Click to zoom in on my visitor map!
Create your free world visitor maps

Friday, December 29, 2006

Tips for Laptop on Cold Weather

Protecting your laptop from cold weather is important. Regular laptops have been designed to work within a safe temperature range, normally 50 to 95 degrees F (10 - 35 degrees C). There are some steps about how to protect your laptop during cold weather :
  1. Heavy duty laptops have been designed to work under extreme weather condition. If you work outside, this laptop is strong to face bad weather.

  2. Never leave a laptop, even in a well-padded and insulated laptop case in the trunk of vehicle in cold weather. The laptop could freeze and you lose all data contained in it.

  3. If you bring your laptop in from cold weather, allow it to warm up to room temperature before booting. The same is true when you go outdoors, allow the laptop to adapt to the outside temperature before booting up.

  4. It's better not to use devices such as mug warmers or pocket warmers to heat or keep a laptop warm. They could heat the wrong parts of a laptop or cause it to generate too much heat and melt internal components. There are laptop warmers designed specifically for the purpose of keeping a laptop warm. Laptop warmers have been tested to ensure they will safely protect your laptop and are a wise investment.

  5. Do not use your laptop while it is still inside a laptop bag because there is no room for air circulation, otherwise your laptop will be damaged from heat. You can create your own box for your laptop which will allow air to circulate and provide an enclosed area for you to use your laptop. This laptop box will help to keep the laptop warmer.

  6. Allow the display to warm on its own and do not boot up a laptop if you suspect the display is frozen.

  7. Instead of having the hard drive shut down, keep it spinning. The longer the laptop can be kept left running, the warmer it will stay as it generates its own heat.

  8. If your laptop has frozen, don't take it directly into warm place because the screens could shatter from thermal shock.



Next...

Wednesday, December 20, 2006

Firefox Releases New Patches

Firefox fixes, which affect areas as varied as the RSS reader and JavaScript handler, are for both version 1.5.x and 2.0.x of the popular browser. Mozilla is also patching its Thunderbird e-mail client.

The vulnerabilities could potentially be exploited to conduct cross-site scripting attacks, to let malicious attackers launch a remote execution of code on users computers, and to expose sensitive information according to an advisory from Secunia security company
. While Mozilla labeled the updates "critical," Secunia rated them "highly critical."
Mozilla advised people to forgo enabling JavaScript in Thunderbird and the mail portions of its Internet application suite SeaMonkey.
Users can manually force an update via the browser, if they wish.

Security has always been a cause celebre for Firefox advocates. However, other observers have often warned that as Firefox takes market share from Internet Explorer. IE vs. Firefox, Which Is More Secure?



Next...

Saturday, December 16, 2006

Latest Viruses

W32.Memesa (found by Symantec)

This virus was found on December 15, 2006, its risk level is very low. The systems that could be affected by this virus are Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP. Memesa is a worm that attempt to email itself out as an attachment, change the desktop background, and open local pages in Internet Explorer. Attempts to email itself as an attachment to an email with the following characteristics:

On email subject will be found one of the following :
  • "Sstt..! foto2 panas agnes dengan f4!"
  • "FWD: foto mesra agnes vs f4!"
On email body will be found one of the following :
  • "Apakah Anda sedang jatuh cinta? Apakah cinta Anda cinta sejati? Check this out!"
  • "Ssstt, kumpulan foto mesra f4 dengan agnes monica!"
On attachment will be found :
  • "foto mesra f4 vs agnes monica.zip"
  • "agnes vs f4.zip"
  • "foto panas agnes.zip
Sets desktop background to the following picture:



May display a locally generated Web page in Internet Explorer. The page contains the following text :

KU TAK TAHU APA SALAHKU YANG SEBENARNYA. KU TELAH MELAKUKAN MEMPERSIAPKAN SEMUANYA. TETAPI APA YAN [REMOVED] RENA TIDAK ADA GUNANYA BERGAUL DENGAN ORANG YANG HANYA BISA MENYEDOT ENERGI POSITIFMU KELUAR.

