Jul 21, 2010

Steps to Unlock a Password Protected Memory Card of Your Mobile Phone

http://fexplorer.en.softonic.com/symbian/download

Your can store your personal information or documentation of your mobile memory card. To protect your files or documents, you need to give a password on the memory card. It's a common mistake of human that most time they set password and forget that password. So, what to do then? Do you need to contact the mobile phone service center? It's a costly solution. Moreover, you have to spend enough time and effort to do that. All the peoples do their best to unlock the memory card and to recover the data. It's really a great annoying thing. But you can do it by yourself very easily. You just have to follow some steps to unlock your password protected memory card of your mobile phone. This page tells you the process of unlocking any password protected mobile memory card.

Steps to Unlock a Password Protected Memory Card of Your Mobile Phone

The steps to unlock a password protected memory card of your mobile phone, is described below. Please follow the steps:
  1. To unlock your mobile memory card, you need a file explorer. You may use FExplorer. To download FExplorer, click here to download.
  2. After finished downloading, install it to your mobile phone.
  3. Insert the mobile memory card into your mobile phone. Remember, don't access the memory card through phone at this moment.
  4. Run FExplorer and open the following location C:\system.
  5. From the location C:\System, you will see a file named as mmcstore. Rename this file as mmcstore.txt.
  6. Copy the file mmcstore.txt. and paste it to your computer. Now, open that file in notepad.
  7. When you finished the above steps, you will find the password of that file.

Jun 7, 2010

http://www.sharemarketbasics.com/
http://www.sharemarketbasics.com/DIFFERENT-KIND-INVESTMENTS.htm

Jun 4, 2010

TCP/IP

 

TCP/IP Tutorial

This tutorial is intended to supply a brief overview of TCP/IP protocol. Explanations of IP addresses, classes, netmasks, subnetting, and routing are provided, and several example networks are considered.


The IP Address and Classes

Hosts and networks
IP addressing is based on the concept of hosts and networks. A host is essentially anything on the network that is capable of receiving and transmitting IP packets on the network, such as a workstation or a router. It is not to be confused with a server: servers and client workstations are all IP hosts.
The hosts are connected together by one or more networks. The IP address of any host consists of its network address plus its own host address on the network. IP addressing, unlike, say, IPX addressing, uses one address containing both network and host address.
How much of the address is used for the network portion and how much for the host portion varies from network to network.
IP addressing
An IP address is 32 bits wide, and as discussed, it is composed of two parts: the network number, and the host number [1, 2, 3]. By convention, it is expressed as four decimal numbers separated by periods, such as "200.1.2.3" representing the decimal value of each of the four bytes. Valid addresses thus range from 0.0.0.0 to 255.255.255.255, a total of about 4.3 billion addresses. The first few bits of the address indicate the Class that the address belongs to:
Class    Prefix    Network Number Host Number
  A  0  Bits 1-7 Bits 8-31
  B  10  Bits 2-15 Bits 16-31
  C  110  Bits 3-23 Bits 24-31
  D  1110    N/A  
  E  1111    N/A  
The bits are labeled in network order, so that the first bit is bit 0 and the last is bit 31, reading from left to right. Class D addresses are multicast, and Class E are reserved. The range of network numbers and host numbers may then be derived:
Class    Range of Net Numbers    Range of Host Numbers
  A  0 to 126  0.0.1 to 255.255.254
  B  128.0 to 191.255  0.1 to 255.254
  C  192.0.0 to 233.255.255  1 to 254
Any address starting with 127 is a loopback address and should never be used for addressing outside the host. A host number of all binary 1's indicates a directed broadcast over the specific network. For example, 200.1.2.255 would indicate a broadcast over the 200.1.2 network. If the host number is 0, it indicates "this host". If the network number is 0, it indicates "this network" [2]. All the reserved bits and reserved addresses severely reduce the available IP addresses from the 4.3 billion theoretical maximum. Most users connected to the Internet will be assigned addresses within Class C, as space is becoming very limited. This is the primary reason for the development of IPv6, which will have 128 bits of address space.

