Holi is an ancient festival of India and was originally known as 'Holika'. The festivals finds a detailed description in early religious works such as Jaimini's Purvamimamsa-Sutras and Kathaka-Grhya-Sutras. Historians also believe that Holi was celebrated by all Aryans but more so in the Eastern part of India.
It is said that Holi existed several centuries before Christ. However, the meaning of the festival is believed to have changed over the years. Earlier it was a special rite performed by married women for the happiness and well-being of their families and the full moon (Raka) was worshiped.
Calculating the Day of Holi There are two ways of reckoning a lunar month- 'purnimanta' and 'amanta'. In the former, the first day starts after the full moon; and in the latter, after the new moon. Though the amanta reckoning is more common now, the purnimanta was very much in vogue in the earlier days.
According to this purnimanta reckoning, Phalguna purnima was the last day of the year and the new year heralding the Vasanta-ritu (with spring starting from next day). Thus the full moon festival of Holika gradually became a festival of merrymaking, announcing the commencement of the spring season. This perhaps explains the other names of this festival - Vasanta-Mahotsava and Kama-Mahotsava.
Reference in Ancient Texts and Inscriptions Besides having a detailed description in the Vedas and Puranas such as Narad Purana and Bhavishya Purana, the festival of Holi finds a mention in Jaimini Mimansa. A stone incription belonging to 300 BC found at Ramgarh in the province of Vindhya has mention of Holikotsav on it. King Harsha, too has mentioned about holikotsav in his work Ratnavali that was written during the 7th century.
The famous Muslim tourist - Ulbaruni too has mentioned about holikotsav in his historical memories. Other Muslim writers of that period have mentioned, that holikotsav were not only celebrated by the Hindus but also by the Muslims.
Koshish Koi Aapse Na Ruthe, Zindagi Me Apno Ka Sath Na Chhute, Dosti Koi Bhi Ho Use Aisa Nibhao, Ki Us Dosti Ki Dor Zindagi Bhar Na Toote.
कोशिश करो कोई आपसे ना रूठे, जिंदगी में अपनों का साथ ना छूटे, दोस्ती कोई भी हो उसे ऐसा निभाओ, कि उस दोस्ती की डोर जिंदगी भर ना टूटे।
Aap Jaisa Dost
Aansu Bahe To Ehsaas Hota Hai, Dosti Ke Bina Jeevan Kitna Udaas Rahta Hai, Umr Ho Aapki Chand Jitni Lambi, Aap Jaisa Dost Kahan Har Kisi Ke Pas Hota Hai.
आंसू बहें तो एहसास होता है, दोस्ती के बिना जीवन कितना उदास होता है, उम्र हो आपकी चाँद जितनी लंबी, आप जैसा दोस्त कहाँ हर किसी के पास होता है।
Marna Akele Hi Hai
Ek Chahat Hoti Hai Dosto Ke Saath Jeene Ki Janab, Warna Pata To Hume Bhi Hai Ki Marna Akele Hi Hai.
एक चाहत होती है दोस्तों के साथ जीने की जनाब, वरना पता तो हमें भी है की मरना अकेले ही है।
Aap Ki Taraha Anmol Nahi Hota
Muskurahat Ka Koi Mol Nahi Hota, Kuch Riston Ka Koi Tol Nahi Hota, Log To Mil Jate Hai Har Modh Par , Har Koi Aap Ki Taraha Anmol Nahi Hota.
मुस्कराहट का कोई मोल नहीं होता, कुछ रिश्तों का कोई तोल नहीं होता, लोग तो मिल जाते है हर मोड़ पर, हर कोई आप की तरह अनमोल नहीं होता।
Muskurana Hi Khushi Nahi Hoti, Umr Bitana Hi Zindagi Nahi Hoti, Dost Ko Roz Yaad Karna Padta Hai, Dosti Kar Lena Hi Dosti Nahi Hoti.