If your computer is affected from W32.Memesa just do these steps :
  1. Disable System Restore (Windows Me/XP).
  2. Update the virus definitions.
  3. Run a full system scan.
  4. Delete any values added to the registry.
It's strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified subkeys only. For instructions refer to the document:

How to make a backup of the Windows registry :

  1. Click Start > Run.
  2. Type regedit
  3. Click OK.
  4. Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor. Security Response has developed a tool to resolve this problem. Download and run this tool, and then continue with the removal.
  5. Navigate to the subkey:
  6. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
    CurrentVersion\Run.

  7. On the right pane, delete the value : "sysshell" = "%Windir%\svchost.exe",
  8. "dllhost" = "%Windir%\dllhost.exe"
  9. Restore the values for the following registry entries to their previous settings:
  10. HKEY_CURRENT_USER\Software\Microsoft\Windows\
    CurrentVersion\Policies\System\"DisableRegistryTools" = "1"


    HKEY_CURRENT_USER\Software\Microsoft\Windows\
    CurrentVersion\Policies\System\"DisableTaskMgr" = "1"

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\Explorer\Advanced\Folder\Hidden\
    SHOWALL\"CheckedValue" = "1"

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\Explorer\Advanced\Folder\Hidden\
    SHOWALL\"DefaultValue" = "1"

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\Explorer\Advanced\Folder\Hidden\
    NOHIDDEN\"CheckedValue" = "2"

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
    CurrentVersion\Explorer\Advanced\Folder\Hidden\
    NOHIDDEN\"DefaultValueSUCCESS" = "2"

    HKEY_CURRENT_USER\Software\Microsoft\Windows\
    CurrentVersion\Explorer\Advanced\"Hidden" = "1"

    HKEY_CURRENT_USER\Software\Microsoft\Windows\
    CurrentVersion\Explorer\Advanced\"HideFileExt" = "1"

    HKEY_CURRENT_USER\Software\Microsoft\Windows\
    CurrentVersion\Policies\Explorer\"NoFolderOptions" = "1"


  11. Exit the Registry Editor.

TROJ_CLAGGE.AI (found by Trend Micro)

This kind of trojan was found on December 15, 2006. The damage potential is high, the risk is low, distribution potential is low, and it could attack computer with Windows 98, ME, NT, 2000, XP, Server 2003 system. This Trojan arrives on a system as an attachment to a spammed email message. It downloads a file, which is detected as TSPY_BZUB.DI, from a specific URL. As a result, the routines of the downloaded spyware may be exhibited on the affected machine.

Solution :

Users running Windows ME and XP must disable system restore to allow full scanning of infected computers. Users running other Windows versions can proceed with the succeeding solution set(s).If you are currently running in safe mode, please restart your computer normally before performing the following solution. Scan your computer with antivirus and delete files detected as TROJ_CLAGGE.AI and TSPY_BZUB.DI. To do this, download the latest virus pattern file and scan computer.


Win32.Viking.DE (found by F-Secure)

This virus was found on December 13, 2006, it has some aliases : Win32/Viking.CH, Worm.Win32.Viking.de. Viking.DE, a variant of Viking, the virus that it infects executable files on all available drives and has network spreading capabilities. The virus copies itself into the Windows directory and drops a DLL that downloads and runs files from a website. Viking.DE has a payload - it kills processes belonging to anti-virus and security software.

Disinfection of the Viking virus-worm should be performed as follows :
  1. Disconnect a computer or local network from the Internet.
  2. Disable network sharing or set strong passwords for all shares.
  3. Select the "Disinfect Automatically" on all computers. With "Disinfect Automatically" selected, anti-virus will disinfect files that a virus tries to infect over a network (if sharing was not disabled).
  4. Scan all files on all drives on all computers and MANUALLY select the "Disinfect" action to disinfect all infected files and to rename the virus droppers. DO NOT select automatic disinfection option after the scan!
  5. Restart all disinfected computers.
  6. Scan all hard drives on disinfected computers again to make sure that no more infected files are left.
  7. If needed, repeat disinfection procedure.
  8. Disinfect all infected computers connected on the network. Enable network sharing, keep strong share passwords.
  9. Reconnect the disinfected computer or local network to the Internet.
Please note that because of the "Worm." detection will suggest to delete infected files, but DO NOT select the "Delete" option because this worm also has a viral component and you don't want to delete all infected files instead of disinfecting them. At the same time, the worm's dropper and downloader files should be deleted from a computer to prevent re-infection.


