Welcome to Pakistani Social Site

Ibn Sina (known in the West as Avicenna)

On the 7th of Ramadan in 428 Hijri (1037 AD), Muslim physician, philosopher, and father of early modern medicine, Ibn Sina (known in the West as Avicenna) died at Hamadan, Iran. Ibn Sina is known as the most influential philosopher of the pre-modern era.

Ibn Sina's full name was Abu Ali Husayn ibn abd-Allah ibn Sina. He was born in a Persian family in the village of Afshana near the Samanid capital of Bukhara.

His writing subjects include astronomy, alchemy, geography, psychology, Islamic theology and Sufism, logic, mathematics, physics, and poetry.

His encyclopedia of medicine, al-Qanun fi al-Tibb (The Canon of Medicine) remained a medical authority for centuries not just in the Islamic world but also in Medieval Europe. It was used as a standard medical textbook through the 18th century in Europe.

Ibn Sina lived during a time when Islamic civilization was at its height, and he made significant contributions to many areas of knowledge and learning.

His impact on Islamic intellectual culture can be compared to that of Plato and Aristotle in classical antiquity, or Kant in modern European philosophy, in that all subsequent thinkers had to respond to him favorably or unfavorably, explicitly or implicitly, directly or indirectly. He supplanted Aristotle as the figure who, more than any other, represented what ‘philosophy’ ( falsafa) was.

Disclaimer: This photo has been created using LLMs for educational purposes.
Comments 0
Nokia 9000 Communicator (1996)
Nokia 9000 Communicator (1996) The first official 'smartphone' to hit the market with a laptop-like design, featuring LCD display screen of 640 × 200 pixels and full QWERTY keyboard.
Comments 0
The HP Jornada 720

The HP Jornada 720 was one of the most advanced handheld PCs around the year 2000 — essentially a precursor to later keyboard-equipped smart devices, but with genuine PC-style capabilities.
In terms of hardware, the Jornada 720 runs on a 206 MHz 32-bit Intel StrongARM SA-1110 processor, paired with 32 MB of SDRAM and approximately 32 MB of ROM. For its time, this was a solid configuration, capable of running Windows CE (HPC2000) smoothly. The device measures roughly 189 × 95 × 34 mm and weighs about 510 gramsincluding the battery, giving it a sturdy, compact clamshell form factor.
The display is a 6.5-inch color screen with a resolution of 640 × 240 pixels and supports 16-bit color (65,536 colors). It features a touchscreen operated with a stylus, complemented by a comfortable three-quarter-size keyboard, which was one of its strongest advantages compared to many other PDAs of the era.
For connectivity, the Jornada 720 includes an integrated 56 kbps modem, IrDA infrared, an RS-232 serial port, and USB connectivity via a cradle. Expansion options consist of a CompactFlash (Type I) slot and a PC Card (Type II) slot. Additional features include a smart card slot, stereo speakers, a built-in microphone, and a 3.5 mm audio output jack.
Power comes from a removable lithium-ion battery, rated for up to 9 hours of use, which was impressive for a device in its class at the time.
Comments 0
DiscordRAT 2.0 – When Discord Becomes a Command
1/6 🐀 DiscordRAT 2.0 – When Discord Becomes a Command Center

DiscordRAT 2.0 is a Remote Access Trojan (RAT) that uses as its command-and-control channel.

Instead of connecting to suspicious servers, it communicates through Discord, making detection harder.

2/6 ⚙️ How It Operates

Once installed on a victim’s system, DiscordRAT connects to a hidden Discord bot.

Attackers can then remotely control the infected computer through Discord commands — silently and instantly.

It blends with normal Discord traffic.

3/6 🔥 What Attackers Can Do

• Monitor victim activity
• Access files and folders
• Capture screenshots
• Log keystrokes
• Steal credentials
• Execute remote commands

Full system control — from anywhere.

