Wednesday, January 28, 2009
Monday, January 26, 2009
.hari membeli ayam.
hari yang bosan.
jd,kami ke giant membeli ayam..yes,ayam~
tp,bkn utk one family mkn..but utk kucing2 kesayangan..
sedang mama n kak muda memilih ayam,saya n nabila mengisi masa lapang dgn sesi mari bergambar berlatar belakangkan ayam..huhuhu...
yes,mmg kami xde keje..lalalala...
soeraya:pasni kte g bli limau plak k?
Sunday, January 25, 2009
thanks.
i really really really appreciate all of your votes.
soeraya:.sayang semua.sungguh!
Saturday, January 24, 2009
faces of me.
Friend.
Security Book
Description:
In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments.
Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.
Coverage includes
- Confidentiality, integrity, and availability
- Operational issues, cost-benefit and risk analyses, legal and human factors
- Planning and implementing effective access control
- Defining security, confidentiality, and integrity policies
- Using cryptography and public-key systems, and recognizing their limits
- Understanding and using authentication: from passwords to biometrics
- Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more
- Controlling information flow through systems and networks
- Assuring security throughout the system lifecycle
- Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them
- Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention
- Applying security principles to networks, systems, users, and programs
Back Cover:
In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments.
Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.
ContentsPreface.
Goals.
Philosophy.
Organization.
Differences Between this Book and Computer Security: Art and Science.
Special Acknowledgment.
Acknowledgments.
1. An Overview of Computer Security.
The Basic Components.
Threats.
Policy and Mechanism.
Assumptions and Trust.
Assurance.
Operational Issues.
Human Issues.
Tying It All Together.
Summary.
Further Reading.
Exercises.
2. Access Control Matrix.
Protection State.
Access Control Matrix Model.
Protection State Transitions.
Conditional Commands.
Summary.
Further Reading.
Exercises.
3. Foundational Results.
The General Question.
Basic Results.
Summary.
Further Reading.
Exercises.
4. Security Policies.
Security Policies.
Types of Security Policies.
The Role of Trust.
Types of Access Control.
Example: Academic Computer Security Policy.
Summary.
Further Reading.
Exercises.
5. Confidentiality Policies.
Goals of Confidentiality Policies.
The Bell-LaPadula Model.
Summary.
Further Reading.
Exercises.
6. Integrity Policies.
Goals.
Biba Integrity Model.
Clark-Wilson Integrity Model.
Summary.
Further Reading.
Exercises.
7. Hybrid Policies.
Chinese Wall Model.
Bell-LaPadula and Chinese Wall Models.
Clinical Information Systems Security Policy.
Originator Controlled Access Control.
Role-Based Access Control.
Summary.
Further Reading.
Exercises.
8. Basic Cryptography.
What Is Cryptography?
Classical Cryptosystems.
Public Key Cryptography.
Cryptographic Checksums.
Summary.
Further Reading.
Exercises.
9. Key Management.
Session and Interchange Keys.
Key Exchange.
Cryptographic Key Infrastructures.
Storing and Revoking Keys.
Digital Signatures.
Summary.
Further Reading.
Exercises.
10. Cipher Techniques.
Problems.
Stream and Block Ciphers.
Networks and Cryptography.
Example Protocols.
Summary.
Further Reading.
Exercises.
11. Authentication.
Authentication Basics.
Passwords.
Challenge-Response.
Biometrics.
Location.
Multiple Methods.
Summary.
Further Reading.
Exercises.
12. Design Principles.
Overview.
Design Principles.
Summary.
Further Reading.
Exercises.
13. Representing Identity.
What Is Identity?
Files and Objects.
Users.
Groups and Roles.
Naming and Certificates.
Identity on the Web.
Summary.
Further Reading.
Exercises.
14. Access Control Mechanisms.
Access Control Lists.
Capabilities.
Locks and Keys.
Ring-Based Access Control.
Propagated Access Control Lists.
Summary.
Further Reading.
Exercises.
15. Information Flow.
Basics and Background.
Compiler-Based Mechanisms.
Execution-Based Mechanisms.
Example Information Flow Controls.
Summary.
Further Reading.
Exercises.
