Terima kasih atas kunjungan berharga anda. Jadikan ia berharga dengan bermain di column kempen saya (saya akan balas jasa anda).
Blog ini di'maintain'oleh blogger yang masih ayam dalam teknik editing. So kalo berat sgt nak load page tu, sila inform. Owner akan cuba buangkan any load yang tak perlu. Kalo ada sebarang cadangan lagi bagus. Send dekat

Tuesday, September 21, 2010

Article menarik untuk bacaan umum

Hari ini aku dah khatamkan 2 article yg menarik sebagai peringatan utk kita persiapkan diri menhadapi Kiamat!

Ni link kepada article tersebut

  1. Vaticans
  2. Hitlers
Selamat membaca..  Gunalah ilmu utk mendekatkan diri kepada Pencipta Alam yang Mutlak. Wallahu'alam

Monday, September 20, 2010

Ujian HIV sekitar Kuala Lumpur


MASA : 2.00 pagi - 4 .30 petang ( HARI : ISNIN – JUMAAT)
MASA : 2.45 petang – 4.30 petang ( HARI : JUMAAT)

Jabatan Kesihatan DBKL – 03 92845166 * (Hari Rabu Sahaja)
KM 4, Jln. Cheras, Kuala Lumpur

Klinik Kesihatan Kuala Lumpur – 03 26155752
Hospital Kuala Lumpur

Klinik Kesihatan Putrajaya – 03 88883057
No. 1, Jln. Presint 9E, Putrajaya

Poliklinik Komuniti Tanglin – 03 26983311
Jalan Cenderasari, Kuala Lumpur

Klinik Kesihatan Cheras – 03 91304583
Batu 4 ½, Jln. Cheras, Kuala Lumpur

Klinik Kesihatan Cheras Baru – 03 42946114
Jln. 16, Kg. Cheras Baru, Off Jln. Ku ari

Klinik Kesihatan Batu – 03 62573355
Batu 4 ½, Jln. Ipoh, Kuala Lumpur

Klinik Kesihatan Petaling Bahagia – 03 77829355
Batu 6, Jln. Puchong, Kuala Lumpu r

Klinik Kesihatan Dato’ Keramat – 03 42573333
Jln. Jelatek, Dato’ Keramat, Ku ala Lumpur

Klinik Kesihatan Kampung Panda n – 03 92810272
Jln. Kg. Pandan, Kuala Lumpur

Klinik Kesihatan Pantai, B angsar – 03 22881071
Blok C, Wisma Ghoshen, Plaza Pantai, Off Jln. Pantai Baru, KL

Klinik Kesihatan Jinjang – 03 62583355
No 2, Jln. 4/16, Jinjang Utara Tamb ahan, kl

Klinik Kesihatan Setapak – 03 41425429
No. 26/28, Jln. 9/23A, Medan Makmur, Setapak, KL

Klinik Kesihatan Sentul – 03 40427557
189 , Jln Perhentian, Off Jln. Hj. Salleh, Sentul, KL

Klinik Kesiha tan Sungai Besi – 03 90585464
Jalan Besar, Sungai Besi, KL

Klinik Kesihatan Bandar Tun Razak – 03 91713333
No. 16&18 Jln. Jujur 3 , Bdr. Tun Razak, KL

*sila buat appointment seawal mungkin.. sbb queue nye sgt ramai.. biasalah sumer org mau kawin maa..

20 Linux Server Hardening Security Tips

Article from
http://www.cyberciti.biz/tips/linux-security.html by Vivek Gite

Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.

#1: Encrypt Data Communication

All data transmitted over a network is open to monitoring. Encrypt transmitted data whenever possible with password or using keys / certificates.
  1. Use scp, ssh, rsync, or sftp for file transfer. You can also mount remote server file system or your own home directory using special sshfs and fuse tools.
  2. GnuPG allows to encrypt and sign your data and communication, features a versatile key managment system as well as access modules for all kind of public key directories.
  3. Fugu is a graphical frontend to the commandline Secure File Transfer application (SFTP). SFTP is similar to FTP, but unlike FTP, the entire session is encrypted, meaning no passwords are sent in cleartext form, and is thus much less vulnerable to third-party interception. Another option is FileZilla - a cross-platform client that supports FTP, FTP over SSL/TLS (FTPS), and SSH File Transfer Protocol (SFTP).
  4. OpenVPN is a cost-effective, lightweight SSL VPN.
  5. Lighttpd SSL (Secure Server Layer) Https Configuration And Installation
  6. Apache SSL (Secure Server Layer) Https (mod_ssl) Configuration And Installation

