दिन ठहर सकें और उनको भोजन के लिये भगवान् का प्रसाद मन्दिर से मिल जाया करे। अब उन्हें एक ऐसे मनुष्य की आवश्यकता हुई जो मन्दिर की सम्पत्ति का प्रबन्ध करे और मन्दिर के सब कामोंको ठीक-ठीक चलाता रहे।
बहुत-से लोग उस धनी पुरुष के पास आये। वे लोग जानते थे कि यदि मन्दिर की व्यवस्था का काम मिल जाय तो वेतन अच्छा मिलेगा। लेकिन उस धनी पुरुषने सबको लौटा दिया। वह सबसे कहता था—‘मुझे भला आदमी चाहिये, मैं उसको अपने-आप छाँट लूँगा।’

बहुत-से लोग मन-ही-मन उस धनी पुरुष को गालियाँ देते थे। बहुत लोग उसे मूर्ख या पागल बतलाते थे। लेकिन वह धनी पुरुष किसी की बात पर ध्यान नहीं देता था। जब मन्दिर के पट खुलते थे और लोग भगवान् के दर्शन के लिए आने लगते थे तब वह धनी पुरुष अपने मकानकी छत पर बैठकर मन्दिर में आनेवाले लोगों को चुपचाप देखा करता था।

एक दिन एक मनुष्य मन्दिर में दर्शन करने आया। उसके कपड़े मैले और फटे हुए थे। वह बहुत पढ़ा-लिखा भी नहीं जान पड़ता था। जब वह भगवान् का दर्शन करके जाने लगा तब धनी पुरुष ने उसे अपने पास बुलाया और कहा—‘क्या आप इस मन्दिर की व्यवस्था सँभालने का काम स्वीकार करेंगे ?’
वह मनुष्य बड़े आश्चर्य में पड़ गया। उसने कहा—‘मैं तो बहुत पढ़ा-लिखा नहीं हूँ। मैं इतने बड़े मन्दिर का प्रबन्ध कैसे कर सकूँगा ?’

धनी पुरुषने कहा—मुझे बहुत विद्वान नहीं चाहिये। मैं तो एक भले आदमी को मन्दिर का प्रबन्धक बनाना चाहता हूँ।’
उस मनुष्य ने कहा—‘आपने इतने मनुष्यों में मुझे ही क्यों भला आदमी माना ?’

धनी पुरुष बोला—‘मैं जानता हूँ कि आप भले आदमी हैं। मन्दिर के रास्ते में एक ईंटका टुकड़ा गड़ा रह गया था और उसका कोना ऊपर निकला था। मैं इधर बहुत दिनों से देखता था कि उस ईंट के टुकड़े की नोक से लोगों को ठोकर लगती थी। लोग गिरते थे, लुढ़कते थे और उठकर चल देते थे। आपको उस टुकड़े से ठोकर लगी नहीं; किंतु आपने उसे देखकर ही उखाड़ देने का यत्न किया। मैं देख रहा था कि आप मेरे मजदूर से फावड़ा माँगकर ले गये और उस टुकड़े को खोदकर आपने वहाँ की भूमि भी बराबर कर दी।’
उस मनुष्य ने कहा—यह तो कोई बात नहीं है। रास्ते में पड़े काँटे, कंकड़ और ठोकर लगने योग्य पत्थर, ईंटों को हटा देना तो प्रत्येक मनुष्य का कर्तव्य है।’
धनी पुरुषने कहा—‘अपसे कर्तव्यको जानने और पालन करनेवाले लोग ही भले आदमी होते है।’
वह मनुष्य मन्दिर का प्रबन्धक बन गया। उसने मन्दिर का बड़ा सुन्दर प्रबन्ध किया।

एम.एस. मेहता /M S Mehta 9910532720

  • Core Team
  • Hero Member
  • *******
  • Posts: 40,912
  • Karma: +76/-0
CYBER CRIME & CYBER TERRORISM: The need to know Cyber Laws
« Reply #281 on: April 20, 2010, 08:04:48 AM »


CYBER CRIME & CYBER TERRORISM: The need to know Cyber Laws

Mistakes like straws float on the surface
One who wants pearls must dive deep below

Cyber law has emerged as a field for a new crop of professionals who may be called Techno-legal specialists. Since the emerging Digital Era indicates that There is no business without e-business, there will be no room for corporate professionals without a basic understanding of Cyber Laws Hence cyber law literacy amongst professionals as Chartered Accountants, Company Secretaries, Bankers, Insurance professionals, Law Enforcement Officers, and E-governance officials is as essential as the study of Company law or corporate law .

Cyber laws are required to combat cyber crime and cyber terrorism and this Article endeavours to delve deeper into the subject to understand various other nuances of Information technology Act,2000 which the Company Secretaries should be apprised of.