16. Confinement Problem.
The Confinement Problem.
Isolation.
Covert Channels.
Summary.
Further Reading.
Exercises.
17. Introduction to Assurance.
Assurance and Trust.
Building Secure and Trusted Systems.
Building Security In or Adding Security Later.
Summary.
Further Reading.
Exercises.
18. Evaluating Systems.
Goals of Formal Evaluation.
TCSEC: 19831999.
FIPS 140: 1994Present.
The Common Criteria: 1998Present.
SSE-CMM: 1997Present.
Summary.
Further Reading.
Exercises.
19. Malicious Logic.
Introduction.
Trojan Horses.
Computer Viruses.
Computer Worms.
Other Forms of Malicious Logic.
Defenses.
Summary.
Further Reading.
Exercises.
20. Vulnerability Analysis.
Introduction.
Penetration Studies.
Vulnerability Classification.
Frameworks.
Summary.
Further Reading.
Exercises.
21. Auditing.
Definitions.
Anatomy of an Auditing System.
Designing an Auditing System.
A Posteriori Design.
Auditing Mechanisms.
Examples: Auditing File Systems.
Audit Browsing.
Summary.
Further Reading.
Exercises.
22. Intrusion Detection.
Principles.
Basic Intrusion Detection.
Models.
Architecture.
Organization of Intrusion Detection Systems.
Intrusion Response.
Summary.
Further reading.
Exercises.
23. Network Security.
Introduction.
Policy Development.
Network Organization.
Availability and Network Flooding.
Anticipating Attacks.
Summary.
Further Reading.
Exercises.
24. System Security.
Introduction.
Policy.
Networks.
Users.
Authentication.
Processes.
Files.
Retrospective.
Summary.
Further Reading.
Exercises.
25. User Security.
Policy.
Access.
Files and Devices.
Processes.
Electronic Communications.
Summary.
Further Reading.
Exercises.
26. Program Security.
Introduction.
Requirements and Policy.
Design.
Refinement and Implementation.
Common Security-Related Programming Problems.
Testing, Maintenance, and Operation.
Distribution.
Conclusion.
Summary.
Further Reading.
Exercises.
27. Lattices.
Basics.
Lattices.
Exercises.
28. The Extended Euclidean Algorithm.
The Euclidean Algorithm.
The Extended Euclidean Algorithm.
Solving ax mod n = 1.
Solving ax mod n = b.
Exercises.
29. Virtual Machines.
Virtual Machine Structure.
Virtual Machine Monitor.
Exercises.
Bibliography.
Index.
An excellent, beautifully written introduction to the subject of computer security--by a master teacher and practitioner.
° An introduction to the science and challenges of computer security, useful as either a self-teaching tool or a classroom text.
° Trimmed down and less expensive version of Bishop's definitive work on computer security, with more mathematical and advanced sections removed.
° A well-known security expert and educator, Bishop's command over the subject is tremendous.
Matt Bishop is a professor in the Department of Computer Science at the University of California at Davis. A recognized expert in vulnerability analysis, secure systems/software design, network security, access control, authentication, and UNIX security, Bishop also works to improve computer security instruction.
Operating Systems Book
Description:
Modern software systems rely on the concepts of concurrency, modularity and distribution, both within the design of the operating system and those systems that it supports. Underlying this book is the premise that distributed systems are now commonplace and a reader is more likely to be using one than a centralized time-sharing system. This modern approach therefore avoids the focus on centralized systems, instead placing the operating system within its context and providing an overview of system components and their relationships.The book is divided into four parts:
System Design, covering the basic operating system functions and describing the abstraction and implementation of a system as a community of (possibly distributed) concurrent processes. Distributed systems are introduced and a chapter on system security is included.
Concurrency Control in Main Memory, focusing on concurrency control in operating systems and application-level systems and exploring inter-process communication (IPC) in the context of (distributed) system design.
Transactions, demonstrating the general applicability of concurrent composite operations.