#1.1: Avoid Using FTP, Telnet, And Rlogin / Rsh

Under most network configurations, user names, passwords, FTP / telnet / rsh commands and transferred files can be captured by anyone on the same network using a packet sniffer. The common solution to this problem is to use either OpenSSH , SFTP, or FTPS (FTP over SSL), which adds SSL or TLS encryption to FTP. Type the following command to delete NIS, rsh and other outdated service:

# yum erase inetd xinetd ypserv tftp-server telnet-server rsh-serve


#2: Minimize Software to Minimize Vulnerability

Do you really need all sort of web services installed? Avoid installing unnecessary software to avoid vulnerabilities in software. Use the RPM package manager such as yum or apt-get and/or dpkg to review all installed set of software packages on a system. Delete all unwanted packages.

# yum list installed
# yum list packageName
# yum remove packageName
# dpkg --list
# dpkg --info packageName
# apt-get remove packageName


#3: One Network Service Per System or VM Instance

Run different network services on separate servers or VM instance. This limits the number of other services that can be compromised. For example, if an attacker able to successfully exploit a software such as Apache flow, he / she will get an access to entire server including other services such as MySQL, e-mail server and so on. See how to install Virtualization software:


#4: Keep Linux Kernel and Software Up to Date

Applying security patches is an important part of maintaining Linux server. Linux provides all necessary tools to keep your system updated, and also allows for easy upgrades between versions. All security update should be reviewed and applied as soon as possible. Again, use the RPM package manager such as yum and/or apt-get and/or dpkg to apply all security updates.

# yum update
# apt-get update && apt-get upgrade

You can configure Red hat / CentOS / Fedora Linux to send yum package update notification via email. Another option is to apply all security updates via a cron job. Under Debian / Ubuntu Linux you can use apticron to send security notifications.


#5: Use Linux Security Extensions

Linux comes with various security patches which can be used to guard against misconfigured or compromised programs. If possible use SELinux and other Linux security extensions to enforce limitations on network and other programs. For example, SELinux provides a variety of security policies for Linux kernel.


#5.1: SELinux

I strongly recommend using SELinux which provides a flexible Mandatory Access Control (MAC). Under standard Linux Discretionary Access Control (DAC), an application or process running as a user (UID or SUID) has the user's permissions to objects such as files, sockets, and other processes. Running a MAC kernel protects the system from malicious or flawed applications that can damage or destroy the system. See the official Redhat documentation which explains SELinux configuration.


#6: User Accounts and Strong Password Policy

Use the useradd / usermod commands to create and maintain user accounts. Make sure you have a good and strong password policy. For example, a good password includes at least 8 characters long and mixture of alphabets, number, special character, upper & lower alphabets etc. Most important pick a password you can remember. Use tools such as "John the ripper" to find out weak users passwords on your server. Configure pam_cracklib.so to enforce the password policy.

#6.1: Password Aging

The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change his/her password. The /etc/login.defs file defines the site-specific configuration for the shadow password suite including password aging configuration. To disable password aging, enter:

chage -M 99999 userName

To get password expiration information, enter:

chage -l userName

Finally, you can also edit the /etc/shadow file in the following fields:


  1. Minimum_days: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password.
  2. Maximum_days: The maximum number of days the password is valid (after that user is forced to change his/her password).
  3. Warn : The number of days before password is to expire that user is warned that his/her password must be changed.
  4. Expire : Days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used.
I recommend chage command instead of editing the /etc/shadow by hand:

# chage -M 60 -m 7 -W 7 userName

Recommend readings:


#6.2: Restricting Use of Previous Passwords

You can prevent all users from using or reuse same old passwords under Linux. The pam_unix module parameter remember can be used to configure the number of previous passwords that cannot be reused.


#6.3: Locking User Accounts After Login Failures

Under Linux you can use the faillog command to display faillog records or to set login failure limits. faillog formats the contents of the failure log from /var/log/faillog database / log file. It also can be used for maintains failure counters and limits.To see failed login attempts, enter:


To unlock an account after login failures, run:

faillog -r -u userName

Note you can use passwd command to lock and unlock accounts:

# lock account
passwd -l userName
# unlocak account
passwd -u userName


#6.4: How Do I Verify No Accounts Have Empty Passwords?

