Friday, June 23, 2006
Chanakya's Quotes - Worth Learning
A person should not be too honest. Straight trees are cut first and Honest people are screwed first.
Even if a snake is not poisonous, it should pretend to be venomous.
There is some self-interest behind every friendship. There is no friendship without self-interests. This is a bitter truth.
Before you start some work, always ask yourself three questions - Why am I doing it, What the results might be and Will I be successful. Only when you think deeply and find satisfactory answers to these questions, go ahead.
As soon as the fear approaches near, attack and destroy it.
The world's biggest power is the youth and beauty of a woman.
Once you start a working on something, don't be afraid of failure and don't abandon it. People who work sincerely are the happiest
The fragrance of flowers spreads only in the direction of the wind. But the goodness of a person spreads in all direction.
Whores don't live in company of poor men, citizens never support a weak company and birds don't build nests on a tree that doesn't bear fruits.
God is not present in idols. Your feelings are your god. The soul is your temple.
A man is great by deeds, not by birth.
Never make friends with people who are above or below you in status. Such friendships will never give you any happiness.
Treat your kid like a darling for the first five years. For the next five years, scold them. By the time they turn sixteen, treat them like a friend. Your grown up children are your best friends.
Books are as useful to a stupid person as a mirror is useful to a blind person.
Education is the best friend. An educated person is respected everywhere. Education beats the beauty and the youth.
Home
Sunday, June 18, 2006
Interactive performance comparison Chart
VGA Chart
This page is updated on a regular basis and provides a unique resource for everybody who is looking for a graphics card. VGA Chart
CPU Charts
The interactive CPU Charts provide a true performance comparison between AMD and Intel processors. They allow ambitious users as well as decision makers and dealers to compare their favorite products in 20+ benchmark disciplines.
Hard Disk Chart
This page is updated on a regular basis and provides a unique resource for everybody who is looking for a hard drive - whether it is for home or for business use. Our new service is free and allows for interactive performance comparison, real-time price/performance and costs per Gigabyte analysis. Please have a look at 15 benchmark categories including transfer performance, random access time, interface bandwidth, I/O performance evaluation and more.
Router Chart
Key: Performance Chart, Performance Comparison , Hardware Performance
SONY ENTERS THE D-SLR CAMERA MARKET
Sony is jumping into the digital single lens reflex (D-SLR) camera market with the introduction of the a (alpha) DSLR-A100 system. The system combines advanced SLR features with other Sony digital imaging innovations. With its 10.2-megapixel APS CCD image sensor, the DSLR-A100 camera is expected to have the highest resolution available in its class. It will be introduced with 19 high-quality Sony lenses, and will be compatible with most of the former Konica-Minolta Maxxum® mount lenses. The system will include a wide range of accessories as well.
Sony developed a new Dynamic Range Optimizer image analysis technology to provide exceptional picture quality and natural color reproduction, along with a new Bionz image processing engine. This new engine supports a continuous burst mode for fast-action shooting and performs intelligent power management. “Our system will be attractive to people who are ready for something beyond what’s available in D-SLR cameras today,” said James Neal, director of marketing for digital imaging products at Sony Electronics. “Sony enthusiasts who want to upgrade from point-and-shoot cameras, as well as former Konica-Minolta digital and film SLR camera users who have already made substantial investments in lenses, will welcome this initiative.”
The DSLR-A100 camera body will be available for about $900. The DSLR-A100K kit, which includes the camera body along with an 18-70mm zoom lens, will be available for about $1,000. Both ship in July'06 and will be available at SonyStyle.com, Sony Style retail stores (www.sonystyle.com/retail), and authorized dealers nationwide. Pre-orders begin online today at www.sonystyle.com/dslr.
Read more details...
Home
Key: Digital Cameras
Sony unveils world's smallest projector
Read...
Home
New LCD Technology Outperforms CRT
Read...
Home
Bill Gates' Legacy: Microsoft's Top 10 Flops
2.Windows ME
3.Tablet PC/Pen Computing/eBooks
4.SPOT watches
5.Microsoft Money
6.DOS 4.0: MS-DOS
7.Microsoft TV
8.MSNBC partnership/Microsoft as a content player
9.Live Meeting web conferencing software
10.No Microsoft Linux!
Read in detail...