Basic IP Routing

Classed IP Addressing and the Use of ARP Consider a small internal TCP/IP network consisting of one Ethernet segment and three nodes. The IP network number of this Ethernet segment is 200.1.2. The host numbers for A, B, and C are 1, 2, and 3 respectively. These are Class C addresses, and therefore allow for up to 254 nodes on this network segment. Each of these nodes have corresponding Ethernet addresses, which are six bytes long. They are normally written in hexadecimal form separated by dashes (02-FE-87-4A-8C-A9 for example).
In the diagram above and subsequent diagrams, we have emphasized the network number portion of the IP address. Suppose that A wanted to send a packet to C for the first time, and that it knows C's IP address. To send this packet over Ethernet, A would need to know C's Ethernet address. The Address Resolution Protocol (ARP) is used for the dynamic discovery of these addresses [1]. ARP keeps an internal table of IP address and corresponding Ethernet address. When A attempts to send the IP packet destined to C, the ARP module does a lookup in its table on C's IP address and will discover no entry. ARP will then broadcast a special request packet over the Ethernet segment, which all nodes will receive. If the receiving node has the specified IP address, which in this case is C, it will return its Ethernet address in a reply packet back to A. Once A receives this reply packet, it updates its table and uses the Ethernet address to direct A's packet to C. ARP table entries may be stored statically in some cases, or it keeps entries in its table until they are "stale" in which case they are flushed.
Consider now two separate Ethernet networks that are joined by a PC, C, acting as an IP router (for instance, if you have two Ethernet segments on your server).
Device C is acting as a router between these two networks. A router is a device that chooses different paths for the network packets, based on the addressing of the IP frame it is handling. Different routes connect to different networks. The router will have more than one address as each route is part of a different network. Since there are two separate Ethernet segments, each network has its own Class C network number. This is necessary because the router must know which network interface to use to reach a specific node, and each interface is assigned a network number. If A wants to send a packet to E, it must first send it to C who can then forward the packet to E. This is accomplished by having A use C's Ethernet address, but E's IP address. C will receive a packet destined to E and will then forward it using E's Ethernet address. These Ethernet addresses are obtained using ARP as described earlier. If E was assigned the same network number as A, 200.1.2, A would then try to reach E in the same way it reached C in the previous example - by sending an ARP request and hoping for a reply. However, because E is on a different physical wire, it will never see the ARP request and so the packet cannot be delivered. By specifying that E is on a different network, the IP module in A will know that E cannot be reached without having it forwarded by some node on the same network as A.

Direct vs. Indirect Routing

Direct routing was observed in the first example when A communicated with C. It is also used in the last example for A to communicate with C. If the packet does not need to be forwarded, i.e. both the source and destination addresses have the same network number, direct routing is used. Indirect routing is used when the network numbers of the source and destination do not match. This is the case where the packet must be forwarded by a node that knows how to reach the destination (a router). In the last example, A wanted to send a packet to E. For A to know how to reach E, it must be given routing information that tells it who to send the packet to in order to reach E. This special node is the "gateway" or router between the two networks. A Unix-style method for adding a routing entry to A is
route add [destination_ip] [gateway] [metric]
Where the metric value is the number of hops to the destination. In this case,
route add 200.1.3.2 200.1.2.3 1
will tell A to use C as the gateway to reach E. Similarly, for E to reach A,
route add 200.1.2.1 200.1.3.10 1
will be used to tell E to use C as the gateway to reach A. It is necessary that C have two IP addresses - one for each network interface. This way, A knows from C's IP address that it is on its own network, and similarly for E. Within C, the routing module will know from the network number of each interface which one to use for forwarding IP packets. In most cases it will not be necessary to manually add this routing entry. It would normally be sufficient to set up C as the default gateway for all other nodes on both networks. The default gateway is the IP address of the machine to send all packets to that are not destined to a node on the directly-connected network. The routing table in the default gateway will be set up to forward the packets properly, which will be discussed in detail later.

Static vs. Dynamic Routing

Static routing is performed using a preconfigured routing table which remains in effect indefinitely, unless it is changed manually by the user. This is the most basic form of routing, and it usually requires that all machines have statically configured addresses, and definitely requires that all machines remain on their respective networks. Otherwise, the user must manually alter the routing tables on one or more machines to reflect the change in network topology or addressing. Usually at least one static entry exists for the network interface, and is normally created automatically when the interface is configured. Dynamic routing uses special routing information protocols to automatically update the routing table with routes known by peer routers. These protocols are grouped according to whether they are Interior Gateway Protocols (IGPs) or Exterior Gateway Protocols. Interior gateway protocols are used to distribute routing information inside of an Autonomous System (AS). An AS is a set of routers inside the domain administered by one authority. Examples of interior gateway protocols are OSPF and RIP. Exterior gateway protocols are used for inter-AS routing, so that each AS may be aware of how to reach others throughout the Internet. Examples of exterior gateway protocols are EGP and BGP. See RFC 1716 [11] for more information on IP router operations. WAN Routing Our WAN Cards provide a network interface, and do not actually route packets according to IP address, or maintain IP routing information. Packet routing between interfaces is accomplished by the protocol stack, which can send IP based dynamic routing protocols over WAN card. The information and protocols needed for dynamic routing are handled by the protocol stack. In practice, it is almost always better to use explicit static routing table entries rather than relying on dynamic routing.