Type the following command
# awk -F: '($2 == "") {print}' /etc/shadow
Lock all empty password accounts:
# passwd -l accountName


#6.5: Make Sure No Non-Root Accounts Have UID Set To 0

Only root account have UID 0 with full permissions to access the system. Type the following command to display all accounts with UID set to 0:

# awk -F: '($3 == "0") {print}' /etc/passwd

You should only see one line as follows:

If you see other lines, delete them or make sure other accounts are authorized by you to use UID 0.


#7: Disable root Login

Never ever login as root user. You should use sudo to execute root level commands as and when required. sudo does greatly enhances the security of the system without sharing root password with other users and admins. sudo provides simple auditing and tracking features too.


#8: Physical Server Security

You must protect Linux servers physical console access. Configure the BIOS and disable the booting from external devices such as DVDs / CDs / USB pen. Set BIOS and grub boot loader password to protect these settings. All production boxes must be locked in IDCs (Internet Data Center) and all persons must pass some sort of security checks before accessing your server. See also:


#9: Disable Unwanted Services

Disable all unnecessary services and daemons (services that runs in the background). You need to remove all unwanted services from the system start-up. Type the following command to list all services which are started at boot time in run level # 3:

# chkconfig --list | grep '3:on'

To disable service, enter:

# service serviceName stop
# chkconfig serviceName off


#9.1: Find Listening Network Ports

Use the following command to list all open ports and associated programs:


nmap -sT -O server.example.com

Use iptables to close open ports or stop all unwanted network services using above service and chkconfig commands.


#9.2: See Also


#10: Delete X Windows

X Windows on server is not required. There is no reason to run X Windows on your dedicated mail and Apache web server. You can disable and remove X Windows to improve server security and performance. Edit /etc/inittab and set run level to 3. Finally, remove X Windows system, enter:


#11: Configure Iptables and TCPWrappers

Iptables is a user space application program that allows you to configure the firewall (Netfilter) provided by the Linux kernel. Use firewall to filter out traffic and allow only necessary traffic. Also use the TCPWrappers a host-based networking ACL system to filter network access to Internet. You can prevent many denial of service attacks with the help of Iptables:


#12: Linux Kernel /etc/sysctl.conf Hardening

/etc/sysctl.conf file is used to configure kernel parameters at runtime. Linux reads and applies settings from /etc/sysctl.conf at boot time. Sample /etc/sysctl.conf:
# Turn on execshield
# Enable IP spoofing protection
# Disable IP source routing
# Ignoring broadcasts request
# Make sure spoofed packets get logged
net.ipv4.conf.all.log_martians = 1


#13: Separate Disk Partitions

Separation of the operating system files from user files may result into a better and secure system. Make sure the following filesystems are mounted on separate partitions:
  • /usr
  • /home
  • /var and /var/tmp
  • /tmp
Create septate partitions for Apache and FTP server roots. Edit /etc/fstab file and make sure you add the following configuration options:
  1. noexec - Do not set execution of any binaries on this partition (prevents execution of binaries but allows scripts).
  2. nodev - Do not allow character or special devices on this partition (prevents use of device files such as zero, sda etc).
  3. nosuid - Do not set SUID/SGID access on this partition (prevent the setuid bit).
Sample /etc/fstab entry to to limit user access on /dev/sda5 (ftp server root directory):

/dev/sda5  /ftpdata          ext3    defaults,nosuid,nodev,noexec 1 2


#13.1: Disk Quotas

Make sure disk quota is enabled for all users. To implement disk quotas, use the following steps:
  1. Enable quotas per file system by modifying the /etc/fstab file.
  2. Remount the file system(s).
  3. Create the quota database files and generate the disk usage table.
  4. Assign quota policies.
  5. See implementing disk quotas tutorial for further details.


#14: Turn Off IPv6

Internet Protocol version 6 (IPv6) provides a new Internet layer of the TCP/IP protocol suite that replaces Internet Protocol version 4 (IPv4) and provides many benefits. Currently there are no good tools out which are able to check a system over network for IPv6 security issues. Most Linux distro began enabling IPv6 protocol by default. Crackers can send bad traffic via IPv6 as most admins are not monitoring it. Unless network configuration requires it, disable IPv6 or configure Linux IPv6 firewall:


#15: Disable Unwanted SUID and SGID Binaries

All SUID/SGID bits enabled file can be misused when the SUID/SGID executable has a security problem or bug. All local or remote user can use such file. It is a good idea to find all such files. Use the find command as follows:

#See all set user id files:
find / -perm +4000
# See all group id files
find / -perm +2000
# Or combine both in a single command
find / \( -perm -4000 -o -perm -2000 \) -print
find / -path -prune -o -type f -perm +6000 -ls

You need to investigate each reported file. See reported file man page for further details.