Home
Saturday, June 17, 2006
World Cup
Thursday, June 15, 2006
How to Backup your Blog
It maintains a copy of your blog on to your PC just load and synchronize blog
it will update with latest blog posting and then you can export
its free and its good and very simple try it your self
Home
How To - Previous Post (Improving your search results)
See how people are watching you
Monitor who's visiting your website?
What are Visitors doing ?
where do they come from ( for these to see you, goto google/yahoo search
for opentracker, click on opentracker.net in the search result, then click on SEE WHAT)
you will be shown with your national flag, and the site name from where you came
So they know who you are and what are you doing.
OPENTRACKER.NET
the link below shows you exactly what details people will come to know about you
About You
Home
Wednesday, June 14, 2006
Word Power
But if you study to understand, you will remember.”
- Anonymous
" Practice makes permanent NOT perfect" - Warren Buffett
"No problem can withstand the assault of thinking"- Voltaire
“We are drowning in information and starving in knowledge”
– Rutherfold D Rogers
“Education is our greatest opportunity to give an
irrevocable gift to our children”- Ernie Fletcher
Home Previuos Post
Improving Your Search Results
Using quotation marks (" ") is a powerful way to limit search results. I use quotation marks when I only want search results that match a complete phrase, e.g., "bottle washing machine."
In the above example, only pages that have the words bottle, washing and machine next to each other (and in this specific order) will be included within search results.
How do I mark important keywords?
Using multiple keywords for a search will return search results containing each and every keyword entered, i.e., word 1 and word 2 and word 3. If you would like a particular word to feature more heavily within you search results, a plus sign (+) can be used to tell the search engine which word you consider to be the most important.
It is important to remember that plus (+) signs must be preceded by a space and must touch the word that they relate to.
Is there a way to filter my search results?
Sometimes I find that it is necessary to remove closely related items from my search results. This is done with the use of a minus sign (-) which is a very powerful way to remove words that you do not want to appear in your search results.
In the above example, the search engine will disregard any results for laptop computers that contain the word "adapter." When using minus signs to remove words from search results, you must remember that the minus sign needs to be preceded by a space and must touch the word/phrase that you want to remove from search results, i.e., -notebook computer is not the same as -"note book computer". In the first example, only the word notebook will be excluded.
How can I make my search more broad?
When I want to broaden my search results, I use an asterisk (*) to act as as either a number or letter. Wildcards are used by placing them at the end of a word or partial word. For example, note* would return search results starting with note, including note or notebook or notepad, etc.
Glossary
Keyword: A word or phrase used when searching for information in search engines.
Wildcard: A special character such as an asterisk (*) or a question mark (?) that can be used to represent one or more characters in a word or term entered into a search query.
by Milton Zhang
Home How To - Previous Post
The Definitions of Battery Glossary
Ampere-hours (Ah):
Capacity: The quantity of electricity delivered by a battery under specified conditions, usually expressed in ampere-hours (Ah).
Cycle Life: The total number of charge/discharge cycles the cell can sustain before it becomes no longer operative (Usually, A battery is considered non-usable if its nominal capacity falls below 60% ~ 80%).
and many more Electrode,Electrolyte, Energy density, Internal resistance,Load current, Milliampere-hour, Negative delta V (NDV), Nickel cadmium (NiCAD) battery, Nominal voltage, OhmtestTM: Primary battery, Secondary battery Self-discharge, Trickle charge and Voltage
Tuesday, June 13, 2006
It is not a good idea to mix new and old batteries
If you’ve chosen the latter, you’ve made the wrong decision. Mixing old and new batteries doesn’t save you money; in fact, it could cost you more money and potentially damage your device! How? Read it....
HOME
Learn How to Write a White Paper
This paper's objective is to guide you in the process of developing effective white papers and persuasive business documents. Read....
Da Vinci Decoded
Vantage point for .NET
From RegDeveloper: "Where would the world be without the "80:20 rule" and the IT industry's attempts to fix its many and varied applications? Two fixes are being attempted with one package with the introduction of Compuware's implementation of Vantage for .NET at Microsoft's TechEd today. Given the inevitable position .NET-based applications will have in many enterprise environments, Compuware has now made the obvious move of building a .NET-compliant agent to monitor those applications as well. For IT managements, this then brings the advantage of tracking process flows between applications interoperating across Java and .NET." Read....