The Modern Thief can steal more with a computer than with a gun
Cyber Crime is a crime where cyberspace is used either as a tool ,target or both. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts. Cyber crime also includes non-monetary offences ,such a s creating and distributing viruses on other computers or posting confidential business information on the Internet. However the most prominent form of cyber crime is identity theft, in which criminals use the internet to steal personal information from other users.
The first recorded Cyber crime took place in the year 1820. In 1820, Joseph Marie Jacquard, a textile manufacturer in France ,produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquards employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of new technology. This is the first recorded Cyber Crime

Reasons for Cyber Crime

1) Data storage in small space

Removal or deriving information through physical or virtual medium makes it much easier.


Computer system is difficult to guard from unauthorized access. A logic bomb could be secretly implanted and key loggers can steal access codes. Advanced voice recorders, retina images etc. can fool biometric systems and bypass firewalls to get past many a security system.


Who are the Usual Cyber Criminals

1.Children and adolescents between the age group of 6-18 years : This delinquent behavior pattern in children is mostly due to inquisitiveness to know and explore things. Other reasons may be psychological or the thirst to prove themselves outstanding amongst other children in their group.
2.Organized Hackers : The hackers who organize themselves to fulfil certain objectives like political bias, fundamentalism etc.
3.Professional Hackers: They are motivated by the colour of money. These kind of hackers are mostly employed to hack the site of rivals and get credible , reliable and valuable information.
4.Discontented Employees: This group includes people who either get sacked by their employer or are dissatisfied by their employer.

Mode and Manner of committing Cyber Crime

I. Theft of Telecommunication services: By gaining access to an Organizations telephone switchboard (PBX) individual or criminal organizations can obtain access to dial-in/dial out circuits and then make their own calls or sell call time to third parties. Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employees access code, or by using software available on the internet. In one case, computer hackers in the Unites States illegally obtained access to Scotland Yards telephone network and made 620,000 worth of international calls for which Scotland Yard was responsible.

II. Communications in furtherance of criminal conspiracies:
Activities of criminal organizations are enhanced by technology. There is evidence of telecommunications equipment being used to facilitate organized drug trafficking, gambling, prostitution, money laundering, child pornography and trade in weapons. The use of encryption technology may place criminal communications beyond the reach of law enforcement.

III. Telecommunications Piracy: Digital Technology permits reproduction & easy dissemination of print, graphics, sound and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed for free distribution has proven irresistible to many. This has caused considerable concern to owners of copyrighted material. Each year it has been estimated that losses between US$ 15 and US$ 17 billion are sustained by industry by reason of copyright infringement.

IV. Dissmination of offensive Materials: Objectionable content exists in abundance in cyberspace. This includes among much else, *ually explicit materials, racist propaganda and instructions for the fabrication of explosive devices. Cyber stalking is indulged in which persistent messages are sent to an unwilling recipient.

V. Electronic Money laundering & Tax Evasion: Electronic funds transfer has assisted in concealing and in moving the proceeds of crime. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Legitimately derived income may also be more easily concealed from taxation authorities. The development of informal banking institutions and parallel banking systems may permit central bank supervision to be bypassed, but can also facilitate the evasion of cash transaction reporting requirements in those nations which have them. With the emergence and proliferation of various technologies of electronic commerce, one can easily envisage how traditional countermeasures against money laundering and tax evasion may soon be of limited value.

VI. Cyber Terrorism/ Electronic Vandalism: Cyber Terrorism is the premeditated use of disruptive activities, or the threat thereof in cyberspace with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.

Cyber Terrorism is a global concern. Defence Planners around the world are investing substantially in information warfare means of disrupting the information technology infrastructure of defence systems. Attempts were made to disrupt the computer systems of the Sri Lankan Government and of the World Atlantic Treaty Organization during the 1999 bombing of Belgrade. In another case which illustrates the transnational reach of extortionists involved a number of German Hackers who compromised the system of an Internet Service Provider in South Florida, disabling eight of the ISPs ten servers. The offenders obtained personal information and credit card details of 10,000 subscribers and ultimately extortionists were arrested with the co-operation between the US and German Authorities.


CLASSIFICATION OF CYBER CRIME

Against Government Against individuals Against Property

I. AGAINST INDIVIDUALS: Cyber crime is effected through

a) Harassment via e-mails
b) Cyber-stalking- Following a persons movement across the internet by posting messages on the bulletin boards frequented by the victim, entering chatroom frequented by the victim, constantly bombarding the victim with e-mails
c) Dissemination of obscene materials: This may include the hosting of website containing these prohibitive materials.
d) Unauthorized control over computer system or Hacking
e) E-mail spoofing : A spoofed e-mail may be said to be one which misinterprets its origin. It shows its origin to be different from which actually it originates.

III. AGAINST PROPERTY: Cyber crime also includes computer vandalism or destruction of others property, transmission of harmful programmes. A Mumbai based upstart engineering company lost much money in the business when the rival company, stole the technical database from their computers with the help of a corporate cyber spy.

IV. AGAINST GOVERNMENT: The medium of cyberspace is being used by individuals and groups to threaten international governments as also to terrorize the citizens of a country.


Cyber Wars are real and alarming

Hackers attack with bots, viruses and Trojans instead of planes or armoured vehicles, and missiles and systematically create online trapdoors to invade servers and computers and steal banking passwords and money besides disabling communication links.