#15.1: World-Writable Files

Anyone can modify world-writable file resulting into a security issue. Use the following command to find all world writable and sticky bits set files:

find /dir -xdev -type d \( -perm -0002 -a ! -perm -1000 \) -print

You need to investigate each reported file and either set correct user and group permission or remove it.


#15.2: Noowner Files

Files not owned by any user or group can pose a security problem. Just find them with the following command which do not belong to a valid user and a valid group

find /dir -xdev \( -nouser -o -nogroup \) -print

You need to investigate each reported file and either assign it to an appropriate user and group or remove it.


#16: Use A Centralized Authentication Service

Without a centralized authentication system, user auth data becomes inconsistent, which may lead into out-of-date credentials and forgotten accounts which should have been deleted in first place. A centralized authentication service allows you maintaining central control over Linux / UNIX account and authentication data. You can keep auth data synchronized between servers. Do not use the NIS service for centralized authentication. Use OpenLDAP for clients and servers.


#16.1: Kerberos

Kerberos performs authentication as a trusted third party authentication service by using cryptographic shared secret under the assumption that packets traveling along the insecure network can be read, modified, and inserted. Kerberos builds on symmetric-key cryptography and requires a key distribution center. You can make remote login, remote copy, secure inter-system file copying and other high-risk tasks safer and more controllable using Kerberos. So, when users authenticate to network services using Kerberos, unauthorized users attempting to gather passwords by monitoring network traffic are effectively thwarted. See how to setup and use Kerberos.


#17: Logging and Auditing

You need to configure logging and auditing to collect all hacking and cracking attempts. By default syslog stores data in /var/log/ directory. This is also useful to find out software misconfiguration which may open your system to various attacks. See the following logging related articles:
  1. Linux log file locations.
  2. How to send logs to a remote loghost.
  3. How do I rotate log files?.
  4. man pages syslogd, syslog.conf and logrotate.


#17.1: Monitor Suspicious Log Messages With Logwatch / Logcheck

Read your logs using logwatch or logcheck. These tools make your log reading life easier. You get detailed reporting on unusual items in syslog via email. A sample syslog report:

################### Logwatch 7.3 (03/24/06) ####################
        Processing Initiated: Fri Oct 30 04:02:03 2009
        Date Range Processed: yesterday
                              ( 2009-Oct-29 )
                              Period is day.
      Detail Level of Output: 0
              Type of Output: unformatted
           Logfiles for Host: www-52.nixcraft.net.in

 --------------------- Named Begin ------------------------ 

 **Unmatched Entries**
    general: info: zone XXXXXX.com/IN: Transfer started.: 3 Time(s)
    general: info: zone XXXXXX.com/IN: refresh: retry limit for master ttttttttttttttttttt#53 exceeded (source ::#0): 3 Time(s)
    general: info: zone XXXXXX.com/IN: Transfer started.: 4 Time(s)
    general: info: zone XXXXXX.com/IN: refresh: retry limit for master ttttttttttttttttttt#53 exceeded (source ::#0): 4 Time(s)

 ---------------------- Named End ------------------------- 

  --------------------- iptables firewall Begin ------------------------ 

 Logged 87 packets on interface eth0
   From 58.y.xxx.ww - 1 packet to tcp(8080)
   From 59.www.zzz.yyy - 1 packet to tcp(22)
   From 60.32.nnn.yyy - 2 packets to tcp(45633)
   From 222.xxx.ttt.zz - 5 packets to tcp(8000,8080,8800) 

 ---------------------- iptables firewall End ------------------------- 

 --------------------- SSHD Begin ------------------------ 

 Users logging in through sshd:
       123.xxx.ttt.zzz: 6 times

 ---------------------- SSHD End ------------------------- 

 --------------------- Disk Space Begin ------------------------ 

 Filesystem            Size  Used Avail Use% Mounted on
 /dev/sda3             450G  185G  241G  44% /
 /dev/sda1              99M   35M   60M  37% /boot

 ---------------------- Disk Space End ------------------------- 

 ###################### Logwatch End #########################

(Note output is truncated)

#17.2: System Accounting with auditd

The auditd is provided for system auditing. It is responsible for writing audit records to the disk. During startup, the rules in /etc/audit.rules are read by this daemon. You can open /etc/audit.rules file and make changes such as setup audit file log location and other option. With auditd you can answers the following questions:
  1. System startup and shutdown events (reboot / halt).
  2. Date and time of the event.
  3. User respoisble for the event (such as trying to access /path/to/topsecret.dat file).
  4. Type of event (edit, access, delete, write, update file & commands).
  5. Success or failure of the event.
  6. Records events that Modify date and time.
  7. Find out who made changes to modify the system's network settings.
  8. Record events that modify user/group information.
  9. See who made changes to a file etc.
See our quick tutorial which explains enabling and using the auditd service.