Case Studies, considering different systems in the light of the perspective developed in the book: Classical UNIX; Linux, Solaris and Contemporary Unix; Extensible Systems; Windows 2000; Web Programming; Middleware; and Transaction Processing Systems.The Java language has been used throughout to illustrate object-oriented concepts, concurrent algorithms and distributed programming and the book includes a chapter on system security. The case studies, covering a full suite of professional operating systems, enable the course to be taught as a blend of theory and practice, so that on completion of the course a student is able to adapt and build real operating systems that function within a distributed environment.
Contents:
1 Introduction: Examples and requirements
PART 1 BACKGROUND AND FUNDAMENTALS
2 System structure and dynamic execution
3 The hardware interface, I/O and communications
4 Support for processes and threads
5 Fundamentals of distributed systems
6 Memory management
7 File management
8 Security
PART II SINGLE CONCURRENT ACTIONS
9 System structure
10 Low-level synchronization primitives: Implementation
11 Low-level primitives: Use in systems and languages
12 Language primitives for shared memory
13 IPC and system structure
14 IPC without shared memory
15 Crash resilience and persistent data
16 Distributed IPC
PART III CONCURRENT COMPOSITE ACTIONS
17 Decomposable abstract operations
18 Resource allocation and deadlock
19 Transactions
20 Concurrency control
21 Recovery
22 Distributed transaction
23 Distributed computations
PART IV CASE STUDIES
24 Unix and Linux
25 NT and Windows 2000
26 Extensible Operating Systems
27 Middleware
28 Transaction processing monitors and systems
Appendix: Evolution of computer systems
A.1 Introduction, technological and commercial context
A.2 Operating systems and distributed operating systems
A.2.1 Multiprogramming batch
A.2.2 Centralized time-sharing (interactive) systems
A.2.3 Workstations and personal computers
A.3 Middleware
A.3.1 Distributed programming, communications and services
A.3.2 Mobile and ubiquitous computing
A.4 Databases
Bibliography
Glossary
Author index
Subject index
Features:
- Incorporates Java throughout the book to illustrate concurrent algorithms, object-oriented concepts and distributed programming.
Covers the latest developments in OS theory and practice. - OS case studies in Unix, Linux, Windows 2000/NT, JVM.
- Integrated approach to database and distributed system design.
- Objects, concurrency and transactions are unifying themes.
- Case studies on Web services, Middleware and Transaction Processing.
Appendix on historical evolution of systems. - Exercises in each chapter, coupled with more challenging projects.
- Browsable or downloadable Instructor’s Guide has teaching hints, exercise solutions and exam questions
Jean Bacon is Lecturer in Computer Science at the University of Cambridge and a Fellow of Jesus College. She teaches operating systems, distributed systems and computer architecture, with her research in the area of distributed systems for which Cambridge is a centre of excellence.
Tim Harris is Lecturer in Computer Science at the University of Cambridge and a Fellow of Churchill College. He recently received his doctorate on extensible operating systems.
*credit to http://www.pearsoned.co.uk/soeraya:a lot of information and knowledge.
gembira+happy=gempy!
i miss everyone & everything here....
but i'm kinda miss segamat...
soeraya:rasa nk loncat-loncat.
Thursday, January 22, 2009
can i?
Ayat Cinta
Barangsiapa yang hafal dan mengamalkan tujuh kalimah ini akan dimuliakan oleh Allah dan malaikat dan akan diampuni dosa-dosanya walau sebanyak buih di lautan..
1.Bismillahhirrahmannirrahim :pada tiap-tiap hendak melakukan sesuatu.
2.Alhamdulliah :pada tiap-tiap habis melakukan sesuatu.
3. Astagfirrullah:jika tersilap mengatakan sesuatu yang buruk.
4.Insyaallah:jika ingin muelakukan sesuatu pada masa akan datang.
5.Lahaulawalaquataillahbillah:bila tidak dapat melakukan sesuatu yang agak berat atau melihat sesuatu yang buruk.
6.Innalillah:jika menghadapi musibah atau melihat kematian.
7.Laailaahaillallah:bacalah sepanjang siang dan malam sebanyak-banyaknya.amalkanlah selalu moga-moga kita tergolong dikalangan orang yang terpilih oleh Allah.
Sabda Rasulullah SAW siapa yang menyampaikan satu ilmu dan orang yang mengamalkannya maka dia akan beroleh pahala walaupun sudah tiada....