Advanced IP Routing

The Netmask When setting up each node with its IP address, the netmask must also be specified. This mask is used to specify which part of the address is the network number part, and which is the host part. This is accomplished by a logical bitwise-AND between the netmask and the IP address. The result specifies the network number. For Class C, the netmask will always be 255.255.255.0; for Class B, the netmask will always be 255.255.0.0; and so on. When A sent a packet to E in the last example, A knew that E wasn't on its network segment by comparing A's network number 200.1.2 to the value resulting from the bitwise-AND between the netmask 255.255.255.0 and the IP address of E, 200.1.3.2, which is 200.1.3. The netmask becomes very important, and more complicated, when "classless" addressing is used. Hierarchical Sub-Allocation of Class C Addresses To make more efficient use of Class C addresses in the Internet community, these addresses are subnetted hierarchically from the service provider to the organization. They are allocated bitmask-oriented subsets of the provider's address space [4, 5]. These are classless addresses. Consider the following example of a small organization consisting of two Ethernet segments connecting to an Internet service provider using a WAN router that emulates an additional network segment, such as provided by our Wan Cards. The service provider has been allocated several different Class C addresses to be used for its clients. This particular organization has been allocated the network number 210.20.30, and the gateway address at the provider end is 210.20.30.254.
Networks
210.20.30.0->63
  210.20.30.64->127
  210.20.30.192->255
   
Netmask 255.255.255.192
We have expanded the last byte of the IP address so that we can show the network subaddressing. The standard IP address nomeclature is shown below this expanded version. If the organization happened to have just one computer, C, and the entire Class C address is available for use, then the IP address for C may be anything in the range 210.20.30.1 to 210.20.30.253, and its default gateway would be 210.20.30.254 with netmask 255.255.255.0. However, with two networks plus our Gateways, which must also be on its own network, the Class C address must somehow be subnetted. This is accomplished by using one or more of the bits that are normally allocated to the host number as part of the Class C address, in order to extend the size of the network number. In this case, 210.20.30 has been extended to include four networks, and the netmask has changed to 255.255.255.192 to reflect the additional use of two bits for the network number in the IP address. Writing the netmask 255.255.255.192 in binary (from FFFFFFC0 in hex) is 11111111/11111111/11111111/11000000, with /' separating the bytes for clarity. Since the organization is allocated all of 210.20.30 (D2141E hex), it has the use of the four following network numbers (in binary):
Net # IP Network Number
 0 11010010/00010100/00011110/00
 1 11010010/00010100/00011110/01
 2 11010010/00010100/00011110/10
 3 11010010/00010100/00011110/11
This leaves 6 bits at the end to use for host number, leaving space for 62 host nodes per network (all 0's and all 1's are reserved). The following addresses are therefore valid for hosts to use:
Net # Address Range
 0 210.20.30.1 to 210.20.30.62
 1 210.20.30.65 to 210.20.30.126
 2 210.20.30.129 to 210.20.30.190
 3 210.20.30.193 to 210.20.30.254
In this example, Net#2 is reserved for future use.
The IP addresses and netmasks for each interface are:
Interface    IP Addressnbsp   Netmask
Node A 210.20.30.1 255.255.255.192
Node B 210.20.30.2 255.255.255.192
Node C (AB) 210.20.30.10 255.255.255.192
Node C (DE) 210.20.30.70 255.255.255.192
Node C (WAN) 210.20.30.200 255.255.255.192
Node D 210.20.30.81 255.255.255.192
Node E 210.20.30.82 255.255.255.192
The routing tables will be set for each node as follows. The destination address 0.0.0.0 indicates the default destination, if no other specific routes are configured for the given packet destination. This default destination is where all packets will be sent, and it is assumed that this destination is capable of forwarding these packets to the ultimate destination, or to another router along the appropriate path.
Node A      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 210.20.30.10 210.20.30.1
210.20.30.0 255.255.255.192 210.20.30.1 210.20.30.1
Node B      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 210.20.30.10 210.20.30.2
210.20.30.0 255.255.255.192 210.20.30.2 210.20.30.2
Node C      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 210.20.30.254 210.20.30.200
210.20.30.0 255.255.255.192 210.20.30.10 210.20.30.10
210.20.30.64 255.255.255.192 210.20.30.70 210.20.30.70
210.20.30.192 255.255.255.192 210.20.30.200 210.20.30.200
Node D      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 210.20.30.70 210.20.30.81
210.20.30.64 255.255.255.192 210.20.30.81 210.20.30.81
Node E      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 210.20.30.70 210.20.30.82
210.20.30.64 255.255.255.192 210.20.30.82 210.20.30.82
Node G      
Network Address Netmask Gateway Interface
210.20.30.0 255.255.255.0 210.20.30.200 210.20.30.254
(Plus all other pertinent entries) The metric value, or hop count, is optional, but would be 0 for all gateways that are the same as the hosts, and greater than 0 if the destination is reached via one or more gateways. The metric for the default routes are indeterminate, but would always be at least 1. For example, if D sent an ICMP echo request packet out onto the Internet, let's say to address 140.51.120.30, then first D would AND the netmask 255.255.255.192 with 140.51.120.30 to determine the network number. It would then find that it does not match the network number 210.20.30.64, and so it chooses the default route which points to the gateway 210.20.30.70. It then uses the Ethernet address of Node C (DE) to forward the IP packet to the gateway. When C receives this packet, it will see that it is destined to 140.51.120.30. It checks all the routes in its table and determines that this address is not located on any of the listed networks in the routing table, and so it chooses the default route. It uses the WAN interface, of IP address 210.20.30.200 to send the packet to 210.20.30.254 (G). From then on, the packet will propagate from gateway to gateway until it reaches 140.51.120.30. When this node replies, the packet will be inbound on interface 210.20.30.200 (C) with destination address 210.20.30.81 (D). Node C will discover that 210.20.30.81 is on the 210.20.30.64 network and uses the interface 210.20.30.70 to send the packet back home to D.