In March 2009, a cyber spy network dubbed Ghost Net allegedly used servers mainly based in China to tap into classified documents from Government and private organizations in 103 countries including computers of Tibetan exiles. China denied the claim.

In 2007 ,the US Government reportedly suffered an espionage Pearl Harbour where an unknown foreign power broke into all its high tech agencies and downloaded terabytes of information.

In May 17, 2007 the Estonian parliament, ministries, banks and media were targeted after which the North Atlantic Treaty Organization ( NTO) established the cooperative Cyber Defence Centre of Excellence ( CCDCOE) in Tallinn, Estonia.

In December 2009, a cyber attack dubbed Operation Aurora by security firm McAfee was launched from China against Google and over 20 other Companies . China denied this attack but Google said that it would shift base out of China though it is yet to do so.

Around 6000 Indian Websites were defaced in 2009 according to Indian Computer Emergency Response Team (CERT).


India not ready for Cyber war

Online security expert Vijay Mukhi concurs that India is not prepared to fight a cyber war despite the fact that most banks have their data online. In India, reason online security experts, the apathy towards strengthening online security stems from the fact that the maximum attacks we have seen are defacing a site or largely sending denial of services (DoS).But that may not be the case for long with India deciding to digitize its data and make them available to all citizens online. Setting up of State Wide Area Network (SWAN) connections and important e-governance programmes-including that of MCA 21,e-passport and e-office-are cases in point. Cyber attacks have changed over the period of years. Earlier attacks were much simpler cautions Kartik Shahani, regional director India-SAARC McAfee. His firms global threat intelligence data suggest that India has recently replaced (China, Russia and Romania) as the richest hunting ground for hackers. Shivarama Krishnan, Executive Director and partner, PwC concurs that India need to be well prepared for any eventuality. If someone wants to paralyse American Banks or the retail sector, India is the best target as most of the maintenance and operational processes are managed out of India. So indias preparedness to fight Cyberwar has to be higher.

PREVENTION OF CYBER CRIME

1. Passwords should be strictly guarded
2. Use latest and update antivirus software to guard against virus attacks
3. Use of Cyber Caf should be avoided
4. Use of firewalls may be beneficial
5. Web servers running public sites must be physically separate protected from internal corporate network
6. It is better to use a security programme that gives control over the cookies and send information back to the site as leaving the cookies unguarded might prove fatal.

Regulating Indian Cyberspace Statutory Provisions which a Company Secretary should know

Information Technology Bill passed by the Indian Parliament in may 2000 notified as the IT Act 2000 has received the assent of the president on 9th June,2000.This Act provides legal recognition for electronic commerce and accords stringent punishments to cyber criminals.

Cyber contravention may result in civil prosecution and the judicial proceedings are carried before the adjudicating officer. Offenders are liable to pay damages depending on the nature of offence by way of compensation to the victim upto an amount not exceeding Rupees 1 crore. Section 65 to 74 of the IT Act deal with various offences. Cyber offences may result in criminal prosecution ,the offender liable to punishment with fine or imprisonment or both. The offences are classified into cognizable or non-cognizable and bailable or non-bailable. Section 45 provides for residuary penalty for offences under section 43 & 44. Residuary penalty is limited to Rs.25000/-.

OFFENCES COVERED UNDER IPC & SPECIAL LAWS

1. Sec 503 IPC- Criminal Intimidation : Sending threatening messages by e-mail
Whoever threatens another with any injury to his person, reputation or property, or to the person or reputation of anyone in whom that person is interested, with intent to cause alarm to that person, commits criminal intimidation.

2. Sec 499 IPC :Sending de-famatory messages by e-mail : Whoever by words either spoken or intended to be read or by signs or by visible representations,makes or publishes any imputation concerning any person intending to harm,or knowing or having reason to believe that such imputation,will harm the reputation of such person,is said to defame that person.

3. Sec 463, 464, 468,469 IPC: Forgery of electronic Records, E-mail spoofing
a. Sec 463-Forgery: Whoever makes any false documents or electronic record with intent to cause damage or injury to the public or to any person, or to enter into express or implied contract, or with intent to commit fraud ,commits forgery.

b. Sec 464- Making a false document : A person is said to make a false document or a false electronic record when he dishonestly or fraudulently makes, signs,seals or executes a document, makes or transmits any electronic record, affixes any digital signature on any electronic record, with the intention of causing it to be believed that such document, electronic record or digital signature was made, signed, sealed, executed transmitted or affixed by or by the authority of a person whom he knows that it was not made, signed, sealed, executed or affixed

c. Sec 468: Forgery for the purpose of cheating: Whoever commits forgery, intending that the document or Electronic Record forged shall be used for the purpose of cheating, shall be punished with imprisonment and liable to fine.

d. Sec 469: Whoever commits forgery intending that document or electronic record forged shall harm the reputation of any party shall be subject to imprisonment or appropriate fine.