*credit to isuhangat.blogspot.com
yee-HAA!!
there's another 4 hours i'm goin back to my home sweet home but i didnt pack anything yet...HAHAHA...
rasa mcm dh lama gler x blk..actually xdela gler sgt..
i miss everything in KL...yes,everything!
there's many thing i need to do n buy...papa,get ready the money ok?huhuhu...
btw,c u in KL!!! ;)
soeraya:rumah,rumah,tunggu saya ok?
malam mari bergambar
Wanita Yang Kau Pilih
Di waktu aku merindukanmu
Kau bisa menjaga aku
Hingga diriku merasa teduh
Aku seperti kamu
Menginginkan dan memerlukanmu
Karena kita tak mampu
Untuk selalu pergi menjauh
Kau jadikan aku ini
Wanita yang kau pilih
Untuk jadi kekasihmu
Dan kau pun tlah aku minta
Setia sepertiku
Hingga waktunya tiba
Aku percaya penuh
Kau kan buatku bahagia
Karna cinta tercipta
Datangnya dari dalam hatiku
Kau jadikan aku ini
Wanita yang kau pilih
Untuk jadi kekasihmu
Dan kau pun tlah aku minta
Hingga waktunya tiba
.Meow Meow.
Haa!Nie plak Cotton..Or we used to call him "Gebok"...Huhuhu....Cotton nie bli kat Bandung...Papa n mama bli 3 ekor...Cotton,Prince n Pinky...Cotton nie jantan but eventhough dia jantan,dia sgt manja...Dalam byk2 org kat umah,dia paling manja dgn papa...Dia sgt kuat mkn...Mknn dlm bekas akan sentiasa dihabiskan olehnya...Geram r kat die!!
Nie Prince...His voice xsegarau Cotton..Suara dia mcm kucing betina...Hehehe....Tp die nie ske wat hal sendiri...Ske menjelajah dlam umah drpd mkn...Ntah ape dia dok nk cari n tgk..Huhu....
This one nama dia Pinky...Pinky nie sgt lembut...Al maklum la,betina...Tp,die ske cari pasal dgn Meng...She will always follow Meng whenever Meng go...Patu die tampar...Ske cari pasal...Yg kelakarnya,lpas die tampar boleh plak die wat muke selambar dgn perasaan yg xbersalah..Haahaa...
Niela Meng yang slalu dibuli oleh Pinky...Meng nie my sis,Nabila bwk blk from UPM...Meng nie manja n sgt suka mkn ayam rebus...So everyday mama will rebus the chicken for her and then barula die tdo...Dia nie ske mkn roti n slalu curi roti kat dapur...Coloir bulu die mcm Nemo...Yg bezanya just warna mata...
This is da one that i really missed...Comander...Comander dh ilang....xtau mn dier g n xtau whether die still idop or mati...Dia ilang 1 day b4 my family nk g vacation....Sedihla gak...Sgt ske die coz die manja n slalu msk in my room n tdo atas katil...I used to call her "Tough" coz bdn dier tough...Haa~Nape nama die Comander?Coz tyme dier kecik,bila lapa dier ske meow n bile die meow semua kucing berkumpul kat dier...Hahaha...Kelakar n I MISS HIM...=(
soeraya:rhendu all my cats!^_^
Monday, January 19, 2009
k.e.s.e.j.u.k.a.n.
soeraya:mungkin kte perlu wat gotong-royong?
Friday, January 16, 2009
gorgeous picture.
what is SOMBONG?