#18: Secure OpenSSH Server

The SSH protocol is recommended for remote login and remote file transfer. However, ssh is open to many attacks. See how to secure OpenSSH server:


#19: Install And Use Intrusion Detection System

A network intrusion detection system (NIDS) is an intrusion detection system that tries to detect malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by monitoring network traffic.
It is a good practice to deploy any integrity checking software before system goes online in a production environment. If possible install AIDE software before the system is connected to any network. AIDE is a host-based intrusion detection system (HIDS) it can monitor and analyses the internals of a computing system.
Snort is a software for intrusion detection which is capable of performing packet logging and real-time traffic analysis on IP networks.


#20: Protecting Files, Directories and Email

Linux offers excellent protections against unauthorized data access. File permissions and MAC prevent unauthorized access from accessing data. However, permissions set by the Linux are irrelevant if an attacker has physical access to a computer and can simply move the computer's hard drive to another system to copy and analyze the sensitive data. You can easily protect files, and partitons under Linux using the following tools:


#20.1: Securing Email Servers

You can use SSL certificates and gpg keys to secure email communication on both server and client computers:

10 Free Ways To Increase Blog Traffic

1. Join Trafficswarm.com and get a Free Lifetime Membership today. Surf your TrafficSwarm Page and view only the sites that interest you.Start increasing blog traffic today. It just couldn’t be any easier!

2. Submit your blog to as many blog and rss directories as you can. Here is a good place to start http://www.earnbonus.com/feed-directories/

3. Signup at technorati.com and add your blog then ping it when you update.

4. Get a free account at mybloglog.com and add your blog then join the communities and make friends. There is even a cool widget you can add to your blog like what you see on the right here.This is a great way to increase blog traffic.

5. Signup at Stumbleupon.com and make friends in your niche. You can then stumble your post and get your friends to also.Its a good way for increasing blog traffic.

6. Go to Socialposter.com and fill in the exact url to your blog post then title,general summary text then your tags. Now submit to as many social sites as you can. If this is your first time to use these sites then you will need to signup.

7. Leave comments on blogs in your related niche. This is a great way to increase links back to your site and get free blog traffic. Here is a great free tool to monitor popular blogs in your niche so you can be notified and make one of the first good quality comments. Check it out at Commentsniper.com

8. Make sure and add your blog url to your forum signature on any forums you are a member. This can be a powerful way to attract visitors especially if you have quality forum posts.

9. Find one of the top bloggers in your niche then write a good review post of them. Let them know and they will probably link back to you.

10. Join Squidoo.com and make a lens then add a link to your blog.

Enjoy trying!

Air Batu Capor

Air batu campur ataupun lebih terkenal sebagai ABC (juga dikenali sebagai Ais Kacang di Pulau Pinang dan Singapura) merupakan sejenis minuman yang diperbuat daripada ais yang dimesin dan dicampur dengan bahan-bahan seperti kacang, buah kabung, cendol, cincau, jagung, pemanis, seperti sirap dan sarsi serta air nisan.

Ia menjadi pilihan utama bagi penggemar mahupun cuaca sejuk atau panas.