4. Bogus Websites, Cyber Frauds:

a. Sec 420 IPC : Cheating and dishonestly inducing delivery of property
Whoever cheats and thereby dishonestly induces the person deceived, any property or makes, alters, or destroys whole or part of a valuable security shall be punished with imprisonment and also liable to fine.

b. Sec 383 IPC: Extortion:
c. Sec 500: Punishment for defamation: Whoever defames another shall be punished with simple imprisonment or liable to fine.
d. Sec 506,507 IPC: Whoever commits the offence of criminal intimidation shall be punished with imprisonment. Whoever commits the offence of criminal intimidation by an anonymous communication shall be punished with imprisonment.

5. Piracy-Sec 53, 63, 63B Copyright act

6. Obscenity- Sec 292,293,294 IPC, Indecent Representation of Women Act


7. Theft of computer hardware: Sec 378,379 IPC


IT ACT,2000
Section 77A of the IT Act provides that the offences under sections 66, 66A, 72 and 72A may be compounded by the aggrieved person.
Section 66 : If a person dishonestly or fraudulently does any act which damages the computer or the computer system, he is liable to a fine of up to five lakhs or be imprisoned for a term of up to three years. A host of new sections have been added to section 66 as sections 66A to 66F prescribing punishment for offenses such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy and cyber terrorism.
Section 66A: If any person sends by means of a computer resource or a communication any content which is grossly offensive or has a menacing character or which is not true but is sent to create nuisance, annoyance, criminal intimidation, hatred or ill will etc. shall be imprisoned for an imprisonment term which may be up to three years combined with a fine.
Section 67 of the old Act is amended to reduce the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years for first conviction and increase the fine thereof from Indian Rupees 100,000 (approximately USD 2000) to Indian Rupees 500,000 (approximately USD 10,000).
A host of new sections have been inserted as Sections 67 A to 67C. While Sections 67 A and 67 B insert penal provisions in respect of offences of publishing or transmitting material containing *ually explicit act and child pornography in electronic form, section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.
In view of the increasing threat of terrorism in the country, the new amendments include an amended section 69 giving power to the State to issue directions for interception or monitoring of decryption of any information through any computer resource. Further, sections 69 A and 69 B, two new sections, grant power to the state to issue directions for blocking for public access of any information through any computer resource and to authorize to monitor and collect traffic data or information through any computer resource for cyber security.
Section 72: If a person is found in possession of some information like electronic record, book, register, correspondence and he is found disclosing it to any third party without the consent of the person concerned, then he shall be punished with imprisonment for a term which may be up to two years, or a fine which may extend to One Lakh rupees, or with both.
Section 72A: If any person while providing services under the terms of the contract, has secured access to any material containing personal information about another person, with the intent to cause wrongful loss or wrongful gain discloses the information, without the persons consent or in breach of a lawful contract, shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
Gradation of severity of computer related offences under Section 66 has been amended, now if an offence is committed dishonestly or fraudulently then punishment is for a term which may extend to three years or a fine which may extend to Rs 5 lakhs or with both;
Section 43(A) is related to handling of sensitive personal data or information with reasonable security practices and procedures. This section has been inserted to protect sensitive personal data or information possessed, dealt or handled by a body corporate in a computer resource which such body corporate owns, controls or operates. If such body corporate is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, it shall be liable to pay damages by way of compensation to the person so affected.
Snapshot of Important Cyber law Provisions in India

Offence
Section under IT Act

Tampering with Computer source documents
Sec.65

Hacking with Computer systems, Data alteration
Sec.66

Publishing obscene information
Sec.67

Un-authorized access to protected system
Sec.70

Breach of Confidentiality and Privacy
Sec.72

Publishing false digital signature certificates
Sec.73


NOTE: Sec.78 of I.T. Act empowers Deputy Superintendent Of Police to investigate cases falling under this Act.

<!--[if !supportLineBreakNewLine]-->

Computer Related Crimes Covered under Indian Penal Code and Special Laws

Offence
Section

Sending threatening messages by email
Sec 503 IPC

Sending defamatory messages by email
Sec 499 IPC

Forgery of electronic records
Sec 463 IPC

Bogus websites, cyber frauds
Sec 420 IPC

Email spoofing
Sec 463 IPC

Web-Jacking
Sec 383 IPC

E-Mail Abuse
Sec 500 IPC

Online sale of Drugs
NDPS Act

Online sale of Arms
Arms Act

Dinesh Chandra Pathak

  • Newbie
  • *
  • Posts: 32
  • Karma: +0/-0

एम.एस. मेहता /M S Mehta 9910532720

  • Core Team
  • Hero Member
  • *******
  • Posts: 40,912
  • Karma: +76/-0
Nehru wards may get national status
« Reply #283 on: May 16, 2010, 01:50:17 PM »