TCP/IP Setup Examples by Protocol Stack and Platform

Two examples will be presented to explain how to set up the IP addressing and routing information when connecting to an Internet service provider using the G1000. The first case is when only one machine will be connected, and the other case describes the connection of a LAN to the Internet. The third example briefly illustrates the addressing and routing techniques for connecting two LANs over a point-to-point WAN connection. Example 1: Single Node Connection to WAN Gateway Assume that the node A is the G1000 and is assigned the IP address 210.20.30.45, and that the gateway address is 199.99.88.77.
The netmask for A may be set to 255.255.255.255, indicating no other nodes on the local network, and the gateway is set to 199.99.88.77. A default route must be set up at Node A as well, which provides the route for all packets whose destination does not correspond to any specific routing entries.
Node A      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 19.99.88.77 210.20.30.45
Node G      
Network Address   Netmask Gateway Interface
210.20.30.45 25.255.255.255   199.99.88.77 199.99.88.77
(Plus all other pertinent entries) The routing for Node G is highly dependent on the context, and the above entry only serves as an example. The netmask of all 1's in this case is used to only allow packets destined to 210.20.30.45 to be forwarded to Node A, as there may be 253 other nodes connected in a similar way under this Class C network 199.99.88.0. When the protocol stack's configuration asks for a default gateway, specifying 199.99.88.77 will cause the default routing entry 0.0.0.0 to be added automatically. It must be added manually if for some reason the stack does not ask for it. The specific methods of configuring each protocol stack will be explained in detail in Example 2.
Example 2: LAN Connection to WAN Gateway The following network topology will be used as an example, where one LAN is connected to the Internet for simplicity. This will also demonstrate the use of a different netmask for creating two Class C subnets. Note however that the remote WAN gateway may have an IP address outside the local Class C network, in which case the local WAN gateway interface will usually have an IP address on the same network as the remote WAN gateway. If this is the case, subnetting as shown below may not be necessary, unless more than one local network segment is involved.
Networks 210.20.30.0->127,210.20.30.128->255
  Netmask 255.255.255.128
Node A is one of the many workstations on the Ethernet segment Net 0. Node Z is a JBM unit and the gateway from this Ethernet to the Internet service provider's gateway machine G. Some of the other workstations have been labeled as B to Y for illustration, but will not be referred to in this example as their setup will be the same as for A. In this case, since only two subnets were needed, only one bit from the host address space need be sacrificed. Writing the netmask 255.255.255.128 in binary (from FFFFFF80 in hex) is 11111111/11111111/11111111/10000000, with /' separating the bytes for clarity. Since the organization is allocated all of 210.20.30 (D2141E hex), it has the use of the two following network numbers (in binary):
Net # IP Network Number
 0 11010010/00010100/00011110/0
 1 11010010/00010100/00011110/1
This leaves 7 bits at the end to use for host number, leaving space for 126 host nodes per network (all 0's and all 1's are reserved). The following addresses are therefore valid for hosts to use:
Net # Address Range
 0 210.20.30.1 to 210.20.30.126
 1 210.20.30.129 to 210.20.30.254
The IP addresses and netmasks for each interface are:
Interface IP Address Netmask
Node A 210.20.30.1 255.255.255.128
Node Z 210.20.30.126 255.255.255.128
Node Z 210.20.30.200 255.255.255.128
The routing tables will be set for each node as follows. Note that the destination address 0.0.0.0 indicates the default destination, if no other specific routes are indicated.
Node A      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 210.20.30.126 210.20.30.1
210.20.30.0 255.255.255.128 210.20.30.1 210.20.30.1
Node Z      
Network Address Netmask Gateway Interface
0.0.0.0 0.0.0.0 210.20.30.254 210.20.30.200
210.20.30.0 255.255.255.128 210.20.30.126 210.20.30.126
210.20.30.128 255.255.255.128 210.20.30.200 210.20.30.200
Node G      
Network Address Netmask Gateway Interface
210.20.30.0 255.255.255.0 210.20.30.200 210.20.30.254
(Plus all other pertinent entries)