The Universal Thread
read monthly issues of Universal Thread Magazine UTMag.Com for VFP (Visual Foxpro)
and Level Extreme .NET Magazine for Miscrosoft Visual Studio .Net. Now its free for all
June Issue:
The Universal Thread Magazine June issue has been released. Les Pinter, Rodolfo Duarte and Nick Neklioudov monthly columns are present. Our technical articles include "Advanced pie charts with GDI+", "Building VFP applications that receives updates from MySQL database through HTTP", "Using Visual SourceSafe as a WebService - Part II" and "Microsoft's Yair Alan Griver talks about Visual FoxPro".
The Level Extreme .NET Magazine June issue has been released. Martín Salías, Bonnie Berent, Kevin McNeish and Guy Barrette monthly columns are present. Our technical articles include "The TextBox and the MaskedTextbox controls", "Mere Mortals .NET Column - Working with the VS 2005 Class Designer - Part 2", "Yair Alan Griver talks about his new role at Microsoft" and "MSBuild: Automating the Build Process of .NET Applications".
Microsoft takes on Google in book search
16GB USB flash drives due this year
Charging batteries in only seconds
Adata shows solar powered USB memory key
Bulletproof USB Flash Drive
I4U Gadget Model of the Month keep watching
Monday, June 12, 2006
Best card for bad credit
Best Card for bad Credit
Credit less than perfect? We can help, apply for an x Bank MasterCard today. ???
Cricket
West Indies 215 & 10/ 1 still trialling by 363
Rain Rain Help us WI's are praying
Eight best practices in managing IT risk
- Drive operational risk management with an integrated strategy
- Quantify the impact of downtime on all key business processes
- Address availability and IT performance from a business perspective
- Instill business continuity, availability and security awareness into your corporate culture
- Replicate your IT infrastructure over an adequate geographic distance to reduce regional threats
- Audit the business continuity plans of major suppliers and customers in your supply chain
- Test and update your business continuity and availability plan every six months
- Routinely evaluate and improve critical processes such as incident management to improve service to end users
Operational risk management
HP suggests a comprehensive process to help you understand where you are now and what you need to do to build a resilient infrastructure. It starts from the perspective of your business users and includes four steps:
Step 1. Define business requirements. Evaluate the requirements of all your business processes and applications across the enterprise in regard to regulatory compliance, availability, security and business continuity. Measure the impact of downtime for each business application and process.
Step 2. Assess and prioritize risk. Conduct comprehensive, in-depth availability, security and continuity assessments to identify areas of risk and strategies for protecting your IT environment and improving IT service. Compare your practices to industry best practices recommended by ITIL and others. Identify gaps and prioritize your risks according to business impact.
Step 3. Design and implement solutions. Translate your requirements into executable solutions of technology and services encompassing storage, databases, applications, systems and networks. Build a continual service improvement plan.
Step 4. Monitor, manage and evolve. Establish IT service management policies and training to align people and processes with best practices. As your business evolves, reassess, monitor and test your continuity and availability plan.
How to achieve this Read.....HP say " that while many companies have adequate business continuity, availability and disaster recovery systems in place, only 26 percent regularly review and test their plans."
Read It..
Intrusion Proctection
- Firewalls: device or software that examines data packets and determines whether to forward or block them.
- Intrusion-Detection System (IDS) : device or software that looks for known attacks or suspicious behaviors on a network and alerts an administrator upon finding one.
- Intrusion-Prevention System (IPS): device or software that looks for and automatically blocks attacks or suspicious behavior.
Firewall Flavours
Network firewall: A firewall placed at the edge of a network to detect and block malicious traffic passing between networks.
Personal firewall: Firewall placed on a user’s machine to detect and block malicious traffic
attacking that system.
Proxy-based firewall: Creates a second, “proxy,” server through which traffic passes (and must be inspected) before it enters the enterprise or is sent to the outside world.
Stateful analysis: Evaluates not only individual packets, but also all the packets in a communications session to ensure the overall stream doesn’t contain an attack.
Blacklist: The process by which a security device compares traffic with a list of known attacks, or with domains or IP addresses from which attacks are known to have been launched, and blocks traffic on the blacklist. Anything not specifically prohibited is allowed.
Whitelist: The process by which a security device compares traffic with a list of acceptable applications, or with known safe domains or addresses, and allows them to pass. Anything not specifically allowed is blocked.
courtesy Computerworld.Com
UML Design Tool
Enterprise Architect UML 2.0 spec Readme more ...
http://www.sparxsystems.com.au/products/ea.html
MDG Integration for MS .net 2005 it brings rich modeling power of Enterprise Architect and UML 2.0 to Microsoft Visual Studio 2005, it allows you to reverse engineer and generate .Net code from UML elements using EA's template driven Code Engineering Framework. Reporting and documentation is also covered, with high-quality rich text and web-based document generation built-in.