Two Nehru wards situated in Uttarakhand may have some ray of hope of getting national status following renewed exercise by Delhi- based Nehru Museum. Museum’s senior officer who recently visited both sites and expressed to send a favourable report in this regard.   
Official proceedings to declare the two Nehru wards (cells where Jawaharlal Nehru was kept) at Almora jail and former Dehradun jail, as national heritage will be started soon. This has been a longstanding demand from the people of Uttarakhand as first Prime Minister of India Pandit Jawaharlal Nehru along with several well-known freedom fighters was jailed in these wards during British rule.
“Nehru ward located inside Alomra Jail is in pathetic shape. “No restoration work was carried out by the successive state governments in the cells where leaders like Jawaharlal Nehru, Acharya Narendra Dev, Khan Abdul Gaffar Khan and several known figures were kept inside these jails” informed Bhashyan Kasturi, Head Research and Publications of Nehru Museum, under union ministry of culture.
Nehru Museum should take over both these wards be declared as national heritages. I will prepare a report in this regard and recommend it to Museum director Dr Karan Singh” stated Kasturi who was in Dehradun after returning from Almora. Kasturi informed that nothing is clear as to the responsibility for the maintenance of both Nehru wards.
Almora Jails’s ward is under the jurisdiction of IG Jail while maintenance of Dehradun’s cell lies with state medical as the latter has acquired the land after Dehraun jail was shifted to another destination few years ago. Both cells can be declared as national heritage and could be kept under a centralised agency for up keep similar to Aga Khan Palace,” informed former Uttarakhand Chief minister ND Tiwari who initiated the process of adhering national heritage status to both Nehru wards.In fact a proposal for declaring Almora Jail as heritage and subsequently to be brought under the control of union government was mooted during regime nearly four years back but the files still under wrap

http://www.hindustantimes.com/Nehru-wards-may-get-national-status/Article1-544290.aspx

dramanainital

  • Full Member
  • ***
  • Posts: 171
  • Karma: +2/-0
MENTAL CONSTIPATION.
« Reply #284 on: May 21, 2010, 12:20:19 AM »
qÉÉlÉÍxÉMü MüoÄeÉ.
 
CxÉxÉå mÉWûsÉå ÌMü qÉÉlÉÍxÉMü MüoÄeÉ MüÐ oÉÉiÉ MüÃÆ zÉÉUÏËUMü MüoÄeÉ Måü oÉÉUå qÉåÇ oÉiÉÉiÉÉ cÉsÉÔð.eÉoÉ LMü eÉÉlÉuÉU AmÉlÉÉ ZÉÉrÉÉ WÒûAÉ ÌMüxÉÏ pÉÏ ÃmÉ irÉÉaÉlÉå MüÉå iÉrrÉÉU lÉ WûÉå,aÉÉåsÉÏ ZÉÉMüU pÉÏ,iÉÉå ExÉå zÉÉUÏËUMü MüoÄeÉ MüWûiÉå WæÇû.qÉÉlÉÍxÉMü MüoÄeÉ MüÉ AjÉï AÉmÉ xÉqÉfÉ WûÏ aÉrÉå WûÉåÇaÉå.rÉå xuÉlÉÉqÉkÉlrÉ oÉÑήeÉÏÌuÉrÉÉåÇ MüÉå WûÏ sÉaÉ xÉMülÉå uÉÉsÉÏ ÌoÉqÉÉUÏ Wæû.eÉÉå oÉÑήeÉÏuÉÏ lÉWûÏÇ WæÇû uÉÉå AÉaÉå mÉRèlÉå MüÐ ÄeÉWûqÉiÉ lÉ MüUåÇ.
 