Jun 3, 2010

knowing who hacked you....

GETTIN SUM1'S IP ADREZ HU HAS HACKD UR PCFirst
open dos command,go to -(Start/Run/type "command" without inverted commas and hit enter),& in the MSDOS prompt,type:
netstat -a
(make sure you include the space in between the "t" and the "-a").



This command will show u the host name of the lamer and ofcorse urz also ..ur host name will be under local address and his wud be under foreign address.. note any suspicious name and every numbr u c aftr the host name under foreign address which is new and suspicious there(numbers are ports but i consider u totally unaware).
After ur done,now type
Netstat -an (again a space between "t" and "-an")

this will list all connections in numerical form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

It wud look a bit like this
Proto.....Local Address.....Foreign Address.....State
TCP.......0.0.0.0:135.......0.0.0.0:0...........Li stening
TCP.......127.0.0.1:1026....0.0.0.0:0...........Li stening
TCP.......Your IPort......0.0.0.0:0...........Listening
TCP.......Your IPort......A New IPort.......Established

A New IPort -note that stuff
Now that u have a IP Addess and a host name,type
tracert type IP address/Hostname here

write whole thing there.. thats after u write tracert give a space then type A New IP we found in last step.. give a / then write..Host name we found in first step.remember no port there to be added..
This will trace the lamer which is prolly using a trojan on ur computer to do what he wants..result will give u some ip addresses ..note all of them
now go to ip2location.com/free.asp
write ip addresses in the box and see where the ips belong to..some ips will give u ISPs like mtnl ... last ip wud be his ip ..now call ur or his ISP & inform dem abt it!DO RESPOND 2 DIS..



:thx

CHANGE THE WINXP ADMINISTRATOR PASSWORDS WITHOUT KNOWING

CHANGE THE WINXP ADMINISTRATOR PASSWORDS WITHOUT KNOWING

1) go to run
2)type cmd [which will take u to command prompt ]
3)type net user [it will show u the user accounts name ]
4)finally type net user and the name of the user account with a star sign  {net user amair *]and hit enter
5)it will ask for the new password




you can use these tricks from only a administrator account and not a limited account. If you forget the administrator password, just follow these steps.
Insert windows xp disc and boot from it.
When it boots up, select install Windows XP
They will say that XP is already installed. Press R to repair.
then Press R and it will start repair.
Computer will restart and xp will boot up to start repair.
During repair, press shift+F10
You will get a command prompt. navigate to C:\Windows\System32\
{C: is the drive in which XP is installed.}
then type nusrmgr.cpl
you will get the user accounts screen. Just change the password of administrator account. Or even create new accounts. Close it.
Wait for the repair to be over. When PC boots after repair, you can login to XP.


P.S: What I have given is the genuine method of changing password. You can also change password using other tools more easily and fastly. But I am not giving it here now.