I-Worm/Stration (found by Grisoft)

This worm spreads by e-mail as an attachment or as a hyperlink in ICQ message.
Virus sends messages with hyperlink to the infected file over ICQ. These messages are sent without user knowledge. Some versions of this worm might cause Explorer errors, worm can block saving from Notepad, block using of Registry editor and most variants downloads other malicious files from the Internet. Virus blocks some security software such as various firewalls, anti-virus systems etc. Computer is infected when recipient downloads and executes infected file. When the worm is launched it copies itself to the Windows System folder and creates some files like DLL libraries. Virus adds link to main executable file to the HKLM\SOFTWARE\Microsoft\Windows\ CurrentVersion\Run registry key so virus is launched on computer startup. Libraries are registered in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows key in "AppInit_DLLs" item and some variants registers libraries also to the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify key.

Virus sends messages with forged sender address, subject of these messages is usually as follows (depends on virus variant) :

Error
Good Day
hello
Mail Delivery System
Mail server report
Mail Transaction Failed
picture
Server Report
Status
test

Message contains executable attachment named for example as follows :

body.*
test.*
text.*
Update-KB*-x86.*

Erasing all files detected as I-Worm/Stration will remove the virus.

Next...

Thursday, December 14, 2006

How To Treat Headache

Sometimes in the middle of our activity, suddenly we feel our head becomes heavy and we feel like there is rubbish inside and we want to remove it then clean it and put again in its place, and suddenly we feel pounding pain on it. It's called headache. Headache (medically known as cephalalgia, sometimes spelled as cephalgia) is a condition of pain in the head; sometimes neck or upper back pain may also be interpreted as a headache caused by lack of oxygen and glucose in brain. It ranks amongst the most common local pain complaints. Treatment of uncomplicated headache is usually symptomatic with over-the-counter painkillers such as aspirin, paracetamol (acetaminophen) or ibuprofen, although some specific forms of headaches (e.g. migraine) may demand other, more suitable treatment.

But, sometimes we don't like to take medicine because we think medicines contain of chemical structures that we don't like. No problem without medicine we still can treat our headache, just do some treatments as follow :
  1. Lay down if possible with head position lower than leg, to increase blood flow to brain.

  2. If you are very busy and you have no time to lay down, just lower your head until same level as or lower than knee to increase blood flow to brain too.

  3. Make hot tea with more sugar (2-3 tablespoons) or drink another sweet drinks

  4. Take deep breath and hold it for a while, then release it, do it many times until you feel better

  5. Massage your head with circular motion, to free reverse blood flow.




Next...

Tuesday, December 12, 2006

Computer Virus

A computer virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a range of malware, a true virus must replicate itself, and must execute itself. The latter criteria are often met by a virus which replaces existing executable files with a virus-infected copy. While viruses can be intentionally destructive—destroying data, for example—some viruses are benign or merely annoying.

A computer virus will pass from one computer to another like a real life biological virus passes from person to person. For example, it is estimated by experts that the [Mydoom] worm infected a quarter-million computers in a single day in January 2004. Another example is the ILOVEYOU virus, which occurred in 2000 and had a similar effect. It stole most of its operating style from Melissa. There are tens of thousands of viruses out there, and new ones are discovered every day. It is difficult to come up with a generic explanation of how viruses work, since they all have variations in the way they infect or the way they spread. So instead, we’ve taken some broad categories that are commonly used to describe various types of virus.

File viruses are pieces of code that attach themselves to executable files, driver files or compressed files, and are activated when the host program is run. After activation, the virus may spread itself by attaching itself to other programs in the system, and also carry out the malevolent activity it was programmed for.
File viruses spread by loading themselves in system memory and looking for any other programs located on the drive. If it finds one, it modifies the program’s code so that it contains and activates the virus the next time it’s run. It keeps doing this over and over until it spreads across the system, and possibly to other systems that the infected program may be shared with. Besides spreading themselves, these viruses also carry some type of destructive constituent that can be activated immediately or by a particular ‘trigger’. The trigger could be a specific date, or the number of times the virus has been replicated, or anything equally trivial. Some examples of file viruses are Randex, Meve and MrKlunky.