MüsmÉlÉÉ MüÐÎeÉL ÌMü qÉæÇlÉå AmÉlÉÉ LMü ÌuÉcÉÉU cÉÑlÉÉ.qÉæÇ ExÉ ÌuÉcÉÉU xÉå eÉÉåÇMü MüÐ iÉUWû ÍcÉmÉMü MüU oÉæPû aÉrÉÉ.ExÉ ÌuÉcÉÉU Måü qÉѨÉÉÎssÉMü qÉåUå LMü ÍqÉ§É MüÐ UÉrÉ 'rÉxÉ oÉÉæxÉ' lÉWûÏÇ jÉÏ.ÌWûqqÉiÉ SåÎZÉL ÍqÉ§É lÉå rÉWû oÉÉiÉ qÉÑfÉå oÉiÉÉ pÉÏ SÏ.qÉÑfÉå CiÉlÉÉ ÄaÉÑxxÉÉ AÉrÉÉ ÌMü qÉÉlÉÍxÉMü MüoÄeÉ WûÉå aÉrÉÏ.iÉÉå YrÉÉ qÉæÇ pÉÏ oÉÑήeÉÏÌuÉ WûÉå aÉrÉÉ WÒðû? oÉiÉÉCL,AÉæU qÉÑfÉå CsqÉ iÉMü lÉWûÏÇ. AoÉ qÉæÇlÉå WûU aÉÉå¸Ï qÉåÇ AmÉlÉÉ E£ü ÌuÉcÉÉU WûÏUå MüÐ iÉUWû xÉÉqÉlÉå UZÉÉ.ÎeÉiÉlÉå sÉÉåaÉÉåÇ lÉå CxÉ ÌuÉcÉÉU MüÉå MüÉðcÉ oÉiÉÉrÉÉ qÉåUÏ ÌlÉaÉÉWû qÉåÇ uÉWû AÉsÉÉåcÉMü UWåû AÉæU oÉÉMüÐ oÉcÉå WûÏUÉ MüWûlÉå uÉÉsÉå, ÄerÉÉSÉiÉU qÉåUå xÉÉðrÉMüÉsÉÏlÉ ÍqÉ§É WæÇû.MüD qÉÉæMåü AÉrÉå eÉoÉ sÉaÉÉ ÌMü ÌuÉcÉÉU CiÉlÉÉ ÄMüÏqÉiÉÏ pÉÏ lÉWûÏÇ Wæû ÎeÉiÉlÉÉ qÉæÇ ExÉå xÉqÉfÉiÉÉ WÕðû.LåxÉå pÉÏ qÉÉæMåü AÉL eÉoÉ CxÉ ÌuÉcÉÉU Måü MüÉUhÉ qÉÑfÉå zÉÍqÉïlSÉ pÉÏ WûÉålÉÉ mÉÄQûÉ.CxÉ ÌuÉcÉÉU lÉå LMü ÍkÉëwiÉÉ rÉå pÉÏ MüÐ,lÉrÉå ÌuÉcÉÉUÉåÇ MüÉå eÉlqÉ sÉålÉå xÉå UÉåMüÉ.CxÉlÉå qÉåUå uÉÄYiÉ MüÉå UÉåMü ÌSrÉÉ.SÒÌlÉrÉÉ MüWûÉð xÉå MüWûÉð mÉWÒðûcÉ aÉrÉÏ qÉæÇ xÉÉUå rÉÉåaÉSÉlÉ Måü oÉÉ-uÉÄeÉÔS eÉqÉÉiÉ qÉå zÉÉÍqÉsÉ WûÉålÉå rÉÉåarÉ lÉWûÏÇ qÉÉlÉÉ aÉrÉÉ.mÉU qÉælÉå CxÉ ÌuÉcÉÉU MüÉå lÉWûÏÇ irÉÉaÉÉ.ÌSqÉÉÄaÉ Måü aÉpÉï qÉåÇ rÉå ÌuÉcÉÉU MüoÄeÉÉ MüU oÉæPûÉ Wæû.MüÉzÉ MüÉåC CxÉ MüoÄeÉ MüÉ CsÉÉeÉ RðûRû SåiÉÉ.qÉæÇ xÉqÉrÉ Måü xÉÉjÉ iÉÉå cÉsÉ mÉÉiÉÉ.mÉWûsÉå qÉæÇ CxÉ ÌuÉcÉÉU xÉå eÉÉåÇMü MüÐ iÉUWû ÍcÉmÉMüÉ jÉÉ,AoÉ rÉå qÉÑfÉ xÉå ExÉÏ iÉUWû ÍcÉmÉMüÉ Wæû.rÉå ÌuÉcÉÉU qÉåUÉ AWûqÉ oÉlÉ aÉrÉÉ Wæû.AWûqÉ oÉëWûÉxqÉÏ.rÉå qÉÉlÉÍxÉMü MüoÄeÉ MüÉ mÉrÉÉïrÉuÉÉcÉÏ Wæû.Wæû MüÉåC CsÉÉeÉ?
 
eÉoÉ qÉæÇ jÉÉ iÉoÉ WûËU lÉWûÏÇ,
AoÉ WûËU WæÇû qÉæÇ lÉÉÌWÇû.
 
ÄeÉÉuÉåS xÉÉWûoÉ MüÐ ClÉ mÉÎl£ürÉÉåÇ Måü xÉÉjÉ AÉmÉxÉå ÌuÉSÉ sÉåiÉÉ WÕðû.
 
WûwÉïuÉkÉïlÉ.
 

Ajay Tripathi (Pahari Boy)

  • Sr. Member
  • ****
  • Posts: 296
  • Karma: +3/-0
Re: Share Informative Articles Here - सूचनाप्रद लेख
« Reply #285 on: June 03, 2010, 05:28:17 PM »
Very usefull................................................

Tounge Twisters 

The World's Toughest Tongue Twister

The sixth sick sheik's sixth sheep's sick.

Peter Piper picked a peck of pickled peppers.
Did Peter Piper pick a peck of pickled peppers?
If Peter Piper picked a peck of pickled peppers,
where's the peck of pickled peppers Peter Piper picked?

Red lorry, yellow lorry, red lorry, yellow lorry.

Betty Botter had some butter,
"But," she said, "this butter's bitter.
If I bake this bitter butter,
it would make my batter bitter.

But a bit of better butter--
that would make my batter better."

So she bought a bit of butter,
better than her bitter butter,
and she baked it in her batter,
and the batter was not bitter.
So 'twas better Betty Botter
bought a bit of better butter.

Six thick thistle sticks. Six thick thistles stick.

A big black bug bit a big black bear,
made the big black bear bleed blood.

She sells sea shells by the sea shore.
The shells she sells are surely seashells.
So if she sells shells on the seashore,
I'm sure she sells seashore shells.


Shy Shelly says she shall sew sheets.


 

A bitter biting bittern
Bit a better brother bittern,
And the bitter better bittern
Bit the bitter biter back.
And the bitter bittern, bitten,
By the better bitten bittern,
Said: "I'm a bitter biter bit, alack!"