Thursday, September 16, 2010

Takaful Ikhlas bayar pampasan kepada ibu tunggal

Sumber: Sinar Harian, 29hb Januari 2010
Seorang ibu tunggal melahirkan rasa gembira, terharu dan bersyukur apabila menerima bayaran ganjaran polisi perlindungan Ikhlas Savings Takaful dari Takaful Ikhlas Sdn Bhd yang dimiliki arwah suaminya.
Penerima berkenaan, Norazilah Shaari, 26, berkata, suaminya, Jamali Jalani meninggal dunia pada 3 Oktober tahun lalu kerana demam.
Menurutnya, suaminya itu hanya bekerja sebagai seorang petani sementara dia hanya sebagai suri rumah sepenuh masa.
“Suami saya memang seorang yang berpandangan jauh serta mahu hidup keluarga terjamin dan berjimat dengan hasil pendapatan sebagai seorang petani.
“Selain berjimat, suami saya juga mengambil polisi perlindungan Ikhlas Savings Takaful daripada Takaful Ikhlas Sdn Bhd, dengan membayar secara berkala enam bulan sekali, iaitu setiap lepas menuai padi dengan bayaran sebanyak RM2,196 sekali bayar dengan jumlah jaminan RM135,000 “, katanya.
Norazilah berkata, suaminya juga mengambil polisi Ikhlas Education Takaful untuk anak sulungnya, Ahmad Hafizuddin, 5, dengan bayaran berkala enam bulan sekali, juga selepas menuai padi dengan bayaran RM450, bagi enam bulan.
Dia berterima kasih kepada Takaful Ikhlas Sdn Bhd kerana membayar ganjaran perlindungan polisi ini dalam masa yang singkat.
“Wang ini akan disimpan sebaik mungkin untuk perbelanjaan harian, perbelanjaan persekolahan tiga anak saya hingga ke peringkat tertinggi.
“Sebahagian wangnya akan disimpan dalam amanah saham bagi memastikan wang tersebut tidak habis begitu sahaja”, katanya.
Sementara itu, cek bayaran pampasan berjumlah RM137,512 disampaikan Pengurus El Sham Agensi dari Kamunting, Samsudin Man.
Samsudin Man, 54, berkata, Takaful Ikhlas Sdn Bhd membayar sejumlah RM5,000 sebaik Jamali meninggal dunia untuk urusan pengkebumian dan pembayaran kemudiannya melalui cek sebanyak RM95,000 menjadikan jumlahnya RM100,000.
Menurutnya, baki RM37,512 akan dibayar setelah Norazilah menyediakan surat pecah kuasa yang diperoleh daripada pihak Pentadbiran Harta Pusaka Daerah Kerian.
“Sebaik Jamali meninggal dunia maka bayaran polisi Ikhlas Education Takaful anaknya Ahmad Hafizuddin sebanyak RM450 untuk setiap enam bulan dikecualikan dan polisi kekal sehingga 20 tahun dengan yang dinyatakan akan diberi.
“Kaedah pembayaran ganjaran polisi terhadap polisi milik Jemali adalah berasaskan Akta Takaful 1984 dan Peraturan Takaful 2009 malah kami sentiasa berusaha menjelaskan bayaran ganjaran pemegang polisi dengan cepat setelah segala dokumen diperlukan disediakan,” katanya.

Thursday, September 9, 2010

Islamic Ways to Live a Happy Married Life

How to live a happy married life is a question asked by many couples. We take consultation and hire others services to help us with our marriage but we never refer to the religion which has almost all answers. Below are some of the ways to live a happy married life as per Islam:

• The last Prophet (PBUH) stated wife as fragile and sensitive hence gave instructions to take good care of her.
• While giving advice to your wife make sure that no one else is listening, do not expose and make it public.
• Give your wife a feeling of generosity; this will bring her closer to you.
• Don't reject your wife's suggestion altogether and don't stop her when she starts discussing any issue instead be a good listener and avoid being rigid in conversations with her.
• The Prophet Muhammad (PBUH) said, always call your wife with good name and if possible with the name she loves to hear from your mouth.
• Give your wife surprise gifts and give her proper attentions.
• Prophet (PBUH) said, we all have shortcomings, so ignore her shortcomings and the Allah will strengthen your marriage.
• Never stop her to meet her parents and friends, encourage and appreciate her to keep good relationships with others and have a social circle. Always praise her while you are sitting with her relatives and friends, this will increase her love for you.
• Islam emphasizes that individuals should think good about others especially your spouses.
• Remember she is the one who is playing an active role in bringing up your children so respect her and don't shout on her in front of your kids. Her strength as well as her success is yours because you both are just like one soul in two bodies.
• Remember never put someone else above your wife, because no one can get her place.
• The Holy Prophet Muhammad (PBUH) used to help his (PBUH) wives at home by stitching his own clothes etc and he (PBUH) always acts as a helping hand, so it is good to help your wife at domestic works whenever possible.
• Always remember in your prayers your wife and your whole family, God will protect your family in troubles.
• Feel your wife is the best wife of the world, forget the past and look for the better future, this is the only for a happy life.
• Shaitaan (Devil) is the enemy of man and he loves to make divorces, so whenever a fight begins while talking to your wife, this is the shaitaan (the devil) work, so ignore the fight and ask God to strengthen your relationship and protect it from the devil.
• Islam emphasizes that the man should give as much love as he can by doing small actions like put a spoon of food to her mouth with your hands so that she can feel your love with the taste of the food (Prophet Muhammad (PBUH) practiced the same).
• Protect her every time because she is dependent on you, no matter how advanced your wife is she always needs you so your shoulder must be there when she really need it. Help her to take care of the children because it's a heavy duty she cannot handle it alone. Spend time with her and make sure you and she eat meals together.
• Don't ever share your privacy with others like your friends and other family members, whatever is there it must be between you and your wife. When you do not care for such things this means you are putting your marriage at risk.
• Celebrate the traditional and spiritual ceremonies together with your family members.
• Don't pay heed to those who are jealous of your relationship and have trust in each other. Don't just go behind what others say about your spouse. Ask and confirm if you have any doubts.

