Latest Updates, News, or Releases

Ansar al-Mujahideen :-*-: An 'Eid-ul-Adha Release :-*-: “Last Will of Shaykh Ashraf ‘Abid Shaheed (may Allah have Mercy on him) :-: The martyrdom bomber of Khost”

http://ansarnet.info/showthread.php?t=16493

Al Malahim: Wrestler Traitors - Part I (1)

http://ansarnet.info/showthread.php?t=16461

As-Sahab: Raiding a military camp of the apostates in Zabul

http://www.ansarnet.info/showthread.php?p=51762





4000+ videos:
R------------Scholars and Leaders
R-----------R----------- Osama bin Laden
R-----------R-----------R-----------R----------- Audios
R-----------R-----------R-----------R----------- Visual Translations
R-----------R-----------R-----------R----------- Unofficial Clips
R-----------R----------- Ayman al-Zawahiri
R-----------R-----------R-----------R----------- Audios
R-----------R-----------R-----------R----------- Visual Translations
R-----------R----------- Abu Musab al-Zarqawi
R-----------R-----------R-----------R----------- Visual Translations
R-----------R-----------R-----------R----------- Unofficial Clips
R-----------R----------- Abu Omar al-Baghdadi
R-----------R-----------R-----------R----------- Visual Translations
R-----------R----------- Abdullah Azzam
R-----------R-----------R-----------R----------- Explaining Surah Al-Tawbah (The Repentance)
R-----------R-----------R-----------R----------- Audios
R-----------R----------- Abu Musab Abdul-Wadud
R-----------R----------- Abu Yahya al-Libi
R-----------R-----------R-----------R----------- Audios
R-----------R-----------R-----------R----------- Explaining some Quranic verses from Surah Al-Hujurat
R-----------R----------- Sulayman al-Alwan
R-----------R-----------R-----------R----------- Explaining the "Middle Faith"
R-----------R-----------R-----------R----------- Explaining "Saheeh al-Bokhari"
R-----------R----------- Abu Anas al-Shami
R-----------R----------- Commander Khattab
R-----------R----------- Abu Hamza al-Muhajir
R-----------R----------- Abu Musab al-Suri
R-----------R-----------R-----------R----------- A Visual Lecture by Abu Musab al-Suri
R-----------R-----------R-----------R----------- [Series Lectures] Jihad is the Solution (in 1999)
R-----------R-----------R-----------R----------- [Series Lectures] War of the Flea (Guerrilla Warfare)
R-----------R-----------R-----------R----------- A Meeting with Arabian Peninsula Mujahideen in Kabul (in 2000)
R-----------R-----------R-----------R----------- A Meeting with Yamani Mujahideen
R-----------R-----------R-----------R----------- The Reality of Muslims: the Crisis and the Solution
R-----------R-----------R-----------R----------- A Lecture on the New International Order
R-----------R-----------R-----------R----------- How to Manage and Organise Guerrilla Warfare
R-----------R-----------R-----------R----------- Lessons on Guerrilla Warfare Theory
R-----------R-----------R-----------R----------- A Look at the Book "The Syrian Experience"
R-----------R-----------R-----------R----------- Interview with "ar-Rai Newspaper" (a Kuwaiti Newspaper)
R-----------R----------- Abu Al-Laith Al-Libi
R-----------R----------- Omar Abdul Rahman
R-----------R-----------R-----------R----------- The Glorious Quran in Omar Abdul Rahman's Voice
R-----------R-----------R-----------R----------- Saheeh al-Bokhari in Omar Abdul Rahman's Voice
R-----------R----------- Abu Mohammed al-Maqdisi
R-----------R----------- Sulaiman Abu Ghaith
R-----------R----------- Khalid bin Abd al-Rahman al-Husainan
R-----------R----------- Mulla Dadullah
R-----------R----------- Baitullah Mehsud
R-----------R----------- Azzam the American
R-----------R----------- Mustafa Abu al-Yazid
R-----------R----------- Abu Qatada
R-----------R-----------R-----------R----------- A Course in Faith and Islamic Politcs
R-----------R-----------R-----------R----------- The lesser and greater Kufir (disbelieve)
R-----------R-----------R-----------R----------- The Fundamentals of Islamic Jurisprudence (Fiqh)
R-----------R-----------R-----------R----------- History of the Islamic Sects
R-----------R-----------R-----------R----------- Questions and Answers
R-----------R----------- Abu al-Nor al-Maqdisi
R-----------R-----------R-----------R----------- [Series Lectures] The Islamic Creed "Aqida"
R-----------R-----------R-----------R----------- The Battle of Tabuk
R-----------R----------- Abdullah al-Roshood
R-----------R----------- Mohammed al-Fizazi
R-----------R-----------R-----------R----------- Explainning the Tahawi Creed (Aqidah)
R-----------R-----------R-----------R----------- Lectures on the Murji'ah Spoiled beliefs
R-----------R-----------R-----------R----------- Explaining the Beginning verses of Surah Al-Baqara (The Cow)
R-----------R-----------R-----------R----------- Audios
R-----------R----------- Yusuf al-Ayiri
R-----------R----------- Abu Talha the German
R-----------R----------- Abu Abdullah al-Muhajir
R-----------R-----------R-----------R----------- Lectures on the Rule of Allah (Allah's Rights in legal Rulings)
R-----------R-----------R-----------R----------- The Extinction of the Western Civilisation
R-----------R-----------R-----------R----------- Introduction to Jihad Jurisprudence (Fiqh)
R-----------R-----------R-----------R----------- An Introduction to "al-Walaa wal-Baraa"
R-----------R-----------R-----------R----------- The Particularities of Ahel al-Sunnah wal-Jamaa
R-----------R-----------R-----------R----------- Issues on Jihad Jurisprudence (Fiqh)
R-----------R-----------R-----------R----------- The Concept of Faith (Iman) of Ahel al-Sunnah wal-Jamaa
R-----------R----------- Anwar al-Awlaki
R-----------R----------- Other Scholars and Leaders
R-----------Afghanistan
R-----------R----------- Main Releases
R-----------R-----------R-----------R----------- Winds of Paradise Series
R-----------R-----------R-----------R----------- Escape From Bagram [English, Arabic]
R-----------R-----------R-----------R----------- Protectors of Haram Series
R-----------R----------- Improvised Explosive Devices
R-----------R----------- Firefights, Ambushes and Raids
R-----------R----------- Martyrdom Operations
R-----------R----------- Rocket Attacks
R-----------R----------- Leaders Speeches and Statements
R-----------R----------- Short Clips
R-----------R----------- Other Operations
R-----------R----------- Jihad against the Soviets (1979-1989)
R-----------Somalia
R-----------R----------- Leaders Speeches and Statements
R-----------R----------- Martyrdom Operations
R-----------R----------- Short Clips
R-----------Caucasus
R-----------R----------- Russian Hell Series
R-----------R----------- Leaders Speeches and Statements