A noisy noise annoys an oyster.

Mr. See owned a saw.
And Mr. Soar owned a seesaw.
Now See's saw sawed Soar's seesaw
Before Soar saw See,
Which made Soar sore.
Had Soar seen See's saw
Before See sawed Soar's seesaw,
See's saw would not have sawed
Soar's seesaw.
So See's saw sawed Soar's seesaw.
But it was sad to see Soar so sore
Just because See's saw sawed
Soar's seesaw!

I cannot bear to see a bear
Bear down upon a hare.
When bare of hair he strips the hare,
Right there I cry, "Forbear!"

Tim, the thin twin tinsmith

I need not your needles, they're needless to me;
For kneading of noodles, 'twere needless, you see;
But did my neat knickers but need to be kneed,
I then should have need of your needles indeed.

A skunk sat on a stump and thunk the stump stunk,
but the stump thunk the skunk stunk.


hemant bangwal

  • Newbie
  • *
  • Posts: 9
  • Karma: +1/-0
Re: Share Informative Articles Here - सूचनाप्रद लेख
« Reply #286 on: June 04, 2010, 08:10:50 PM »
If you have come across any bright students coming from poor financial background who have finished their 10th standard this year (April 2010) and scored more than 80%, please ask them to contact the NGO-Prerana (supported by Infosys foundation).
 
The NGO is conducting a written test and those who clear the test will be eligible for financial help for their further studies. Please ask the students to contact the people mentioned below to get the form:
580, Shubhakar, 44th cross, 1st A main road, Jayanagar, 7th block, Bangalore
Contact numbers:
1. Ms. Saraswati - 99009 06338
2. Mr. Shivkumar - 99866 30301
3. Ms. Bindu - 99645 34667
Even if you don't know anyone, please pass on this info, someone might be in need of this help.

Thanks,
Hemant

एम.एस. मेहता /M S Mehta 9910532720

  • Core Team
  • Hero Member
  • *******
  • Posts: 40,912
  • Karma: +76/-0
                बगैर दूब कैसे होंगे मांगलिक   कार्य

कर्णप्रयाग (चमोली)। 'विष्णवादि सर्वदेवानां दूबै त्वं प्रीतिदा, यदा   क्षीरसागर संभूते वंशवृद्धिकारी भव:।' अर्थात् दूब विष्णु समेत सभी देवताओं   को प्रिय है, क्षीरसागर के समान पवित्र दूब दु:खों का नाश करने के साथ   वंशवृद्धि का फल भी देती है। शास्त्रों में वर्णित इस श्लोक से ही भारतीय   आध्यात्मिक परंपरा में दूब  का महत्व समझा जा सकता है। यही वजह है कि हिंदू   परिवारों में कोई भी धार्मिक आयोजन दूब के बिना संपन्न नहीं हो सकता।   भारतीय चिकित्सा विधा आयुर्वेद में भी दूब को बेहद कारगर माना गया है,   लेकिन अवैज्ञानिक दोहन के चलते दूब व इसकी शाकीय पादप प्रजाति कुणजा लगातार   लुप्त होती जा रही है। ऐसे में भविष्य में मांगलिक कार्यो के आयोजन में   आस्थावान लोगों को दिक्कतों का सामना करना पड़ सकता है।
 भारतीय धर्मशास्त्रों में दूब (वैज्ञानिक नाम साईनेडान डेक्टाईलोन) को   सुख-समृद्धि का सूचक माना जाता है। दूब में प्रोटीन, कार्बोहाईड्रेट,   पोटेशियम व मैग्नीशियम की प्रचुरता पाई जाती है। इसके तने व जड़ों को पीसकर   फटी बिवाइयों पर लेप करने से लाभ पहुंचता है। साथ ही यह उदर विकार व मुंह   के छाले व मासिक धर्म में भी गुणकारी मानी गयी है। इसकी शीतल प्रवृति को   आंखों के लिए भी उपयोगी बताया गया है।
 वहीं, एस्ट्रेसी कुल के शाकीय पादप कुणजा की दो प्रजातियों अर्टीमिसिया   मेरीटिमा व अर्टीमिसिया नीलेग्रीसिया को विभिन्न रोगों के औषधि निर्माण   में उपयोग किया जाता है। इन दोनों में प्रतिजैविक रसायन की मौजूदगी   फंफूदजनित रोगों में एंटीबायोटिक का कार्य करती है। ग्रामीण अंचलों में आज   भी लोग आडू व कुणजे के पत्ते के लेप का उपयोग बुखार की औषधि के रूप में   करते हैं। यह रक्तस्राव रोकने, पेट संबंधी रोगों में भी उपयोगी  है।   धार्मिक व औषधीय लिहाज से महत्वपूर्ण इन पादप प्रजातियों की पैदावार में   तेजी से गिरावट आ रही है। उच्च हिमालयी क्षेत्रों में पादपों के अवैज्ञानिक   दोहन के कारण ये वनस्पतियां लुप्त होने की कगार पर जा पहुंची हैं।



http://in.jagran.yahoo.com/news/local/uttranchal/4_5_6468380.html

   

dramanainital

  • Full Member
  • ***
  • Posts: 171
  • Karma: +2/-0
Re: Share Informative Articles Here - सूचनाप्रद लेख
« Reply #288 on: June 22, 2010, 09:48:52 AM »
ब्लैकबेरी
 