Price watch
Computer Parts, Computer Peripherals, Computers / Notebooks, Electronics, Software and others like book, home automation, furniture
it has sub-catgorys like Motherboard, Video Cards, servers, barebones and
Many more ...
if you a have budget you can give your price range
affiliate programs
is it true all the claims $$$ pepole make or its just
chain of money making you sell (nothing, basically a ebook a concept of making money) ,
then the buyer sells (nothing)
then his upline pay x%, is this just taking money from someones pocket
keeping x% with you and rest to one who started it
I may be worng but i feel this with 50%
Is True $$$ or just an trap.
Sunday, June 11, 2006
Internet Schools
i need information
UML
Introduction to UML,UML Success Stories,UML Certification Program , UML Testing / Certification Program
Clipper Still a Live
for who hears for the first time and XDeveloper. Read more...
- CA-Clipper 5
- CA-Visual Objects, 2nd Link
- Convert your CA-Clipper, FoxPro, dBase Applications to Windows
- Harbour Harbour is a free software compiler for the xBase superset language often referred to as Clipper (the language that is implemented by the compiler CA-Clipper). Cross platform compiler run on MS-DOS, MS-Windows, OS/2 and GNU/Linux. The main advantage over other Clipper compilers is that it is free software.Decide for yourself why it has advantages for you.
- xHarbour xHarbour is a free (GPL + exception supporting Commercial applications) multi platform (DOS, Microsoft Windows, Linux (32,64), Unix (32,64), OS/X) extended Clipper compiler, offering multiple GT (Graphic Terminals), including Console drivers, as well GUI's (free such as HWGui, MiniGUI and commercial, such as Visual xHarbour, FiveWin, Xailer, as well as Hybrid Console/GUIs, like GTWvt, and GTWvw. xHarbour is 100% Clipper backward compatible, which supports many language syntax extensions, greatly extended Run-Time librarries like OLE, ODBC, MySQL, Postgress, TIpt, TXml, RegEx, HbZip, xbScript and extensive 3rd party support. xHarbour is also available as a commercial distribution from xHarbour.com Inc..
- C3 - Clipper Compatible Compiler. C3 is a xBase language compiler for 16 and 32 bit's.
- Alaska Software Xbase++ - 32-bit native code, which allows the creation of native PE executables (EXE) and dynamic-link-libraries (DLL). Because of its true 32-bit architecture, Xbase++ applications can easily be deployed as CGI programs supporting a wide range of Web-Servers.
Home
Saturday, June 10, 2006
Web Design (The Best Must See It, for Free)
As well, it has the following visit-oriented features: a platform for showcasing websites, free promotional exposure within the web design community, filtered web design news, advanced search options, customized newsletters, and a forum for peer to peer chatting.
Divine Soul
Listen to your body for the food and lifestyle suitable to you, it will not misguide you.
Limit your wants as far as possible, else you will remain involved in catering to them.
Understand the vital importance of time.
Time spent in good company and pious deeds is indeed laudable.
Pride devours noble qualities. Be careful.
God can be realised through Divine Grace, not through efforts.
Decompiler Tools
ReFox XI
It's new Windows based GUI interface allows easy viewing and restoring of source code from any version of Visual FoxPro, FoxPro and FoxBASE+ executable or compiled modules. ReFox is invaluable in situations where the source code is lost or damaged or if it is uncertain that the source code matches the compiled application. ReFox also provides a mechanism for protecting Visual FoxPro and FoxPro 2.x applications from unwanted decompilation.
ReFox reconstructs source code by splitting an EXE or APP file into components and further decompiling the compiled modules .FXP (.FOX, .MPX, .SPX, .VCX etc.) producing custom formatted source code which is functionally the same as the original, including the names of variables and procedures. Read More...
Decompilers for .NET, Decompilers for Java
Java decompilers and .NET decompilers are designed to accept an executable such as a Java class or jar file, or a .NET exe or dll file as input, and produce a compilable source file as its result.