A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating system to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. Perhaps this is the reason for their downfall. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect pre-written data on a CD, which eventually stopped such viruses from spreading. Though boot viruses still exist, they are rare compared to new-age malicious software. Another reason why they’re not so prevalent is that operating systems today protect the boot sector, which makes it difficult for them to thrive. Examples of boot viruses are Polyboot.B and AntiEXE.

Multipartite viruses are a combination of boot sector viruses and file viruses. These viruses come in through infected media and reside in memory. They then move on to the boot sector of the hard drive. From there, the virus infects executable files on the hard drive and spreads across the system. There aren’t too many multipartite viruses in existence today, but in their heyday, they accounted for some major problems due to their capacity to combine different infection techniques. A significantly famous multipartite virus is Ywinz. Macro Viruses infect files that are created using certain applications or programs that contain macros. These include Microsoft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, and other similar application files such as Corel Draw, AmiPro, etc. Since macro viruses are written in the language of the application, and not in that of the operating system, they are known to be platform-independent—they can spread between Windows, Mac, and any other system, so long as they’re running the required application.With the ever-increasing capabilities of macro languages in applications, and the possibility of infections spreading over net-works, these viruses are major threats. The first macro virus was written for Microsoft Word and was discovered back in August 1995. Today, there are thousands of macro viruses in existence—some examples are Relax, Melissa.A and Bablas.

Network viruses is proficient in quickly spreading across a Local Area Network (LAN) or even over the Internet. Usually, it propagates through shared resources, such as shared drives and folders. Once it infects a new system, it searches for potential targets by searching the network for other vulnerable systems. Once a new vulnerable system is found, the network virus infects the other system, and thus spreads over the network. Some of the most notorious network viruses are Nimda and SQLSlammer. E-mail Viruses An e-mail virus could be a form of a macro virus that spreads itself to all the contacts located in the host’s email address book. If any of the e-mail recipients open the attachment of the infected mail, It spreads to the new host’s address book contacts, and then proceeds to send itself to all those contacts as well. These days, e-mail viruses can infect hosts even if the infected e-mail is previewed in a mail client. There are many ways in which a virus can infect or stay dormant on your PC. However, whether active or dormant, it’s dangerous to let one loose on your system, and should be dealt with immediately.

Earlier, the only way a computer was at risk was when you inserted an infected floppy. With the new age of technology, every computer is interconnected to the rest of the world at some point or the other, so it’s difficult to pinpoint the source and/or time of the infection. As if that weren’t bad enough, new-age computing has also brought about a new breed of malicious software. Today, the term ‘virus’ has become a generic term used for all the different ways that your computer can be attacked by malicious software. Besides the type of viruses we mentioned here’s a look at some of the newer problems we face today.

From : Wikipedia

Next...

Saturday, December 9, 2006

Beware of Spam

Spam is posting of advertisements, abusive, or unneeded messages . It is generally posted by automated spambots. Spams maybe come to your email in the forms of instant messaging spam, usenet newsgroup spam,web search engine spam, blog spam and mobile phone messaging spam. Spamming is economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by internet service providers, which add extra capacity to cope with the deluge.

E-mail Spam

E-mail spam is the most common form of internet spamming. It involves sending unsolicited commercial messages to many recipients. Unlike legitimate commercial e-mail, spam is generally sent without the explicit permission of the recipients, and frequently contains various tricks to bypass e-mail filtering. Spammers obtain e-mail addresses by a number of means: addresses from Usenet,postings,listings, or Web pages; guessing common names at known domains (known as a dictionary attack) and "e-pending" or searching for e-mail addresses corresponding to specific persons, such as residents in an area. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions. Many e-mail spammers go to great lengths to conceal the origin of their messages. They might do this by spoofing e-mail addresses (similar to internet protocol spoofing). The spammer will modify the e-mail message so it looks like it is coming from another e-mail address. However, many spammers make it easy for recipients to identify their messages as spam by placing an ad phrase in the field. Spammers try to circumvent the email filters by intentionally misspelling common spam filter trigger words. For example, "viagra" might become "vaigra", or other symbols may be inserted into the word as in "v/i/a/g./r/a". E-mail service providers have begun to use the misspellings themselves as a filtering test.