मुस्कुराना ही ख़ुशी नहीं होती, उम्र बिताना ही ज़िन्दगी नहीं होती, दोस्त को रोज याद करना पड़ता है, दोस्ती कर लेना हीं दोस्ती नहीं होती।
Dosti Khareed Lenge
Gham Ko Bechkar Khushi Khareed Lenge, Khwabon Ko bechkar Zindagi Khareed Lenge, Hoga Imthaan To Dekhegi Duniya, Khud Ko BechKar Aapki Dosti Khareed Lenge.
गम को बेचकर खुशी खरीद लेंगे, ख्वाबो को बेचकर जिन्दगी खरीद लेंगे , होगा इम्तहान तो देखेगी दुनिया, खुद को बेचकर आपकी दोस्ती खरीद लेंगे।
Geet Ki Jarurat Mehfil Me Hoti Hai,
Pyar Ki Jarurat Har Dil Me Hoti Hai,
Bina Dost Ke Adhuri Hai Zindagi,
Kyunki Dost Ki Jarurat Har Pal Me Hoti Hai.
गीत की जरुरत महफ़िल में होती है,
प्यार की जरुरत हर दिल में होती है,
बिना दोस्त के अधूरी है जिंदगी,
क्योंकि दोस्त की जरुरत हर पल में होती है।
Dosti Ka Shukriya
Yaad Dosti Shayari
Dosti Ka Shukriya Kuch Ish Trah Ada Karu,
Aap Bhul Bhi Jao To Main Yaad Karu,
Dosti Ne Bas Itna Sikhaya Hai Muze
Ke Khud Se Pahle Apke Liye Dua Karu.
दोस्ती का शुक्रिया कुछ इस तरह अदा करूँ,
आप भूल भी जाओ तो मैं हर पल याद करूँ,
खुदा ने बस इतना सिखाया हैं मुझे,
कि खुद से पहले आपके लिए दुआ करूँ।
Dosti Dard Nahi
Dosti Dard Nahi Khushiyon Ki Saugat Hai,
Kisi Apne Ka Zindagi Bhar Ka Saath Hai,
Ye To Dilo Ka Wo Khoobsurat Ehsaas Hai,
Jiske Dum Se Roshan Ye Saari Kaaynat Hai.
दोस्ती दर्द नहीं खुशियों कि सौगात है,
किसी अपने का ज़िन्दगी भर का साथ है,
ये दिलो का वो खूबसूरत एहसास है,
जिसके दम से रोशन ये सारी कायनात है।
Diye To Aandhi Me Bhi Jala Karte Hain, Gulaab To Kaanto Me Hi Khila Karte Hain, Khush-Naseeb Bahut Hoti Hai Woh Shaam, Jisme Dost Aap Jaise Mila Karte Hain.
दिए तो आंधी में भी जला करते हैं, गुलाब तो काँटों में ही खिला करते हैं, खुशनसीब बहुत होती है वो शाम, जिसमे दोस्त आप जैसे मिला करते हैं।
Aaj khuda se mulakat huyi, thodi hi sahi par baat hui, maine aapke baare mein pucha ye insaan kaisa hai, khuda bola sambhaal ke rakhna bilkul mere jaisa hai.
Aasmaan Se Tod Kar Sitara Diya Hai, Aalam-e-Tanhai Mein Ek Sharara Diya Hai, Meri Kismat Bhi Naaz Karti Hai Mujhpe, Khuda Ne Dost Hi Itna Pyara Diya Hai.
आसमान से तोड़ कर सितारा दिया है, आलम-ए-तन्हाई में एक शरारा दिया है, मेरी किस्मत भी नाज़ करती है मुझपे, खुदा ने दोस्त ही इतना प्यारा दिया है।
2) Dost Khuda Hota Hai
Dosti Mein Dost, Dost Ka Khuda Hota Hai, Mahsoos Tab Hota Hai Jab Wo Juda Hota Hai.