4/6 🎯 Why It's Hard to Detect

DiscordRAT is dangerous because:

• Uses trusted Discord servers
• Traffic appears legitimate
• No obvious malicious server connection
• Bypasses basic firewall rules

It hides in plain sight.

5/6 🚨 Common Infection Methods

Attackers spread it through:

• Fake cracked software
• Malicious downloads
• Phishing links
• Fake game mods or tools
• Social engineering

One careless download is enough.

6/6 🛡️ How to Stay Protected

• Avoid downloading untrusted files
• Use updated antivirus protection
• Monitor unknown background processes
• Enable firewall protection
• Be cautious with Discord downloads

Your awareness is your strongest defense.
Comments 0
UKRAINIAN MAN JAILED FOR POWERING NORTH KOREA'S
🔒 A U.S. court has sentenced Oleksandr Didenko to five years in prison for running a massive identity theft operation that helped North Korean workers land jobs at dozens of American companies. Prosecutors say the wages earned were funneled back to Pyongyang Pyongyang to support its sanctioned nuclear program.

💻 According to the U.S. Department of Justice, Didenko operated a website called Upworksell, selling or renting 870 stolen U.S. identities to overseas workers. These identities allowed North Koreans to pose as legitimate remote employees and quietly infiltrate U.S. firms.

🚨 In 2024, the FBI seized the site and redirected its traffic to government servers. Polish authorities later arrested Didenko, who was extradited to the U.S. and pleaded guilty. He also paid Americans to host so called laptop farms, enabling foreign workers to remotely control computers located inside the United States.

📊 Security firm CrowdStrike has reported a sharp rise in these North Korean IT worker schemes, calling them a triple threat. Beyond violating sanctions, the operatives allegedly steal sensitive data and later attempt corporate extortion, while also impersonating recruiters and investors to target high value victims.
Comments 0
Apk2url - OSINT tool designed to quickly extract
𝗮𝗽𝗸𝟮𝘂𝗿𝗹

It is an OSINT tool designed to quickly extract IP addresses and URLs from APK files through disassembly and decompilation processes. 🤖

Allows you to identify endpoints such as:

• URLs (http / https)
• IP addresses
• Dominions
• APIs
• Internal route
• Other patterns of interest

It is especially useful in:

🔎 Security analysis
🔬 Reverse engineering
🛡 Pentesting of mobile applications
🦠 Malware Analysis

Ideal for security investigators and mobile security professionals.

🔗 GitHub: https://github.com/n0mi1k/apk2url
Messages 1
Top 10 Ethical Hacking OS 2026 🛠️
① 🐉 Kali Linux → Industry standard
② 🦜 Parrot OS → Privacy focused
③ 📦 BackBox → Simple & fast
④ 🕶️ Tails OS → Full anonymity
⑤ 🔬 Fedora Security Lab → Research ready
⑥ 🧪 DEFT Linux → Digital forensics
⑦ 🛠️ ArchStrike → Minimal control
⑧ ⚡ Pentoo → GPU optimized
⑨ 🐺 BlackArch → Advanced tools
⑩ 🦅 Cyborg Hawk → Beginner friendly
Messages 1
Hackers are so smart nowadays:
Comments 0
3-level vertical drop-down menu
A three-level drop-down vertical menu in Bootstrap 3, complete with a ready-made HTML snippet for installation on your website.
* BootstrapTheme Code Snippet.