aku mmg xphm dgn semua org..kalo aku xsenyum,dikatakan sombong and if aku senyum and sengih2 mrh lak and ckp nk mengedik2...HELLO!WAKE UP LA...b4 nk ckp aku sombong,tolongla phm btol makna SOMBONG tue...xpyhla nk sedap mulut ckp aku sombong...aku mmg xsenyum dgn org yg aku xbape rapat dgn aku melainkan hari tue HARI SENYUM SEDUNIA yg dianjurkan sendiri oleh aku....i just be myself...aku bknnya gal yg nmpk sape2 lg2 GUYS nk mengada2 nk senyum smpai ujung telinga...mmg bkn aku...senyum sememangnya satu sedekah....aku senyum je dgn semua org and maybe org yg ckp aku sombong tue malang kot coz hari tue bkn HARI SENYUM SEDUNIA aku....tolongla buang dr otak fikiran korg yg aku nie sombong....knal aku and korg baru tau aku mcm mana....kalo korg kat tmpt aku,ape korg rasa??just use ur own brain and think deeply...pasni,tego jela aku coz aku xsombong and xnk jd sombong pon...aku xdpt pape pon if aku jd sombong...ape2pun,aku nk bgtau yg AKU TAK SOMBONG...FULLSTOP~
-SEKIAN-
soeraya:don't judge a book by its cover.
peaceful place ever
Actually,we all xplan nk pergi haji coz mama and papa ade bgtau kteorg yg dieorg nk pergi haji...Just the thing that mama risau xde sape yg nk jaga kteorg...Xkn nk suruh aunty2 plak coz dieorg pun bz dgn hal dieorg...Mama mmg risaukan anak2 dia....And papa decided that kteorg adik-bradik follow skali...That tyme I was like O.K....WOW~ I'm just 19 and i'll become Hajjah soon....Mmg xsangka langsung.....Before gerak sana,kteorg ader kelas agama dgn ustaz...Byk benda yg we all belajar and what we should do when we arrive at that place....It was so interesting...Ustaz tue pon funny....
How bout CATS????Fyi,I have 10 cats...Should I mention their names??Ok...Let's get started...Chubby,Nemo,Meng,Cindai,Cotton,Prince,Pinky,Cuit,Skunk,Nimi....For my cats which are Cotton,Prince and Pinky,mama decided to send them to the person that can take a good care of them because there are Persian...Mama love them...The rest just kna stay dlm their kandang coz kwn papa will feed them and lpas kan dieorg ptg2....Kalo nk antar semua mmg xbolela...Semua duit melayang utk kucing2 tue je...Huhuhu....
Mcm dh pjg lebar je sy tulis nie...We will continue about Mecca more and more....I'll add some more pictures...
soeraya:I MISS THE PLACE.
Thursday, January 15, 2009
Things Girls Think Guys Should Know
2. We don't enjoy talking dirty to you as much as you enjoy listening.
3. Don't say you understand when you don't.
4. Girls are petty; get over it.
5. You don't have PMS; don't act like you know what it's like.
6. Saying something sweet might get you off the hook; doing something sweet will always get you off the hook.
7. If you talk about having a big dick; we know you don't.
8. Size does matter.
9. We don't like it when you act like Mr. Big; we like it when you are Mr. Big.
10. A system in your car only impresses your homeboys.
11. No matter what you say, your ex-girlfriend is a hoe.
12. It's good to be sensitive, sometimes.
13. If you did something wrong or even if you didn't, apologize.
14. Be spontaneous; dinner and a movie won't always cut it.
15. We are self-conscious by nature; we can't help it.
16. We are drama queens.
17. Fashion police do exist.
18. Don't ask us to give head; if you are nice you just might get it.
19. We absolutely do not care about monster trucks, car systems, paintball, or anything else you and your friends talk about.
20. Hugs and kisses must be given at all times.
21. We don't shave our legs every day; get over it.
22. Don't make bets about us; we always find out.
23. Shave; no matter how cool you think it looks, we hate it.
24. Even is you think it is cool to burp, fart, or emitt other strange gases from your body, it is not.
25. Don't compare our breasts with Pamela Anderson's; hers are fake.
26. It is not cool to shoot snot rockets.
27. We are beautiful, but make-up helps.
28. We will always think we are fat, so humor us and tell us we aren't.
29. You can shoot hoops, score a goal, knock down big fat guys, and hit a little baseball with a stick, so why the hell can't you piss in the toilet and not on it.
30. Most importantly: we are always right; so don't forget it.
*credit to http://maxpages.com/smoochy/girls_think_guys_should_know
50 Things Girls Should Know About Guys
2. "Hey, are you busy?" or "Are you doing something?" - two phrases guys open with to stop from stammering on the phone.