Spambots are a major producer of e-mail spam. The worst spammers create e-mail viruses that render an unprotected PC a "zombie computer" the zombie will inform a central unit of its existence, and the central unit will command the "zombie" to send a low volume of spam. This allows spammers to send high volumes of e-mail without being caught by their ISPs or being tracked down by antispammers; a low volume of spam is instead sent from many locations simultaneously.

Messaging Spam

Messaging spam, sometimes termed spim (a portmanteau of spam and IM, short for instant messenger), makes use of instant messaging systems, such as AOL instant messenger or ICQ. Many IM systems offer a user directory, including demographic information that allows an advertiser to gather the information, sign on to the system, and send unsolicited messages. To send instant messages to millions of users requires scriptable software and the recipients' IM usernames. Spammers have similarly targeted Internet Relay Chat channels, using IRC bots that join channels and bombard them with advertising. Messenger service spam has lent itself to spammer use in a particularly circular scheme. In many cases, messenger spammers send messages to vulnerable Windows machines consisting of text like "Annoyed by these messages? Visit this site." The link leads to a Web site where, for a fee, users are told how to disable the Windows messenger service. Though the messenger service is easily disabled for free, the scam works because it creates a perceived need and offers a solution. Often the only "annoying messages" the user receives through Messenger are ads to disable Messenger itself.

Chat Spam

Chat spam can occur in any live chat environment like IRC and in-game multiplayer chat of online games. It consists of repeating the same word or sentence many times to get attention or to interfere with normal operations. It is generally considered very rude and may lead to swift exclusion of the user from the used chat service by the owners or moderators. The application of the name "Spam" to unwanted communication originates in Chat-room spam. Specifically, it was developed in the chat-rooms of People-Link in the early 1980’s as a technique for getting rid of unwelcome newcomers. When someone would enter a chat-room full of friends who were in mid-conversation, and the newcomer tried to turn the conversation in an unwelcome direction (usually trolling for cybersex), two veteran members of the room would begin typing in the Monty Python “Spam” routine at high speed. They would fill the screen with “Spam Spam Spam eggs Spam Spam and Spam” etc, and make all other communication impossible. The other members of the room would just wait quietly until the newcomer got disgusted and moved on to a different room.

Spam Targeting Search Engines


Spamdexing
(a portmanteauof spamming and indexing) refers to the practice on the World Wide Web of modifying HTML pages to increase the chances of them being placed high on search engine relevancy lists. It uses unethical means, "black hat SEO techniques." to unfairly increase the rank of sites in search engines. Many modern search engines modified their search algorithms to try to exclude web pages utilizing spamdexing tactics.

Blog, Wiki and Guestbook Spam


Blog spam, or "blam" for short is spamming on weblogs. In 2003, this type of spam took advantage of the open nature of comments in the blogging software movable type by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer's commercial web site. Similar attacks are often performed against Wikis and guestbooks, both of which accept user contributions.

from: Wikipedia




Next...

Thursday, December 7, 2006

The Secret of Black Cumin (Habbat-us-sawda or habbah al barakat)



Prophet Muhammad said : "There is healing in black cumin for all diseases except death." . What is black cumin? What are the important things contain in it, so Rasulullah said that black cumin is healing for all disease except death.

Nigella sativa is an annual flowering plant, native to southwest Asia. It grows to 20-30 cm tall, with finely divided, linear (but not thread-like) leaves. The flowers are delicate, and usually coloured pale blue and white, with 5-10 petals. The fruit is a large and inflated capsule composed of 3-7 united follicles, each containing numerous seeds. It is one the most revered medicinal seeds in history. This small but incredibly healing herb is known throughout the world by many names such as black cumin, kalonji, blackseed, swartzcummel, Nigella sativa, fennel flower, habbat al barakah, sinouj, black caraway and habba sawdah. The best seeds come from Egypt where they grow under almost perfect conditions in oases where they are watered until the seed pods form. Black cumin seeds were found in the tomb of Tutankhamun. Though black cumin seeds are mentioned in the Bible as well as in the words of the Prophet Muhammad, they were not carefully researched until about forty years ago. Since this time, more than 200 studies have been conducted in universities.