जंगल के परदेसी दुश्मन को न्योता

अरविंद शेखर, देहरादून:

पूरा देश लैंटाना, गाजर घास जैसी जंगल की दुश्मन झाडि़यों से पहले से परेशान है, पर इन सभी चिंताओं को दरकिनार कर निर्यात और किसानों की आय बढ़ाने के ख्वाब के साथ उत्तराखंड में जंगल के एक नए परदेसी दुश्मन को न्योता दे दिया गया है। स्टेट इन्फ्रास्ट्रक्चर एंड इंडस्टि्रयल डेवलपमेंट कॉरपोरेशन ऑफ उत्तराखंड लिमिटेड (सिडकुल) के पीपीपी मोड में चलने वाले एक फ्लोरिकल्चर पार्क में यूरोपियन ब्लैक बेरी को उगाया जा रहा है। लैंटाना की तरह की इस हमलावर प्रजाति की व्यावसायिक खेती की तैयारी चल रही है। योजना 200 से 400 स्थानीय किसानों को ब्लैक बेरी की पौध वितरित करने की है, ताकि वे यूरोपियन ब्लैक बेरी के पौधे अपने खेतों की मेढ़ों में उगा सकें। यूरोपियन ब्लैक बेरी ऐसी हमलावर विदेशी प्रजाति है जिसके प्रकोप से आस्ट्रेलिया जैसा देश परेशान है और इससे छुटकारा पाने के लिए तरह-तरह की योजनाएं चला रहा है। 1835 के आस-पास आस्ट्रेलिया पहुंची ब्लैक बेरी वहां के 88 लाख हेक्टेयर क्षेत्र यानी तस्मानिया से भी बड़े क्षेत्र पर प्रभुत्व स्थापित कर चुकी है। यह वहां की स्थानीय प्रजातियों का सफाया कर चुकी है। इसकी वजह से जंगलों के पेड़ कमजोर हो गए और उनसे मिलने वाली लकड़ी कम हो गई। 1998 की एक रिपोर्ट के मुताबिक आस्ट्रेलिया को जहां ब्लैकबेरी से छह लाख आस्ट्रेलियाई डॉलर का लाभ होता था, वहीं इसके मैनेजमैंट पर 421 लाख आस्ट्रेलियाई डॉलर खर्च हो जाते थे। 70 के दशक में ही आस्ट्रेलिया जैविक तरीकों से इसकी जंगल के परदेसी दुश्मन .. रोकथाम के उपाय खोज सका, मगर वे भी आज तक बहुत कामयाब नहीं हो पाए हैं। दून स्थित वन अनुसंधान संस्थान एफआरआई के वनस्पति प्रभाग के प्रमुख डॉ. सुभाष नौटियाल का कहना है कि यूरोपियन ब्लैक बेरी दो डिग्री से 30 डिग्री तापमान पर ही होती है। ठंडे पहाड़ी इलाके इसके लिए बहुत मुफीद हैं। ऐसे में यह पर्वतीय वनस्पति तंत्र के लिए खतरनाक साबित हो सकती है। मजेदार बात यह है कि नैनीताल जिले में मुक्तेश्वर के पास चाफी नामक स्थान पर इंडो-डच संयुक्त प्रोजेक्ट के एक फ्लोरिकल्चर पार्क के निदेशक एवं कृषि विशेषज्ञ सुधीर चड्ढा बताते हैं कि प्रदेश में यूरोपियन ब्लैक बेरी उत्पादन की व्यापक संभावनाएं हैं। उत्तराखंड में ब्लैकबेरी यूरोप से दो माह पहले उगाई जा सकती है। ब्लैकबेरी को उत्तराखंड में उन दिनों उगाया जा सकता है, जब यूरोप में भारी बर्फबारी होती है। उस अवधि में ब्लैकबेरी फ्रीज करके यूरोपवासियों को निर्यात की जा सकती है। किसान भी इसे उगाकर अपनी आय में बढ़ोतरी कर सकते हैं।

राजेश जोशी/rajesh.joshee

  • Sr. Member
  • ****
  • Posts: 406
  • Karma: +10/-0
Re: Share Informative Articles Here - सूचनाप्रद लेख
« Reply #289 on: June 22, 2010, 10:10:08 AM »
हर्ष, आपके इस लेख में मुझे यह बात स्पष्ट नही हो पा रही है कि यह ब्लैकबेरी के पक्ष में है या विपक्ष में जैसा कि अन्त में लिखा है कि इसका निर्यात युरोप को किया जा सकता है तो इसका क्या उपयोग है यह भी स्पष्ट नही है। अगर यह नुकसान दायक है तो किस प्रकार से नुकसानदायक यह भी पुरी तरह स्पष्ट नही है।

 

Sitemap 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22