R----------- Short Clips
R-----------Arabian Peninsula
R-----------R----------- Audios
R-----------Levant
R-----------R----------- Palestin
R-----------Pakistan
R-----------R----------- Leaders Speeches and Statements
R-----------R----------- Short Clips
R-----------Bosnia
R-----------R----------- Martyrs of Bosnia
R-----------Iraq
R-----------R----------- Islamic State of Iraq
R-----------R-----------R-----------R----------- Main Releases
R----------- The Knights of Martyrdom Series
R-----------R-----------R-----------R----------- Martyrdom Operations
R-----------R-----------R-----------R----------- Improvised Explosive Devices
R-----------R-----------R-----------R----------- Kidnapping and Hostages
R-----------R-----------R-----------R----------- Firefights, Ambushes and Raids
R-----------R-----------R-----------R----------- Shooting Down Planes
R-----------R-----------R-----------R----------- Sniping Operations
R-----------R-----------R-----------R----------- Rocket Attacks
R-----------R-----------R-----------R----------- Leaders' Speeches
R-----------R-----------R-----------R----------- Other Operations


R-----------R-----------R-----------R----------- Other Groups formed the State
R-----------R----------R------------R----------- Mujahideen Shura Council in Iraq
R-----------R-----------R-----------R-----------R-----------R----------- Main Releases
R-----------R-----------R-----------R-----------R-----------R----------- Improvised Explosive Devices
R-----------R-----------R-----------R-----------R-----------R----------- Martyrdom Operations
R-----------R-----------R-----------R-----------R-----------R----------- Sniping Operations
R-----------R-----------R-----------R-----------R-----------R----------- Firefights, Ambushes and Raids
R-----------R-----------R-----------R-----------R-----------R----------- Kidnapping and Hostages
R-----------R-----------R-----------R-----------R-----------R----------- Shooting Down Planes
R-----------R-----------R-----------R-----------R-----------R----------- Other Operations
R-----------R-----------R-----------R----------- al-Qaeda in Iraq
R-----------R-----------R-----------R-----------R-----------R----------- Main Releases
R-----------R-----------R-----------R-----------R-----------R----------- Kidnapping and Hostages
R-----------R-----------R-----------R-----------R-----------R----------- Improvised Explosive Devices
R-----------R-----------R-----------R-----------R-----------R----------- Martyrdom Operations
R-----------R-----------R-----------R-----------R-----------R----------- Firefights, Ambushes and Raids
R-----------R-----------R-----------R-----------R-----------R----------- Car Bombs (VBIED)
R-----------R-----------R-----------R-----------R-----------R----------- Rocket Attacks
R-----------R-----------R-----------R-----------R-----------R----------- Other Operations
R-----------R-----------R-----------R----------- Jamaat al-Tawhid wal-Jihad
R-----------R-----------R-----------R----------- Army of the Victorious Sect
R-----------R-----------R-----------R----------- Jaish Ahl Sunna wal Jamaat
R-----------R-----------R-----------R----------- Unofficial Clips
R-----------R----------- Ansar al-Islam
R-----------R-----------R-----------R----------- Main Releases
R-----------R-----------R-----------R-----------R-----------R----------- Al-Ansar Investigation Series
R-----------R-----------R-----------R----------- Martyrdom Operations
R-----------R-----------R-----------R----------- Improvised Explosive Devices
R-----------R-----------R-----------R----------- Firefights, Ambushes and Raids
R-----------R-----------R-----------R----------- Kidnapping and Hostages
R-----------R-----------R-----------R----------- Car Bombs (VBIED)
R-----------R-----------R-----------R----------- Shooting Down Planes
R-----------R-----------R-----------R----------- Sniping Operations