दोस्ती में दोस्त, दोस्त का ख़ुदा होता है, महसूस तब होता है जब वो जुदा होता है।
3) Na Tum Door Jaana Na Hum Door Jayenge, Apne-Apne Hisse Ki Dosti Ko Nibhayenge.
ना तुम दूर जाना ना हम दूर जायेंगे, अपने-अपने हिस्से की दोस्ती निभाएंगे।
4) Yaad Karoge Is Pagal Dost Ko
Hum Jab Bhi Aapki Duniya Se Jayenge, Itni Khushiyan Aur Apnapan De Jayenge, Ke Jab Bhi Yaad Karoge Is Pagal Dost Ko, Hansti Aankhon Se Aansoo Nikal Aayenge.
हम जब भी आपकी दुनिया से जायेंगे, इतनी खुशियाँ और अपनापन दे जायेंगे, कि जब भी याद करोगे इस पागल दोस्त को, हँसती आँखों से आँसू निकल आयेंगे।
5) Dosti Naam Hai Sukh-Dukh Ki Kahani Ka, Dosti Raaz Hai Sadaa Hi Muskurane Ka, Ye Koi Pal Bhar Ki Pehchan Nahi Hai, Dosti Vaada Hai Umr Bhar Saath Nibhane Ka.
दोस्ती नाम है सुख-दुःख की कहानी का, दोस्ती राज है सदा ही मुस्कुराने का, ये कोई पल भर की जान-पहचान नहीं है, दोस्ती वादा है उम्र भर साथ निभाने का।
6) Aadatein Alag Hain Meri Duniya Walo Se, Dost Kam Rakhta Hoon Par LaJawab Rakhta Hoon.
आदतें अलग हैं मेरी दुनिया वालों से, दोस्त कम रखता हूँ पर लाजवाब रखता हूँ।
7) Sachche Dost Kabhi Girne Nahi Dete, Na Kisi Ki Najron Se Na Kisi Ke Kadmon Mein.
सच्चे दोस्त हमें कभी गिरने नहीं देते, न किसी कि नजरों मे न किसी के कदमों में।
Pretty much everyone has heard of the terms spyware, malware, virus, trojan horse, computer worm, rootkit, etc, etc, but do you really know the difference between each of them? I was trying to explain the difference to someone and got a little confused myself. With so many types of threats out there, it’s hard to keep track of all the terms.
In this article, I’ll go through some of the major ones we hear all the time and tell you the differences. Before we get started, though, let’s get two other terms out of the way first: spyware and malware. What’s the difference between spyware and malware?
Spyware, in its original meaning, basically meant a program that was installed onto a system either without your permission or clandestinely bundled with a legit program that collected personal information about you and then sent it off to a remote machine. However, spyware eventually went beyond just computer monitoring and the term malware started to be used interchangeably.
Malware is basically any type of malicious software intended to do harm to the computer, gather information, gain access to sensitive data, etc. Malware includes viruses, trojans, root kits, worms, keyloggers, spyware, adware, and pretty much anything else you can think of. Now let’s talk about the difference between a virus, trojan, worm and rootkit.
Viruses
Even though viruses seem like the majority of malware you find these days, it’s actually not. The most common types of malware are trojans and worms. That statement is based off the list of top malware threats published by Microsoft:
So what is a virus? It’s basically a program that can spread itself (replicate) from one computer to another. The same is true for a worm also, but the difference is that a virus usually has to inject itself into an executable file in order to run. When the infected executable is run, it can then spread to other executables. In order for a virus to spread, it normally requires some kind of user intervention.
If you have ever downloaded an attachment from your email and it ended up infecting your system, that would be considered a virus because it requires the user to actually open the file. There are lots of ways viruses cleverly insert themselves into executable files.
One type of virus, called a cavity virus, can insert itself into used sections of an executable file, thereby not damaging the file nor increasing the size of the file.