<link rel="stylesheet" href="https://bootstraptema.ru/plugins/2015/bootstrap3/bootstrap.min.css" />
<style>
 .dropdown-submenu {
 position: relative;
 }
 
 .dropdown-submenu>.dropdown-menu {
 top: 0;
 left: 100%;
 margin-top: -6px;
 margin-left: -1px;
 -webkit-border-radius: 0 6px 6px 6px;
 -moz-border-radius: 0 6px 6px 6px;
 border-radius: 0 6px 6px 6px;
 }
 
 .dropdown-submenu:hover>.dropdown-menu {
 display: block;
 }
 
 .dropdown-submenu>a:after {
 display: block;
 content: " ";
 float: right;
 width: 0;
 height: 0;
 border-color: transparent;
 border-style: solid;
 border-width: 5px 0 5px 5px;
 border-left-color: #cccccc;
 margin-top: 5px;
 margin-right: -10px;
 }
 
 .dropdown-submenu:hover>a:after {
 border-left-color: #ffffff;
 }
 
 .dropdown-submenu.pull-left {
 float: none;
 }
 
 .dropdown-submenu.pull-left>.dropdown-menu {
 left: -100%;
 margin-left: 10px;
 -webkit-border-radius: 6px 0 6px 6px;
 -moz-border-radius: 6px 0 6px 6px;
 border-radius: 6px 0 6px 6px;
 }
</style>
<ul class="dropdown-menu" role="menu" aria-labelledby="dropdownMenu" style="display: block; position: static; margin-bottom: 5px; *width: 180px;">
 <li><a href="#">Action</a></li>
 <li><a href="#">Another action</a></li>
 <li><a href="#">Something else here</a></li>
 <li class="divider"></li>
 <li class="dropdown-submenu">
 <a tabindex="-1" href="#">More options</a>
 <ul class="dropdown-menu">
 <li><a tabindex="-1" href="#">Second level</a></li>
 <li class="dropdown-submenu">
 <a href="#">More..</a>
 <ul class="dropdown-menu">
 <li><a href="#">3rd level</a></li>
 <li><a href="#">3rd level</a></li>
 </ul>
 </li>
 <li><a href="#">Second level</a></li>
 <li><a href="#">Second level</a></li>
 </ul>
 </li>
</ul>
Messages 1
<link rel="stylesheet" href="https://bootstraptema.ru/plugins/2015/bootstrap3/bootstrap.min.css" />

<style>
 body {
 padding-top: 50px;
 }
 
 legend a {
 color: inherit;
 }
 
 legend.legendStyle {
 padding-left: 5px;
 padding-right: 5px;
 }
 
 fieldset.fsStyle {
 font-family: Verdana, Arial, sans-serif;
 font-size: small;
 font-weight: normal;
 border: 1px solid #999999;
 padding: 4px;
 margin: 5px;
 }
 
 legend.legendStyle {
 font-size: 90%;
 color: #888888;
 background-color: transparent;
 font-weight: bold;
 }
 
 legend {
 width: auto;
 border-bottom: 0px;
 }
</style>
<div class="container">
 <div class="cold-md-12">
 <fieldset class="fsStyle">



 <legend class="legendStyle">
 <a data-toggle="collapse" data-target="#demo" href="#">Activity Log Filter Criteria</a>
 </legend>
 <div class="row collapse in" id="demo">
 <div class="col-md-2">
 <label for="activity_from_date" class="labelStyle">Activity From Date:</label>
 </div>
 <div class="col-md-4">
 <input name="fromDate" maxlength="10" size="11" tabindex="59" value="" onblur="javascript:DateFormat(this,event,true);" class="textInput" id="activity_from_date" type="text">
 </div>
 </div>
 </fieldset>
 </div>
</div>
Messages 1
Makli Necropolis Photos by Mobeen Ansari
Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari Makli Necropolis Photos by Mobeen Ansari
Comments 0
WHY KEYBOARDS ARE QWERTY