Share the great moments with her, don't leave her alone when she need your support, and give her equal opportunity to support you in all matters. Respect her because she is one of the strong pillars of your life; don't let this pillar get weak at any stage. May, Allah Almighty fills your heart with love for each other. Ameen! 

Article Source: http://www.writearticles.org/ 

Sunday, September 5, 2010

3 Sebab Kenapa Skim Takaful Penting Kepada Anda

Skim Takaful bukan seperti mana yang anda fikirkan, bukan sekadar seorang agent mengetuk pintu rumah anda untuk menjual polisi bagi melindungi anda daripada sebab kemalangan sahaja.

Skim Takaful adalah lebih daripada itu, ianya memberi jaminan perlindungan apabila kita meninggal dunia dengan manfaat Khairat dibayar pada waris kita.

Tetapi berapa ramaikah diantara kita sudah mendapatkan perlindungan ini? Rata-rata yang kita lihat, masih ramai lagi diantara kita yang tiada perlindungan Takaful. Apakah sebabnya?

1) Tiada pengetahuan langsung.. apa itu Takaful.. Dan

2) Mereka rasakan Takaful itu tidak perlu .. dan melihat ianya sebagai bebanan bayaran tambahan yang perlu dikeluarkan..selain dari bil-bil yang telah sedia ada..

Adakah mereka tahu bahawa jika mereka bermula lebih awal… semasa muda.. mereka mendapat lebih manfaat perlindungan berbanding semasa mereka sudah tua kelak..

Berikut adalah alasan kenapa kita memerlukan Takaful;

Alasan 1

Adakah kita mempunyai berbagai-bagai bil atau bayaran hutang yang perlu di lunaskan pada setiap bulan?? Ini adalah alasan besar kenapa kita memerlukan Takaful supaya segala bayaran bil dan hutang tadi terbayar andainya kita telah tiada.. dan waris kita tidak dibebani lagi oleh hutang kita.

Alasan 2

Anda muda, gagah dan sihat sekarang? Tiada berpenyakit? Jadi inilah masa yang terbaik untuk mendapatkan Takaful. Bayaran sumbangan anda adalah kecil bermula dari sekarang hingga anda berumur 65 tahun.. dan ianya adalah sebagai simpanan persaraan anda nanti.. lagi awal anda bermula takaful adalah lebih bagus… kerana anda tidak perlu risau lagi jika anda mendapat penyakit yang serious akan datang .., kerana anda telah dilindungi Takaful… Orang yang sudah berpenyakit memang tiada sebarang syarikat insuran atau takaful yang akan menerimanya. Kata orang.. ambillah pelan Takaful sekarang… semasa ia menerima kita, jangan sampai semua syarikat takaful dan insuran sudah tidak menerima kita apabila kita telah menghidap penyakit.. ketika itu kita akan menyesal kelak….

Alasan 3

Adakah anda berkahwin? Adakah anda sayang isteri anda? Jadi.. perlukah anda tinggalkan isteri dan anak-anak anda dengan kesusahan setelah ketiadaan anda? Bayangkan jika kita tiada perlindungan Takaful, ditakdirkan kita mengidap kanser 6 bulan akan datang… dan meninggal selepas 18 bulan kemudian. Kita terpaksa tinggalkan isteri dan 2 orang anak kita meneruskan hidup mereka dengan ketiadaan sumber kewangan… bagaimanakah mereka hendak menyara hidup mereka? Membayar bil-bil dan hutang peninggalan kita… Inikah yang patut kita tinggalkan untuk mereka? Cuba fakir-fikirkan….