The most common type of virus nowadays is the Macro Virus. These are sadly viruses that inject Microsoft products like Word, Excel, Powerpoint, Outlook, etc. Since Office is so popular and it’s on the Mac too, it’s obviously the smartest way to spread a virus if that’s what you’re looking to accomplish.
Trojan Horse
A Trojan Horse is a malware program that does not try to replicate itself, but instead get installed onto a users system by pretending to be a legitimate software program. The name obviously comes from Greek mythology since the software presents itself as harmless and thereby tricks the user into installing it on their computer.
Once a Trojan Horse gets installed on a user’s computer, it doesn’t try to inject itself into a file like a virus, but instead allows the hacker to remotely control the computer. One of the most common uses of a computer infected with a Trojan Horse is making it part of a botnet.
A botnet is basically a bunch of machines connected over the Internet that can then be used to send spam or perform certain tasks like Denial-of-service attacks, which take down websites.
When I was in college back in 1998, one crazy popular Trojan Horse at the time was Netbus. In our dorms, we used to install it on each other’s computers and play all kinds of pranks on each other. Unfortunately, most Trojan Horses will crash computers, steal financial data, log keystrokes, watch your screen with your permissions and lots more devious stuff.
Computer Worm
A computer worm is just like a virus, except that it can self-replicate. Not only can it replicate on it’s own without needing to a host file to inject itself into, it normally also uses the network to spread itself. This means that a worm can do serious damage to a network as a whole, whereas a virus usually targets files on the computer that is infected.
All worms come with or without a payload. Without a payload, the worm will just replicate itself across the network and eventually slow the network down because of the increase in traffic caused by the worm.
A worm with a payload will replicate and try to perform some other task like deleting files, sending emails, or installing a backdoor. A backdoor is just a way for to bypass authentication and get remote access to the computer.
Worms spread primarily because of security vulnerabilities in the operation system. That’s why it’s important to install the latest security updates for your OS.
Rootkit
A rootkit is malware that is extremely hard to detect and that actively tries to hide itself from the user, the OS and any anti-virus/anti-malware programs. The software can get installed in any number of ways including exploiting a vulnerability in the OS or by gaining administrator access to the computer.
After the program has been installed and as long as it has full administrator privileges, the program will then go about hiding itself and altering the currently installed OS and software to prevent detection in the future. Rootkits are what you hear will turn off your anti-virus or install into the OS kernel, whereby your only option sometimes is to reinstall the entire operating system.
Rootkits can also come with payloads whereby they hide other programs like viruses and key loggers. To get rid of a rootkit without reinstalling the OS requires users to boot to an alternative operating system first and then try to clean the rootkit or at least copy off critical data.
Does your computer have a malware problem? Here are seven warning signs that your PC's security has been compromised.
Computers are complicated enough that they don't always do precisely what we expect. Sometimes an unexpected behavior is just a fluke; other times, it's an outward and visible sign of an inward and terrible malware infestation. If you notice any of these security warning signs, your system may well be compromised.
1. Popup ads appear even when no browser is open. While not as common as they used to be, adware programs bombard their victims with advertisements. Sometimes they're ads for legitimate products, other times they contain links to malicious websites, sites that will attempt to drop more malware on your PC.
2. Browser navigation gets redirected. Not every site redirect is malicious, but if you find that trying to reach Google takes you to an unfamiliar search site, you've almost certainly got a problem. Sometimes the redirection is more subtle. For example, a banking Trojan might divert your browser to a fraudulent site that looks just like your bank's real site. In that case your only clue is the unfamiliar URL in the Address bar.
3. A security program you never installed pops up scary warnings. Creating and distributing fake antivirus programs is a lucrative business. The perpetrators use drive-by downloads or other sneaky techniques to get the fake antivirus onto your system, then display scary warnings about made-up threats. Naturally you have to register a payment before the fraudulent tool will "fix" the problem. And of course scanning for malware with the fake AV is super-fast, since it's not actually doing anything.