R-----------R-----------R-----------R----------- Demolitions
R-----------R-----------R-----------R----------- Rocket Attacks
R-----------R-----------R-----------R----------- Other Operations
R-----------R-----------R-----------R----------- Ansar al-Islam before the American Ocupation
R-----------R----------- Jaish Abi Baker al-Salafi
R-----------R-----------R-----------R----------- Main Releases
R-----------R-----------R-----------R----------- Rocket Attacks

R-----------R-----------R----------- Improvised Explosive Devices
R-----------R-----------R-----------R----------- Firefights, Ambushes and Raids
R-----------R-----------R-----------R----------- Kidnapping and Hostages
R-----------R-----------R-----------R----------- Sniping Operations
R-----------R-----------R-----------R----------- Other Operations
R-----------R----------- Shield of Islam Brigades
R-----------R----------- Others
R-----------Islamic Maghreb
R-----------R----------- Leaders Speeches and Statements
R-----------Turkestan
R-----------Other Areas
R-----------R----------- Eritrea
R-----------R----------- Bangladesh
R-----------R----------- Uzbekistan
R-----------R----------- Egypt
R-----------R----------- Indonesia
R-----------9/11 Attacks
R-----------International
R-----------R----------- The West and the Dark Tunnel [English, Urdu, Arabic]
R-----------R----------- The Defeat of the Crusaders Series
R-----------R----------- [Old] The Lovers of Martyrdom
R-----------Ansar
R-----------R----------- Videos
R-----------R-----------R-----------R----------- Almoraqib Videos
R-----------R-----------R-----------R----------- Iraq
R-----------R-----------R-----------R----------- Afghanistan
R-----------R-----------R-----------R----------- Islamic Maghreb
R-----------R-----------R-----------R----------- Visual Nasheeds
R-----------R-----------R-----------R----------- Others
R-----------R----------- Nasheeds and Audios
R-----------R-----------R-----------R----------- Reziz Kandhar Center's Editions
R-----------R-----------R-----------R----------- Monshed al-Jihad al-Ansari Albums
R-----------R-----------R-----------R----------- Come to Jihad Albums
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 1]
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 2]
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 3]
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 4]
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 5]
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 6]
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 7]
R-----------R-----------R-----------R-----------R-----------R----------- Come to Jihad [Album 8]
R-----------R-----------R-----------R----------- Other Nasheeds
R-----------Media & Press
R-----------R----------- Dr. Abdullah Al-Nefisi
R-----------R----------- Mullah Krekar
R-----------R----------- Sami Al Hajj ● Prisoner 345
R-----------R----------- d o c u m e n t a r i e s
R-----------R-----------R-----------R----------- Osama bin Laden
R-----------R-----------R-----------R----------- Abu Musab al-Zarqawi
R-----------R-----------R-----------R----------- Afghanistan and Pakistan
R-----------R-----------R-----------R----------- Iraq
R-----------R-----------R-----------R----------- 9/11 Attacks
R-----------R-----------R-----------R----------- Intelligence & Information War
R-----------R-----------R-----------R----------- Others
R-----------R----------- News Reports
R-----------R-----------R-----------R----------- Afghanistan
R-----------R-----------R-----------R----------- Iraq
R-----------R-----------R-----------R----------- Somalia
R-----------R-----------R-----------R----------- Pakistan
R-----------R-----------R-----------R----------- Others


To the Muslims who have read thus far, may Allah subhanhu wa ta'alaa bless your sincerity with strength, and your knowledge with the ability to apply that knowledge wisely. Aameen.