Apr 30, 2010

Cannibalism-Abortion....so inhuman

Has desensitized society become so depraved that it can pay to have its own children murdered and then be willing to purchas him or her at a market as a gourmet meat dish ?Bbwhiglv
Cannibalism throughout the world had largely been eradicated – until now. In the past it was uncivilized pagan tribes people, or those without any belief in any form of god, that ate human flesh. A captive and later escaped Jesuit, one of the early martyrs of North America, was made to show his disfigured hands –their fingers had been gnawed off by indian women– publicly in France. He returned to evangelize the same indians in the southern Canadian province in preference to this kind of exposure.

Cannibalism2002a4














Cannibalism2002a5



Under rare circumstances, in life or death situations only, it has been reported that in order to keep alive the bodies of dead humans have been eaten. The following photographs are the first published that show people from a presumably civilized nation eating human beings.
Cannibalism2002a3
February 24, 2003
Reply to those taking the position that these pictures are contrived:
        Since this web page was originally placed on the Internet, I have received a few protests concerning the authenticity of the events portrayed.
        Whether the web page referenced is factual or contrived, it serves the purpose of making people aware of the great atrocity of abortion taking place throughout the world. The particular pictures may be a bad attempt at some sort of humor, but since it has been reported that abortionists/midwives in China have eaten aborted babies in the belief that they will restore some degree of health (a variant of herbal medicine) and are reputed to be selling them for such purposes, it is not far fetched to believe that dead babies are being eaten as portrayed. It is known that aborted preborn babies are used for much experimental medical research and have been used in the manufacture of cosmetics. Aborted babies are for some facilities a commodity sold for profit.
Cannibalism2002a2
Cannibalism2002a1
        The murder of babies (about 50,000,000 surgically aborted worldwide annually) is a far greater evil than cannibalism, something that in parts of the world still takes place, especially among satanists. Whether the pictures were contrived or not they do in fact appear real and provoke reaction similar to the following Email I received from a woman who is now much more strongly against abortion than before.
Ifnotful
Cannibal reveals man-eater network
From The Times’ Roger Boyes in Kassel
January 7, 2004
ARMIN Meiwes, the increasingly confident Cannibal of Rotenburg, has been helping police unravel an international network of man-eaters.
From Austria to the US, willing victims going by names such as Hansel and Gretel queued up to be eaten by or at least exchange butchering details with the 42-year-old former soldier.
The chilling groundbreaking trial in Kassel, now in its fourth week, on Monday exposed not only the scope of modern cannibalism but also Mr Meiwes’s deluded ambitions for a world in which eating people could solve problems of famine and over-population.
Police witnesses told of two “truckloads” of printed emails and internet exchanges between Mr Meiwes and the web of cannibals or potential victims.
Detective Isolde Stock said: “We downloaded over 3800 photographs from his computer.”
Headjar
Jesbbthr

Dec 31, 2009

the "only" reason behind MICHAEL JACKSON's(mikaeel) death


MICHAEL JACKSON'S LAST EVER SONG BEFORE HE DIED (ABOUT ISLAM)

The Song That Killed Jackson (He was planning to sing 
it at his London Tour.
download the song as mp3
download the video of the song  
This is the song lyrics read it while listening 
song:- O allah!! by mikaeel
Miles away, oceans apart
never been my sight always in my heart
the love is always there it will never die
only growing stronger tears down my eye
I am thinking all the time
when the day will come
standing there before you
accept this Hajj of mine
standing in ihram, making my tawaf
drinking blessings from your well
the challenges that I have suffered
rekindles my imaan
O ALLAH! I am waiting for the call
praying for the day when I can be near
the Kabah wall
O ALLAH! I am waiting for the call
praying for the day when I can be near
Your Kabah wall
I feel alive and I feel strong
I can feel Islam running in my Veins
to see my muslim brothers, their purpose all the same
greeting one another, exalting one True Name
I truly hope one day that everyone's a Muslim.
that they remember you in everything they say
standing in ihram makimg my tawaf, making my tawaf
drinking blessings from your well
the challenges that I have suffered
rekindles my imaan
O ALLAH! I am waiting for the call
praying for the day when I can be near 
the Kabah wall
O ALLAH! I am waiting for the call
praying for the day when I can be near 
Your Kabah wall

 
this song was Michael Jacksons'(MIKAEEL) last song. 
On the 22nd of November 2008 Michael Jacksons reverted to Islam, 
The religion of truth.He declared the Shahada and changed his name to 
MIKAEEL. May allah grant him paradise.... 
ameen..   
by Zafer Iqubal Hamidi