Programs in Java or the .NET framework are easy to decompile. This is simply a reality of modern, intermediate-compiled languages. Both Java and .NET mutually share the use of expressive file syntax for delivery of executable code: bytecode in the case of Java, MSIL (Microsoft Intermediate Language) for .NET. Being much higher-level than binary machine code, the intermediate files contain identifiers and algorithms that are immediately observable and ultimately understandable.
See for yourself-- download a Java or .NET decompiler below or watch a demonstration decompiler and obfuscation demo page.
Friday, June 09, 2006
Credit Scoring
Credit Scoring
Video Encoder
Turbine Video Engine SDK version 2 - creates FLV Flash Video encoded from virtually any video format. TVE SDK may be used in server applications to automatically convert uploaded video to FLV, or it can be used to build FLV Flash video conversion into multimedia applications.
ASP Turbine - generates Flash Rich Media and PDF content from ASP and ASP.NET scripts. The perfect combination between Rich Media and powerful content access!
Some of the features
Convert Video and Audio from Virtually any Format
Easy to Use Friendly Video Timeline
Video Cropping
FLV and SWF Flash Formats
Batch Encoding
Advanced Motion Estimation
Full Control over Video Parameters and Quality
Video Frame Export to Image
State of the Art Encoding Methods
Video Frame Export to Image
Generates the HTML Page with Flash Plug-in
Audio Recording Place a Logo or Watermark over your Video Titles and Subtitles Includes a Wide Range of Visual Effects Beautiful and Fully-Customizable Players Audio Recording - Record and mix your voice comments into the encoded video. Or mix-in an external audio file.
Place a Logo or Watermark over your Video
Titles and Subtitles
Includes a Wide Range of Visual Effects
Thursday, June 08, 2006
Domain Name Basics Articles
How a Domain Name Works,What is a top-level domain (TLD), What do I do with my domain once it's been registered, What does it mean to park a domain name, what is second-level domain
Flow Chart Tutotial
http://www.smartdraw.com/tutorials/index.htm
Create Great-Looking Flowcharts & Process Flow Models with SmartDraw—Download It Free!
Computer Tips
You name the subject you have the Tips very simple good for novice
PC Buying Tips ,Laptop Tips, Windows Tips, MS Office Tips, Security Alerts, Database Tips, Pc Troubleshooting, System Tune-Up, Internet Tips, Cisco Router Tips, Backup Tips, Printing Tips, PC Cleaning Tips, Glossaries, System FAQ, Broadband Area - DSL Tips, Wireless Tips, Cable Internet Tips, Fiber Optic Tips, ATM Tips, ISP Tips, VPN Tips, Projector Tips
http://www.computerfreetips.com/
Window's How To
http://windows.ittoolbox.com/wiki/howto/
What is SSH?
SSH (Secure Shell) is a program that you can use to log in to another computer over a network so that you can execute commands on a remote machine and move files from one machine to another.
Nostradamus is Online
In May 2004, members of the Italian National Library in Rome made an amazing discovery. Buried in their archives was an unknown manuscript by the famed prophet Michel Notredame, or Nostradamus (1503-1566). This manuscript was handed down to the prophet's son and later donated by him to Pope Urban VIII. It did not surface again until now, almost four hundred years later.
Due to the pressure and scrutiny of the Inquisition, he was forced to scramble both the meaning and the order of his quatrains. He made sure humanity would not be able to use them until we had become sophisticated enough to decode them. That time has finally arrived.
Using cutting-edge data mining techniques, Dr. Michael Rathford sifted this complex word puzzle searching for significant patterns and relationships. Almost immediately, he came up with the predictive model known as The Nostradamus Code.
When the prophecies-within-prophecies are deciphered, the hidden timeline of World War III is revealed. You will read about Osama Bin Laden, the next major terrorist attack on the US, war with Iran, the nuclear destruction of Rome, a confrontation between the US and China/Russia, and great detail on the timing and the course of World War III.
"I'm afraid the making of World War III is actually taking place in front of our eyes." Prince Hassan of Jordan - March 26, 2004
Drawing on newly discovered Nostradamus manuscripts, a startling new view of the world is revealed. If you agree that signs like terrorist attacks, volatile Middle East, and a growing China could lead to WWIII - then you will find this book truly eye-opening.
With a total of eight chapters, The Nostradamus Code: World War III opens with an overview of the bewildering events currently unfolding on the world stage. You will find out why they are happening, and what you can do about them to protect yourself.