3. Guys may be flirting around all day but before they go to sleep, they always think about the girl they truly care about.
4. Before they call, guys try to plan out a little about what they're gonna say so there aren't awkward pauses, but once he's on the phone he forgets it all and makes it up as he goes.
5. Guys go crazy over a girl's smile.
6. Guys will do anything just to get you to notice him.
7. Guys hate it when you talk about your ex-boyfriend or ex love-interest. Unless they're goin for the let-her-complain-to-you-and-then-have-her-realize-how-wonderful-and-nice-you-are method.
8. A guy who likes you wants to be the only guy you talk to.
9. Boyfriends need to be reassured often that they're still loved.
10. Don't talk about your guy friends to your boyfriend.
11. Guys get jealous easily.
12. Guys are more emotional than they'd like people to think.
13. Giving a guy a hanging message like "You know what?!..uh...never
mind.." would make him jump to a conclusion that is far from what you are thinking. And he'll assume he did something wrong and he'll obsess about it trying to figure it out.
14. Guys are good flatterers when courting but they usually stammer when they talk to a girl they really like.
15. Guys hate asking parents for money to buy girls presents. So they come up with ideas like saving their lunch money for a week. But it never works because guys are always hungry so they end up asking the parents for money anyway.
16. Girls are guys' weaknesses.
17. Guys are very open about themselves.
18. It's good to test a guy first before you trust him. But don't let him wait too long.
19. Your best friend, whom your boyfriend seeks help from about his problems with you may end up being admired by your boyfriend.
20. If a guy tells you about his problems, he just needs someone to listen to him. You don't need to give advice.
21. A usual act that proves that the guy likes you is when he teases you.
22. Guys love you more than you love them if they are serious in your relationships.
23. Guys will brag about anything.
24. Guys use words like hot or cute to describe girls. We rarely use beautiful. If a guy uses that, he likes you.
25. Guys think WAY too much. One small thing a girl does, even if she doesn't notice it can make the guy think about it for hours, trying to figure out what it meant.
26. Guys seek for advice from girls not other guys. Because most guys think alike, so if 1 guy's confused, then we're all confused.
27. Any guy could write out a rulebook or advice book for flirting, but no guy can write out a book about relationships.
28. Try to be as straightforward as possible.
29. A guy has to experience rejection, because if he's too-good-never-been-busted, never been in love and hurt, he won't be mature and grown up.
30. If the guy does something stupid in front of the girl, he will think about it for the next couple days or until the next time he spends time with the girl.
31. No matter how much guys talk about asses and boobs, personality is key.
32. Guys learn from experience not from the romance books that girls read and take as their basis of experience.
33. Guys worry about the thin line between being compassionate and being whipped.
34. If a guy looks unusually calm and laid back, he's probably faking it and is spazzing inside.
35. When a guy says he is going crazy about the girl, he really is. Guys rarely say that.
36. When a guy asks you to leave him alone, he's just actually saying, "Please come and listen to me."
37. Guys don't really have final decisions.
38. If a guy starts to talk seriously, listen to him. It doesn't happen that often, so when it does, you know something's up.
39. If your best guy friend seems to avoid you or is never around when you're with your boyfriend, he's probably jealous and likes you.
40. When a guy looks at you for longer than a second, he's definitely thinking something.
41. Guys like femininity not feebleness.
42. Guys don't like girls who punch harder than they do.
43. A guy has more problems than you can see with your naked eyes.
44. Don't be a snob. Guys can be intimidated and give up easily.
45. Everything in moderation. Put on makeup, wear perfume. Just not too much.
46. Guys talk about girls more than girls talk about guys.
47. Guys hate rejection, but they hate being led on even more.
48. Guys really think that girls are strange and have unpredictable decisions and are MAD confusing but somehow are drawn even more to them.
49. A guy would give his left nut to be able to read a girl's mind for a day.
50. No guy can handle all his problems by his own. He's just too stubborn to admit it.
*credit to http://hbish.tumblr.com/post/48335441/50-things-girls-should-know-about-guys
Saturday, January 10, 2009
-ReNunGaN-
1) Jaga solat dan lakukan ibadah-ibadah khusus dan umum yang lain.
