Thursday, October 13, 2011
Jin is....
1) Jin berasal dari Jan (Bapak Jin) dan gelarannya Azazil. Dicipta dari api
(biru), dan telah beramal puluh ribu tahun lamanya .
2) Apabila Allah swt. memerintahkannya supaya tunduk menghormati Nabi Adam,
mereka telah ingkar. Allah swt. melaknat dan perintah turun ke bumi. Jin
terbahagi kepada dua iaitu Jin Islam dan Syaitan. Jin Islam pula terbahagi
kepada dua iaitu Jin Islam(Soleh) dan Jin Tidak Islam (Tidak Soleh).
Syaitan yang turun kesemuanya jahat (tidak Islam).
4) Makanannya dari Api (Asap). Itu sebab orang-orang Melayu dilarang
mengunakan kemenyan kerana Jin paling suka dengan asap yang busuk. Tetapi
orang-orang melayu ini degil, suka sangat dengan asap kemenyan. Beliau
menambah, orang-orang yang suka hisap rokok itu, adik-beradik jin lah tuu.
(terkena?? hahaha..)
5) Tempat tinggal Jin seperti di awan, sungai, hutan, lombong, laut,
tempat-tempat tinggi (KLCC), tandas dan kubur.
6) Beliau menasihat apabila ingin buang air di perjalanan (contohnya
jalanraya), perlu baca " SalaMun, 'Ala Sulaiman, Fil 'alamin." Mengikut
sirahnya jin sangat takut dengan Nabi Sulaiman. Orang-orang Melayu suka
sangat membaca ucapan, "Ampun Datuk, Anak cucu tumpang lalu" Masa bila
pulak jin dapat pangkat datuk. Dan masa bila pula, kita jadi cucu cicit jin
!!!! (terkena lagi?? hahaha..)
7) Jin tidak mengetahui akan alam ghaib, itu sebab jika ada dukun atau
bomoh yang tahu menilik-nilik nasib, pembohong...." Sirahnya apabila Nabi
Sulaiman, memerintahkan jin untuk membina istananya, sehingga Nabi Sulaiman
meninggal pun jin tidak perasan/tahu.
Semasa itu Nabi Sulaiman duduk di kerusinya dengan tongkat kayu. Dan jin
tekun membuat kerja di hadapan-nya. Sehingga anai-anai memakan tongkatnya
dan tongkat tersebut reput dan jatuh serta Nabi Sulaiman pun jatuh, maka
barulah tahu oleh jin bahawa Nabi Sulaiman telah mangkat.
Manusia juga dilarang membuang air di lombong-lombong yang airnya
tenang, terutama di waktu tengah malam. Jin suka mandi di situ, waktu itu.
Di larang juga buang air di lubang-lubang (tanah).
9) Rumah-rumah yang lama tidak berpenghuni atau rumah yang baru siap belum
duduk lagi, jin suka tinggal di situ. Sebelum duduk rumah baru, di galakkan
membaca surah Al-Baqarah, sehingga habis. Jin lari selama 3 hari. Tidak
perlu tepung tawar bagai.... orang melayu suka sangat menepung tawar !!!
10) Jika budak menangis tengah-tengah malam, azankan 7-10 kali, jika tidak
bacakan ayat Kursi dengan cara 9 kali henti (tekniknya) sebab beliau pernah
jumpa orang yang di rasuk.
* Kalau rajin.. Tolong sebarkan maklumat ini kepada saudara Muslim Muslimat
yang lain. Ilmu yang bermanfaat ialah salah satu amal yang berkekalan bagi
orang yang mengajarnya meskipun dia sudah mati.
Sunday, October 9, 2011
ABOUT THE HACKER
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals ("black hats") and computer security experts ("white hats"). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.
Part 2 Research and Information Gathering It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from Social Engineering, which will be explained below. Aside from Social Engineering hackers can also use a technique called Dumpster Diving. Dumpster Diving is when a hacker will literally dive into a dumpster in hopes to find documents that users have thrown away, which will help them gain access to a network.
Hacker attitudes
- White hat
- A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system.The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ethical hacker. The International Council of Electronic Commerce Consultants, also known as the EC-Council has developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.
- Black hat
- A Black Hat Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"(Moore,2005).Black Hat Hackers are "the epitome of all that the public fears in a computer criminal". Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. The way Black Hat Hackers choose the networks that they are going to break into is by a process that can be broken down into two parts. This is called the pre-hacking stage.
Part 2 Research and Information Gathering It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from Social Engineering, which will be explained below. Aside from Social Engineering hackers can also use a technique called Dumpster Diving. Dumpster Diving is when a hacker will literally dive into a dumpster in hopes to find documents that users have thrown away, which will help them gain access to a network.
- Grey hat
- A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.
- Elite hacker
- A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.
- Script kiddie
- A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).
Subscribe to:
Comments (Atom)