Next, the years 2006 through 2012 are explained in precise detail. Referred to by Nostradamus as the Time of Troubles, you will read hundreds of startling revelations regarding this era. The Time of Troubles is full of war, despair, and evil, but also of hope and promise. Use this book to enlighten yourself, your loved ones, your world, and your future.
CERTIFIED IN HOMELAND SECURITY
"After recently attending the CHS-IV & CHS-V courses, I felt compelled to recommend them for law enforcement, first responders, clinicians, educators, or security professionals. I have taken several weapons of mass destruction courses that taught mitigation, medical and counter-terrorism standpoints, including training for response for the Smallpox Vaccination Clinic, but none have approached the level of comprehensive content as the Level-IV and Level-V CHS courses. I will apply the knowledge and skills learned from the Level-IV and Level-V courses in my own WMD awareness courses for law enforcement, first responders and clinicians, and I feel better prepared if the Smallpox Vaccination Clinic is ever activated."
—Dr. E. Robert Bertolli, CHS-V, CMI-V (Author and lecturer in Unconventional Attack/WMD Awareness; Smallpox Vaccine Clinic response member)
9/11 Related Alternative News
Mumbai Hotels Compare
Adventures in Security (To Good)
Commentary, reviews, and tips relevant to anyone responsible for information security. Including how to build and manage a security program, editorials about the state of information security, and do’s and don’t’s based on my 23 years of IT experience.
Old Blog
Hacks and Tips for Windows XP
Software Quality Assurance Blog
IT is all about Quality Assurance. Find details on Quality Assurance, Six Sigma, CMMI, Project Management, PMP sources, QA experiences etc.
Become a Certified Software Quality Analyst (CSQA)
Know your IP address
Web Query to Reverse Lookup Country, State, City, Latitude, Longitude and ISP by IP address.
IP Address properties of your Internet Connection ( to good, full details at the end of page do scroll down )
Scientific Movie Library - Medical - 3D Medical
Foreign Exchange Currency Converter Sites
http://www.oanda.com/convert/classic this is the place to trade currencies also
Believe it or Not
Atomic theory is an ancient science. The earliest record of it can be found in Vedic texts from india which are many thousands of years old
The Secrets of OM, SWASTIKA, ALPHA and Omega
At a cosmic level the symbols of Eastern spirituality (Aumkara and Swastika) and
symbols of Western spirituality (Alpha and Omega)
In india the Deity called Ganesha presides over the Swastika and Aumkara
The alpha and omega are traditionally ascribed to Christ.
Very Useful Tool
It has a Freeware & 28 days free trail
Articels on any subject ( most of them)
and many more
Wednesday, June 07, 2006
Divine Soul
Jai Shri Krishna
Throughout our life we work and put in effort and sometimes yet cannot succeed. That is because we do not know in what direction our efforts should be directed. All our efforts aim at removing darkness, therefore we cannot succeed. If we had put a little effort for lighting the lamp, the problem would have been solved. This also applies to the effort we make for escaping from lust. According to the law of reverse effect the more you try to save yourself from it the more you will be bound by it.
A saadhak, spiritual endeavourer went to Raman Maharshi and asked: "Maharshiji! I want to be thoughtless; what do I do? Maharshiji replied, "Your beginning itself is wrong. Because wanting to become thoughtless is by itself a thought. You have begun your journey with a thought." So, leave this thought. Because, every effort of saving yourself from lust will continue to bind you in the bondage of lust. Understand this fundamental truth of life very clearly. Saadhana does not mean destroying lust. We have a word called "Upasana" meaning being in proximity of God. 'Upa' means in front of or in presence of. Hence Upasana means to sit before God. The moment Upasana occurs, the lust gets destroyed. The nearer you get to God the Upasana intensifies and the lust is sure to be diminished. The moment a lamp is lit we need not request the darkness with folded hands, "Please go away". The moment the lamp is lit, the darkness gets automatically removed.
Hari katha facilitates love for God. And as the love for God increases we get more and more detached from worldly pleasures. The night does not need to be told to go away. As soon as the Sun rises the night vanishes.
May we turn towards God, may we become directed towards Narayan.
Sanmukh hohi jeev mohi jabahin, Janma hohi adha naasahin tabahin.
We first have to become God directed. Turn yourself away from darkness. Turn towards the Lord. Begin the journey. And move confidently, why do you doubt? This lamp has already been handed over to you.