4. Posts you didn't write appear on your social media pages. Malware focused on Facebook and other social media sites propagates by generating fake posts. Typically these posts include an inflammatory statement of some kind, like "OMG were you really that drunk? Look at this picture!" Anyone who falls for the fake and clicks the link will become the next victim.
5. A program holds your PC for ransom. Some malware programs literally hold your PC or data for ransom. Overt ransomware threats may encrypt all your pictures and documents and demand that you pay to get them back. Others try to obscure what they're doing. For example, they may display a warning supposedly from the FBI stating that your computer was used to send spam and demanding that you pay a fine before you're allowed to use it again. Of course, even if you do pay, you may not get your system back.
6. Suddenly you can't use common system tools. A smart user, suspecting the presence of malware, might launch Task Manager to investigate, or check settings using Registry Editor. If you suddenly find that trying to use these or other system tools triggers a message saying your Administrator has disabled them, it may well be an attempt at self-defense by malware on your system.
7. Everything seems perfectly normal. That's right. Some types of malware do their best to hide all activity, leaving no visible traces. Even when you don't notice anything unusual, it's possible that a 'bot on your system may be quietly awaiting instruction from its command and control system, or a Remote Access Trojan may be harvesting your personal information.
If you think that malware has taken up residence in your PC, install a powerful antivirus utility or security suite immediately. Already got one? Then apparently the malware got past its protection. Make sure your antivirus is fully up to date, and run a full scan. Also get a second opinion from a free cleanup-only antivirus like Malwarebytes Anti-Malware 1.70 or Comodo Cleaning Essentials 6. You definitely want to get that nasty, malicious program out of your system as soon as possible, before it invites "friends" to make your security problem even worse.
Internet addiction. Phone addiction. Technology addiction. Whatever you call it, a lot of parents are expressing worries that their children are addicted to their devices.
Is the behavior that parents are concerned about really addiction?
What parents are alarmed about is usually two things: the sheer amount of time their kids spend on screens, and their kids’ resistance to cutting back on that screen time. Getting them to put away their devices and come to dinner, engage in other activities, go outside or do their homework (without also checking social media and streaming TV shows) seems to be an increasingly uphill battle.
Kids sometimes use the word “addiction” to describe their own behavior, too. In a 2016 survey by Common Sense Media, half of teenagers said they “feel” they’re addicted to their mobile device. Three quarters of them said they felt compelled to immediately respond to texts, social media posts and other notifications.
“More often than not, when people say that someone is addicted to the internet or addicted to their phone, they’re using it colloquially,” notes Dr. David Anderson, a clinical psychologist and director of the Behavior Disorders Center at the Child Mind Institute. By calling it addiction, parents are often communicating their concern that so much screen time is unhealthy, as well as their feeling that they’re powerless to stop it.
Are kids addicted?
While the comparison to substance abuse is tempting, because devices are stimulating to the same reward centers of the brain, experts point out crucial differences.
“Addiction doesn’t really capture the behavior we’re seeing,” says Dr. Matthew Cruger, a neuropsychologist and the director of the Learning and Development Center at the Child Mind Insititute. “With addiction you have a chemical that changes the way we respond, that leads us to be reliant on it for our level of functioning. That’s not what ‘s happening here. We don’t develop higher levels of tolerance. We don’t need more and more screen time in order to be able to function.”
There is, technically, no such thing as internet or phone addiction. Some in the psychiatric community have proposed a new disorder called internet gaming disorder, to recognize unhealthy patterns of game-playing. But to rise to the level of a disorder, Dr. Anderson notes, the behavior would would be very extreme, and seriously impairing to a child’s life.
That would mean an amount of screen time that’s not only more than parents feel comfortable with, but that crowds out other age-appropriate activities, like socializing, sports, school work — even hygiene and sleep. “We would be looking at adolescents who are pushing everything else out of their lives,” explains Dr. Anderson. “They are not having friendships, not engaging socially — at least offline — and they may be failing in school.”