Ever wondered why the keyboard is not alphabetical?
It would seem logical.
A B C D E.
But QWERTY was never about logic.
It was about mechanics.
Here is what actually happened.
In the 1870s, early typewriters had mechanical arms called type bars. When two commonly paired letters were pressed quickly, the metal arms would collide and jam.
Frequent jams slowed typing and frustrated users.
So the layout was redesigned to separate commonly used letter pairs.
Letters that often appear together were spaced apart to reduce mechanical interference.
The result was the QWERTY layout, popularized by Christopher Latham Sholes and later adopted widely through Remington typewriters.
What started as a mechanical workaround became a global standard.
Even though modern keyboards no longer have type bars, the layout remained because:
• Millions learned it
• Schools taught it
• Businesses standardized around it
• Switching costs became too high
This is called path dependence.
A past solution shapes the future, even after the original problem disappears.
Today, billions type daily on a layout designed to prevent 19th century metal collisions.
Design decisions last longer than the problems they solve.
What everyday object should we decode next?
#Engineering #DesignHistory #Innovation
Comments 0
Microsoft admits Copilot was summarizing confident

Microsoft has confirmed that a bug in Microsoft 365 allowed its Copilot AI to improperly access and summarize customers’ confidential emails for several weeks.

The issue, first reported by BleepingComputer and tracked internally as CW1226324, affected Copilot Chat within Office apps such as Word, Excel, and PowerPoint.

According to the company, emails stored in users’ Sent Items and Drafts folders, including those labeled confidential and protected by data loss prevention policies, were incorrectly processed by the AI system.

Microsoft said it began rolling out a fix earlier this month but has not disclosed how many customers were impacted.

Follow us (@therundownAI) to keep up with the latest news in tech and AI.

Source: TechCrunch
Comments 0
Happy Ramadan
May this beautiful month bring peace to your heart, ease to your mind, and blessings to your life.” “Wishing you a Ramadan filled with endless joy and blessings. Ramadan Mubarak to you and your family.” “May your fasts be accepted, and all your prayers be answered.
Comments 0
MICROSOFT ADDED AI TO NOTEPAD HACKERS HAD A FIELD
Even Microsoft’s Notepad app, once a simple tool for jotting down plain text notes, has become an AI-powered security risk.

Researchers from the group VX-Underground discovered a “remote code execution zero-day,” a vulnerability unknown even to Microsoft.

According to Microsoft documentation of the bug, “improper neutralization of special elements used in a command (‘command injection’) in Windows Notepad App allows an unauthorized attacker to execute code over a network.”

“An attacker could trick a user into clicking a malicious link inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files”

Microsoft later fixed the vulnerability affecting Markdown files in Notepad.
Comments 0
0
Hehehe
Comments 0
Waiting For Ramadan In Gaza
Waiting For Ramadan In Gaza Waiting For Ramadan In Gaza Waiting For Ramadan In Gaza Waiting For Ramadan In Gaza Waiting For Ramadan In Gaza Waiting For Ramadan In Gaza Waiting For Ramadan In Gaza Waiting For Ramadan In Gaza
Comments 0
Hollywood is pushing back hard against Seedance 2

Hollywood is pushing back hard against Seedance 2.0,ByteDance’s new AI video tool that can generate realistic 15-second clips from just a text prompt.

The tool quickly went viral after one user generated a video of Tom Cruise fighting Brad Pitt with only a two-line prompt. Deadpool screenwriter Rhett Reese reacted, “It’s likely over for us.”

The Motion Picture Association slammed ByteDance for “massive unauthorized use of U.S. copyrighted works” and demanded they stop distributing Seedance 2.0.

Disney and Paramount also issued cease-and-desist letters after the AI generated videos featuring Spider-Man, Darth Vader, Grogu, and other iconic characters. SAG-AFTRA called it “blatant infringement” on actors’ likenesses.

ByteDance says it’s adding safeguards to block real people and celebrities, but critics argue the viral clips have already done the damage.

Seedance 2.0 is fueling a bigger debate: AI video tools could make filmmaking faster and more accessible but also threaten creative jobs, copyright protections, and the traditional Hollywood model.

#Seedance2 #AIvideo #ByteDance #Hollywood #AI
Comments 0
Windows 98 RC0, Build 1723 (Welcome Window)
Windows 98 RC0, Build 1723 (Welcome Window) - June 25,1998
Comments 0
YouTube was founded 21 years ago today on February
Comments 0