Black Seed has been traditionally used in the Middle and Far East countries for centuries to treat ailments including bronchial asthma and bronchitis, rheumatism and related inflammatory diseases, to increase milk production in nursing mothers, to treat digestive disturbances, to support the body's immune system, to promote digestion and elimination, and to fight parasitic infestation. Its oil has been used to treat skin conditions such as eczema and boils and is used topically to treat cold symptoms.

The famous Greek physician Dioscorides used black cumin seeds to treat headaches and toothaches. The reason might be found in the complex chemical structure of the seeds. These little seeds have over one hundred different chemical constituents, including abundant sources of all the essential fatty acids. It is an excellent natural medicine used for millenniums to treat a variety of conditions related to respiratory health, skin, stomach and intestinal disorders, kidney & liver function, circulatory and immune system support, and to maintain and improve overall health. It acts as a stimulant, aromatic, carminative, digestive, diuretic, emmenagogue, excitant, galactatagogue, purgative, resolvent, stomachic, sudorific, tonic, and vermifuge.

Black cumin, especially when combined with garlic, is regarded as a harmonizer of the imbalance which allows immune cells to destroy healthy cells. The technical language to describe this property is "immunomodulatory action." The difference between black cumin and interferon is that there are no known side effects with black cumin when administered in normal dosages. The saying goes that the beauty of black cumin is their capacity to restore harmony. The most dramatic results are achieved with asthma and allergies. These respond relatively quickly unless there is infection, in which case, the infection needs to be eliminated before the symptoms of immune weakness subside. Continued use for six months or longer tends to give outstanding results. For extreme fatigue, consider mixing some crushed seeds with some royal jelly.

The first major study of Nigella sativa in cancer prevention and treatment was performed by scientists at Cancer Immuno-Biology Laboratory of Hilton Head Island, South Carolina. They concluded that a healthy immune system will detect and destroy cancer cells before the cancer endangers the patient. The immune system does this by supporting increased production of immune cells, bone marrow cells, and B-cells that produce antibodies. Black cumin stimulates neutrophil activity. For cancer prevention, black cumin seeds may also have anti-carcinogenic properties. In one study, cumin was shown to protect laboratory animals from developing stomach or liver tumors. This cancer-protective effect may be due to cumin’s potent free radical scavenging abilities as well as the ability it has shown to enhance the liver’s detoxification enzymes. Yet, since free radical scavenging and detoxification are important considerations for the general maintenance of wellness, cumin’s contribution to wellness may be even more farther reaching.

In vitro studies performed in Jordan and the United States have determined that the volatile oil is anti-leukemic. Studies performed in Spain as well as England found that the fixed oil is useful in the treatment of rheumatism and other inflammatory diseases. This property is attributed to thymoquinone which is as high as 25% in the Egyptian seed and missing entirely is some seeds.

Some people use the oil externally, for beauty as well as for treating skin conditions such as psoriasis and eczema. One can buy a ready-made cream, add some oil to a favorite cream, or make one's own cream from scratch by warming equal parts (by volume) of black cumin seeds.

Next...

Saturday, December 2, 2006

Yamani Doctor Cured AIDS Succesfully

Sanaa - A Yamani doctor said on Tuesday 11/28/2006 that his university has cured a Libyan child form HIV/AIDS by traditional herbs and offered the medicine to public.

"We (university) have cured a Libyan child from HIV/AIDS," said Sheikh Abdul Majid Al Zindani, director of Islamic University Al Iman Yaman to the pers in Sanaa on Monday, after having short meeting with Saif-al-Islam Qaddafi, son of Moammar Qaddafi Libyan President.

When pers asked him about the medicine that he used to cure the child, Al Zindani just said "Natural Herbs"

After finishing some curing procedures, the child was sent to Jordan and Germany for HIV/AIDS blood test and the result was negative.

Al Zindani said that the child was one among 426 Libyan kids who suffered from HIV/AIDS eight years ago.

Narrated Abu Huraira: I heard Allah's Apostle saying "There is healing in Black Cumin for all diseases except death ."

So Maybe Dr. Al Zindani used black cumin to cure his patients?

Next...