Some parents may see addict-like behavior, Dr. Anderson adds, when kids get angry if they’re required to stop, insist on more and more screen time, spend a lot of offline time thinking about how and when they will get back online. But these kind of behaviors can be prompted by many pleasurable activities, and don’t constitute an addiction. “More often than not, what I see are parents who are concerned about their teenager’s behavior around screens use the word addiction when it doesn’t really fit.”
One reason to be cautious about using the term, he added, “is that we have a tendency right now within the zeitgeist to pathologize normal adolescent behavior.”
What are kids doing online?
The amount of time teenagers typically spend on phones and other devices can be misleading as a measure of whether they are unhealthily engaged. That’s because many of the things kids do on those devices are age-appropriate activities that in the past have been done offline: socializing with peers, exploring personal interests, shopping, listening to music, doing schoolwork, watching movies or TV.
Texting and use of social media sites, for instance, have become important channels for adolescents connecting to others and being validated. Role-playing games allow kids to interact not only with friends, but to people around the world. A 2016 report by Common Sense Media concluded: “What looks like excessive use and distraction is actually a reflection of new ways of maintaining peer relations and engaging in communities that are relevant to them.”
Is it masking a mental health disorder?
When a child seems unhealthily focused on video games, to the point of social isolation, the behavior may be, rather than addiction, a product of other mental health problems.
Dr. Anderson reports that he finds himself saying to parents, “We understand your hypothesis that your kid is addicted to games, but it may be that he is socially anxious. It may be that he is depressed. It may be that he has a learning disorder.”
Dr. Anderson recalls treating a 16-year-old whose mother was adamant that he was addicted to video games. “I was doing in-home sessions with him, and it was, indeed, very hard to get him off playing Call of Duty to even have the session. But what I realized very quickly was that he had both ADHD and depression, and he had been failing school for as long as he could remember.”
Call of Duty was actually a positive in his life, Dr. Anderson said, “the only thing that provided solace, a sense of belonging. He had joined a crew of people who play Call of Duty and post YouTube videos of them playing.”
Once his ADHD and depression got appropriate treatment, he was able to cut back on Call of Duty, and make offline friends. “He joined the football team at school. His grades improved,” said Dr. Anderson. “In that sense, it was treatment of ‘internet addiction’ through treatment of the actual underlying conditions.”
Problematic use
While experts say that parents should remain skeptical of the notion of addiction, they also argue that parents should be alert for potential negative fallout from screen use. Apps and games are designed to keep us engaged as much as possible, and it can be hard for children to exercise self-control when their impulse is to keep scrolling.
There is ample evidence that intense social media use is correlated with an increase in anxiety and depression as teenagers, especially girls, compare themselves unfavorably to their peers and worry about missing out.
Research shows that excessive gaming — spending two-thirds or more of free time — is correlated with negative mental health outcomes, including higher incidence of anxiety, depression and substance use.
There is evidence that multitasking — using social media, texting, watching tv while doing homework — undermines cognitive functioning and decreases learning.
And, of course, experts note constant attention to devices comes at the cost of other activities that are ultimately more valuable, and developmentally important.
Superficial engagement
“Our brains are hardwired to like things that are novel and stimulating, and the phone captures that,” notes Dr. Cruger. “It’s easier to engage in constantly checking your phone or playing a game than tasks that require more mental effort, though those are ultimately more rewarding for a lot of people.”
Dr. Cruger sees an anaology to gambling in that checking devices is only intermittently reinforcing. “People spend a lot of time looking briefly at things, not diving down, hoping it’s going to be rewarding, though often it’s not.”
Why would you pick up a book if you’re stimulated by Instagram or Candy Crush, Dr. Cruger asks. “You still retain the capacity to apply more mental effort to things but the opportunity is lost when you’re constantly superficially engaged.”
“There are absolutely alarms to be sounded,” concludes Dr. Anderson, “but the vast majority of kids are engaging in screen-related behaviors that may not be