Choosing a smart password  

Wednesday, October 7, 2009

Choosing a smart password
Choosing a smart password

Tuesday, October 06, 2009 6:58 PM
Posted by Michael Santerre, Consumer Operations Associate

As part of National Cyber Security Awareness Month, we'd like to take this opportunity to remind you about smart password practices. Help ensure you're protecting your computer, website, and personal information by checking out our security series on the Google blog or visiting http://www.staysafeonline.org.

Phishing, a topic that's been in the news, is unfortunately a common way for hackers to trick you into sharing personal information like your account password. If you suspect you've been a victim of a phishing attack, we recommend you immediately change your password, update the security question and secondary address on your account, and make sure you're using a modern browser with anti-phishing protection turned on. Keep an eye out for the phishing warning Gmail adds to suspicious messages, and be sure to review these tips on how to avoid getting hooked.

Creating a new password is often one of the first recommendations you hear when trouble occurs. Even a great password can't keep you from being scammed, but setting one that's memorable for you and that's hard for others to guess is a smart security practice since weak passwords can be easily guessed. Below are a few common problems we've seen in the past and suggestions for making your passwords stronger.

Problem 1: Re-using passwords across websites
With a constantly growing list of services that require a password (email, online banking, social networking, and shopping websites — just to name a few), it's no wonder that many people simply use the same password across a variety of accounts. This is risky: if someone figures out your password for one service, that person could potentially gain access to your private email, address information, and even your money.

Solution 1: Use unique passwords
It's a good idea to use unique passwords for your accounts, expecially important accounts like email and online banking. When you create a password for a site, you might think of a phrase you associate with the site and use an abbreviation or variation of that phrase as your password — just don't use the actual words of the site. If it's a long phrase, you can take the first letter of each word. To make this word or phrase more secure, try making some letters uppercase, and swap out some letters with numbers or symbols. As an example, the phrase for your banking website could be "How much money do I have?" and the password could be "#m$d1H4ve?" (Note: since we're using them here, please don't adopt any of the example passwords in this post for yourself.)

Problem 2: Using common passwords or words found in the dictionary
Common passwords include simple words or phrases like "password" or "letmein," keyboard patterns such as "qwerty" or "qazwsx," or sequential patterns such as "abcd1234." Using a simple password or any word you can find in the dictionary makes it easier for a would-be hijacker to gain access to your personal information.

Solution 2: Use a password with a mix of letters, numbers, and symbols
There are only 26^8 possible permutations for an 8-character password that uses just lowercase letters, while there are 94^8 possible permutations for an 8-character password that uses a combination of mixed-case letters, numbers, and symbols. That's over 6 quadrillion more possible variations for a mixed password, which makes it that much harder for anyone to guess or crack.

Problem 3: Using passwords based on personal data
We all share information about ourselves with our friends and coworkers. The names of your spouse, children, or pets aren't usually all that secret, so it doesn't make sense to use them as your passwords. You should also stay away from birth dates, phone numbers, or addresses.

Solution 3: Create a password that's hard for others to guess
Choose a combination of letters, numbers, or symbols to create a unique password that's unrelated to your personal information. Or, select a random word or phrase, and insert letters and numbers into the beginning, middle, and end to make it extra difficult to guess (such as "sPo0kyh@ll0w3En").

Problem 4: Writing down your password and storing it in an unsecured place
Some of us have enough online accounts that we may need to write our passwords down somewhere, at least until we've learned them well.

Solution 4: Keep your password reminders in a secret place that isn't easily visible
Don't leave notes with your passwords to various sites on your computer or desk. People who walk by can easily steal this information and use it to compromise your account. Also, if you decide to save your passwords in a file on your computer, create a unique name for the file so people don't know what's inside. Avoid naming the file "my passwords" or something else obvious.

Problem 5: Recalling your password
When choosing smart passwords like these, it can often be more difficult to remember your password when you try to sign in to a site you haven't visited in a while. To get around this problem, many websites will offer you the option to either send a password-reset link to your email address or answer a security question.

Solution 5: Make sure your password recovery options are up-to-date and secure
You should always make sure you have an up-to-date email address on file for each account you have, so that if you need to send a password reset email it goes to the right place.

Many websites will ask you to choose a question to verify your identity if you ever forget your password. If you're able to create your own question, try to come up with a question that has an answer only you would know. The answer shouldn't be something that someone can guess by scanning information you've posted online in social networking profiles, blogs, and other places.

If you're asked to choose a question from a list of options, such as the city where you were born, you should be aware that these questions are likely to be less secure. Try to find a way to make your answer unique — you can do this by using some of the tips above, or by creating a convention where you always add a symbol after the 2nd character in the answer (e.g. in@dianapolis) — so that even if someone guesses the answer, they won't know how to enter it properly.

http://pathtomartyrdom.blogspot.com/

Email this post