Banyak lagi alasan-alasan lain kenapa kita perlukan Perlindungan Takaful…

Di bawah ini dinyatakan secara ringkas mengenai manfaat dari Pelan Takaful Ikhlas:-


Dengan mencarum RM100* Sebulan, Anda akan mendapat Manfaat-Manfaat berikut:

Akibat Kematian & hilang upaya kekal menyeluruh - RM 50,000

Akibat Hilang Upaya Kekal Menyeluruh kerana kemalangan - RM 71,000

40 Jenis Penyakit Kritikal - RM 30,000

Keilatan Separa Kekal berdasarkan % - RM 21,000

Dana Pengurusan Jenazah - RM 1,000

Elaun Mengikut Jumlah Hari - RM 100 sehari


Serahan / Tempoh Matang - RM 52,839

Akibat Lumpuh Kekal/ditimpa 40 jenis Penyakit Kritikal

Pelepasan Cukai Maksimum - RM 6,000
Konsep Tabarru' (derma) dalam Dana At-Ta'awuni

*illustrasi di atas adalah berdasarkan kiraan simpanan untuk peserta berumur 25 tahun, lelaki dan matang pada umur 55 tahun dengan kadar keuntungan 6% setahun.

Untuk maklumat lanjut dan penyertaan sila hubungi:

Luqman Nawawi
Tel/SMS : 017-9616771
Email : luqmanawawi@yahoo.co.uk
ym: luqmanawawi

Thursday, September 2, 2010

Insurans Takaful vs Insurans Konvensional

Sabda Rasulullah s.a.w  yang bermaksud: “Tinggalkan anak dan isteri kamu dengan kesenangan adalah lebih baik daripada meninggalkan mereka dalam keadaan meminta-minta”. (Riwayat: Bukhari)

Persiapan untuk mengharungi sebarang ketidakpastian atau ujian-ujian dari Allah s.w.t. itu, contohnya seperti kematian, hilang-upaya kekal, penyakit kritikal, kemalangan dan sebagainya, bukanlah satu usaha yang ingin melawan takdir Allah s.w.t. yang diperkatakan oleh segelintir ahli masyarakat. Ini merupakan satu pandangan yang dangkal dari orang-orang yang jahil tentang agama Islam. Dalil yang mewajibkan seseorang itu mesti berusaha terlebih dahulu sebelum bertawakkal kepada Allah semata-mata adalah sepertimana sabda Rasulullah s.a.w. terhadap seorang arab badui yang meninggalkan untanya tanpa diikat tali terlebih dahulu dan lalu berserah kepada Allah s.w.t. semata-mata, yang bermaksud: "Ikatlah tali unta kamu dahulu dan kemudian barulah berserah kepada Allah s.w.t." (Riwayat: At-Turmuzi) 

Secara amnya perlindungan Takaful adalah skim perlindungan kewangan secara Islam iaitu merupakan satu kaedah persiapan atau ikhtiar/usaha untuk menghadapi atau melindungi sebarang ketidakpastian yang mungkin berlaku keatas diri sendiri, ahli keluarga atau harta benda daripada sebarang musibah atau malapetaka di masa-masa akan datang. Selagi umat manusia terdedah terhadap ketidakpastian dan risiko selagi itulah perlindungan kewangan Takaful itu amat diperlukan sebagai satu ikhtiar/usaha terlebih dahulu sebelum seseorang itu terus bertawakkal kepada Allah s.w.t. semata-mata. 

Justeru, apekah perbezaan diantara insurans takaful dengan insurans konvensional:

Bil. TakafulInsurans Konvensional
 1.Konsep saling bekerja-sama, bertanggung-jawab dan lindung-melindungi.Konsep perniagaan yang berteraskan keuntungan semata-mata.
 2.Kontrak Tabarru' (menderma sebahagian dari sumbangan) dan Kontrak Al-Wakalah
(membenar pihak Takaful Ikhlas menguruskan dana sumbangan peserta).
Kontrak jual-beli dimana pihak syarikat insurans akan menaggung segala liability terhadap pemegang polisi- penanggung insurans berlesen.
 3.Terhindar dari unsur-unsur gharar, maisir dan riba.Wujud unsur-unsur gharar, maisir dan riba.
 4.Operasi dikawal selia oleh Majlis Pengawasan SyariahTiada Majlis Pengawasan Syariah.
 5.Keuntungan pelaburan diagih berdasarkan konsep mudharabah atau yuran prestasi.Keuntungan diagih berdasarkan kadar faedah.
 6.Pengeluaran sebahagian dibenarkan dan tiada kadar faedah dikenakan.Pinjaman dibenarkan dan kadar faedah dikenakan.
Related Posts Plugin for WordPress, Blogger...