With Blessings,
Bhaishri
Divine Soul
Easy Networking
Monday, June 05, 2006
Sedna CTP
Microsoft's Blog
Defeating Polymorphic Viruses Whitepaper
http://blogs.msdn.com/kevinlam/archive/2006/06/05/618626.aspx
UML Tutorials
Divine Soul
God is not difficult to attain, it is true devotion towards God that is rare.
Celestial birth is not rare, birth as a human being is.
Sunday, June 04, 2006
Just Another Tech Blog
Tech

A Beginner's Guide to What Goes on Inside that PC
Build It: $800 Gaming PC
Killer Gaming Rig: Spring 2006
Reference - Periodic Table
Chemical data for individual elements
Patterns in the Periodic Table
A Really Cool Interactive Periodic Table
Divine Soul
Jai Shri Krishna
Man in the present times is unhappy because his thinking is wrong. He believes things to be true which in reality are untrue. He has forgotten the Truth. He runs behind falsehood not knowing where to go. He is running blindly without knowing what his destination is. His journey in life lacks planning. Like the bull in the oil mill man keeps running round and round in circles reaching nowhere.
People strive in vain during their entire lifetime chasing shadows and in the end the result that stares them in their face is a big zero. If one does not remain in touch with saints and holy people one will not attain spiritual awakening even in the twilight of one's life. One will attain awakening solely with the help of spiritual scriptures. Whatever wealth one earns through one's hard work is of no use after death. Of what use is such wealth? It does not tag along with us but remains behind. These days it remains locked up in banks.
One should earn money through ethical means. A tenth of such ethically earned money should be given away in charity. Only then your earnings get purified. The wealth that you earn ethically should be utilized besides yourself on religious and socially beneficial activities. Use it for the overall development and betterment of society. Convert your wealth into means to promote spiritual progress. Material wealth does not accompany us after our death but spiritual progress achieved with the help of material wealth remains with us even at the time of our death and carries on from life after life.
Par hit saris dharma nahin bhai, Par pidaa sam nahin adhamai.
- (Uttarakand 40/1, Ramcharit Manas)
Par hit bas jinha ke man mahin, Tinha kahun jag durlabh kachhu nahin.
- (Aranyakand 30/5, Ramcharit Manas)
There is no greater deed than working for another's benefit and there is no greater sin than causing pain to others. Some people suddenly become rich amassing wealth or attaining power. Their character however does not grow commensurate with their material progress. Their minds remain small and shallow. By adopting spiritual values in life we enrich our character. Spiritual growth should not be only a matter of discussions and precept, it should be put into practice. Scriptures have described aacharan putting into practice our action as the true test of our spirituality. It improves our life in this world as well as the next. Dharma is not a matter of discussion or debate. It has to be put into practice. Nothing is impossible for him who has worked for another's benefit. Everything is attainable for such a person in this world. For him Bhakti, Devotion, Bhukti, enjoyments and God, everything is easily attainable.
Adi Jagadguru Shankaracharyaji says that three things in life are difficult or impossible to achieve. Human birth, thirst for knowledge and company of the saints and holy people. To take birth as a human is very rare. But what is the use of human birth if the humane qualities are missing from our life? There are billions of human beings but humane qualities are rare. What use is salt if it does not taste salty or sugar if it does not taste sweet?
Without the guidance of saints and holy people we cannot get knowledge and without knowledge we can't attain liberation. Liberation is the fruit of knowledge. However man lives a mundane life and carrying the burden of living like the bulls in the oil mill. Get up, wake up and live a life of value and integrity.
With Blessings,
Bhaishri
Divine Soul
Limit your wants as far as possible, else you will remain involved in catering to them.
Understand the vital importance of time.
Time spent in good company and pious deeds is indeed laudable.
Do not treat katha merely as a lecture.
Listen to and read kathas for curing yourself from the disease of transmigration.
The journey that takes one away from the Self is sansara.
The journey that helps one centre on the Self is adhyatma.
Pride devours noble qualities. Be careful.
Conceit of knowledge is worse than lack of knowledge.
Pujya Bhaishri
Home
Cricket
WI lead by 77 runs still going strong at 381/6
run rate of 4.65 very good for a test match, only australia do that way
india is exprimenting with its blowing line
Home
My 1st Day
Sharath Shetty ( a Bunta )
born in india, mumbai( bombay) on a earthquake day (koyna )
Son Soham Shetty
Wife Neeta Shetty
Subscribe to Posts [Atom]