2) Sentiasa bersangka baik terhadap semua orang (walaupun kita perlu berwaspada setiap masa).
3) Sentiasa memberikan senyuman ikhlas kepada orang di sekeliling kita.
4) Banyakkan bersedekah, samada dalam bentuk wang, senyuman, bantuan tenaga, masa, nasihat, idea, pandangan, sokongan moral dan doa yang berterusan.
5) Sentiasa memperbanyakkan sabar. Nabi s.a.w. pernah berpesan supaya mencari 144 sebab sebelum kita memarahi orang.
6) Sentiasa ceria apabila berjumpa dengan orang lain. Pastikan setiap orang seronok berinteraksi dengan kita.
7) Pamerkan perasaan sayang dan sentiasa sayang-menyayangi antara satu dengan yang lain.
8) Bentuk dan pamerkan sahsiah yang positif setiap masa. Peribadi yang kurang sopan akan menyebabkan orang lain rasa mual terhadap kita.
9) Amalkan sunnah-sunnah harian setiap masa dan insyaAllah orang lain akan tertarik kepada kita.
10) Jika wujud sebarang perasaan sombong atau benci terhadap orang lain, terus ingatkan diri kita tentang mati. Kita mudah insaf dan balik ke pangkal jalan apabila mengingati mati.
11) Sentiasa syukur dan redha atas pemberian Allah swt.
12) Sentiasa memberi salam dan ucap selamat kepada orang lain. Pemberian salam akan mengukuhkan hubungan sesama manusia.
13) Pamerkan simpati kepada setiap individu-individu yang memerlukan simpati dan perhatian.
14) Jadilah pendengar dan kawan yang setia.
15) Sampaikan berita baik tentang orang lain dan sembunyikan kelemahan atau keburukan orang lain.
16) Sentiasalah bermaaf-maafan sebelum berpisah dengan seseorang dan iringi perpisahan dengan doa.
Terlebih Dahulu Baiki Diri
Untuk menarik perhatian orang lain terhadap diri kita, kita perlu terlebih dahulu menyayangi dan memperbaiki diri kita. Orang yang mengasihi dirinya tidak akan melakukan sebarang kegiatan yang boleh mensabotaj dan merosakkan dirinya. Setiap tindak-tanduknya akan dilakukan secara berhikmah dan sentiasa memikirkan perasaan orang lain. Ingatlah pesanan seorang sarjana: "Orang tidak kisah setakat mana yang anda tahu (berilmu), sehinggalah mereka tahu yang anda kisah terhadap mereka."
At Last!!!
soeraya:hope our friendship will last forever and i love u guys!
-THE END-
Thursday, January 1, 2009
Missing Them
It has been almost 2 YEARS.....
I do missed all my friends especially my ABNORMALS......
♥Aya,Jijie,Farah,Aby,Wanie,Fatin,Jiehan,Fariza and also Ayien♥...
We haall ven't met until today because of us are busy with our own life....
As i remember, the last day I met with all my friends when my SPM results been announced...
I miss every single moments at that time...
I do missed all my classmates especially Reza,Syuhada,Fatinx,Abaq,Erma,Qeela,Faiz,Acap,Hafiz and not to forget Allahyarham Aizzat.....
I miss the moments we laugh together, do work together, skip classess,making teachers angry and the thing that i would not forget is the time that we went to Frenzy's House!Hahaha...Funny....
And now,i'm happy with my not so new frens...
Aimi,Syitah,Mek,Nanad,Mirul,Hakim,Mizi and my roomates....
They make my day become more cheerful and happy!
We had a very happy moment together for every single day.....
Thanx guys....!!
I appreciate it.....
Not to forget my cyber friend,Mr.Z....
He always makes me happy and i'm glad to be one of his frens...
Dont forget to always listen to ARJUNA song k...
And to all my frens, I hope our frenship will last long forever and ever....I LOVE YOU GUYS SO MUCH!!!!
Thanx for be with me whenever I need you guys.....
-THE END-
soeraya:persahabatan yang sejati merupakan persahabatan yang mengharungi susah dan senang bersama-sama...