Thursday, January 22, 2009

Mumbai Dance of the Devil



Mumbai: Dance Of The Devil

 

A Comprehensive Refutation of Indian Dossier Against Pakistan

Ahmed Quraishi


This is our counter attack against Indian psychological war against Pakistan. India's entire propaganda and lies have been exposed in this attached PDF document. Read and know for yourself things you never knew before. The entire Mumbai drama, its background, its motives and the players involved, with proof from their own sources, media and speeches. Circulate this far and wide and get it published wherever you can. This must be flooded on the web and passed to all contacts. Let the world see how big liars they are.

 

Full Report - Mumbai: Dance of the Devil


Read More >>

Government of Pakistan gives amnesty to corrupt politicians

Government of Pakistan gives amnesty to corrupt politicians

Karachi Pakistan, 07 October 2007 The National Reconciliation Ordinance 2007 is a negation of the UNCAC to which Pakistan is a Signatory

Karachi 6 October 2007: The National Reconciliation Ordinance (NRO) 2007 is a negation of the United Nations Convention Against Corruption (UNCAC) as well as the sprit of "Political Parties Pledge" to serve the people with the highest level of personal integrity, says Transparency International Pakistan.

Just 56 days after ratification of UNCAC by the President of Pakistan General Pervez Musharaf, the Federal Government on October 5th, 2007 promulgated NRO 2007. "This indeed is a setback and a reversal of anti-corruption initiatives adopted since 2002 under the National Anti Corruption strategy", said Chairman TI Pakistan, Syed Adil Gilani.

The amendment in NAB Ordinance for the procedure of arrest of sitting parliamentarian (quoted below), are great setbacks to the anticorruption efforts in Pakistan.

"Notwithstanding anything to the contrary in sub-section (1), the Federal Government or a Provincial Government may, before the judgment is pronounced by a trial court, withdraw from the prosecution of any person including an absconding accused who is found to be falsely involved for political reasons or through political victimization in any case initiated between 1st of January, 1986 to 12th of October, 1999 and upon such withdrawal clause (a) and clause (b) of sub-section (1) shall apply, and "Provided that no sitting Member of Parliament or a Provincial Assembly shall be arrested without taking into consideration the recommendations of the Special Parliamentary Committee on Ethics referred to in clause (aa) or Special Committee of the Provincial Assembly on Ethics referred to in clause (aaa) of section 24, respectively."


Syed Adil Gilani said that Pakistan has ratified the United Nations Convention against Corruption UNCAC on 9th August 2007, which states that:


"Parties to this Convention, concerned about the seriousness of problems and threats posed by corruption to the stability and security of societies, undermining the institutions and values of democracy, ethical values and justice and jeopardizing sustainable development and the rule of law. Concerned also about the links between corruption and other forms of crime, in particular organized crime and economic crime, including money-laundering, and concerned further about cases of corruption that involve vast quantities of assets, which may constitute a substantial proportion of the resources of states, and that threaten the political stability and sustainable development of those states."


Under the UNCAC Article 5, Preventive anti-corruption policies and practices Pakistan has committed that:


"Each State Party shall, in accordance with the fundamental principles of its legal system, develop and implement or maintain effective, coordinated anticorruption policies that promote the participation of society and reflect the principles of the rule of law, proper management of public affairs and public property, integrity, transparency and accountability, each State Party shall endeavour to establish and promote effective practices aimed at the prevention of corruption and each State Party shall endeavour to periodically evaluate relevant legal instruments and administrative measures with a view to determining their adequacy to prevent and fight corruption."


The Government of Pakistan in its National Anticorruption Strategy prepared in 2002 had blamed past governments of abuse of power in the following words:

"Sadly, the flagrant abuses of power by so many past public office holders, even when these office holders espoused anti-corruption and accountability, now undermines future attempts at tackling corruption. For example, as mentioned at section 3.2, the anti-corruption agencies were used as tools for political victimisation and many thus expect the NAB to engage in selective accountability. There is a fear of the accountability processes crashing unless buffered from political influences in the future setup. As outlined at section 3.2, previous attempts at tackling corruption have lacked political backing and have originated only from government source without the involvement of other parts of the national integrity system. The risk of unreconstructed political will is now the greatest threat to the successful achievement of the NACS goals." The lack of political will of the present government has undermined the goals of NACS, he added.


The chairman of TI Pakistan said that the NRO 2007 is against the sprit of the "Political Parties Pledge to the People of Pakistan" which was signed by the Leaders of all Political Parties, PML(Q), PML (N), PPP(S), PTI, MQM, PNA(P), SDA, Millat Party and JI, including the President of Pakistan, the Ministers of Government and all participants on 19th September 2002 at the National Convention organized by Transparency International at Convention Centre Islamabad. It states: "All the parties solemnly pledge to the people of Pakistan that after the elections, and when the new government is sworn in, we will meet again to determine a united front against an evil that is undermining the future of our country and which is one that transcends the divides of political parties and persuasions, and on a personal level. Each of us gives our individual pledge that we are dedicated to serving the people of our country with the highest levels of personal integrity. It also said that AWARE that the corruption crisis must be tackled openly by all, we invite every fellow citizen, to unite with us in a determination to rid our country once and for all of the corruption that has so retarded our country's economic and social progress at home and marred our international image abroad."


In 1997 Pakistan and India on CPI were 5th and 8th most corrupt countries out of 52 countries, and in 2007 this gap has substantially increased to 42nd and 106th most corrupt countries out of 180 countries. TI Pakistan believes in the Slogan that "Pakistan comes first" , but feels that unless legislators, Judiciary, Executive and the Civil Society plays their role in a just and impartial manner, the country will continue to be at the lowest level of corruption in the Transparency International Corruption Perception Index, CPI.

For the source of the article follow http://www.ti-israel.org/Index.asp?ArticleID=1106&CategoryID=92&Page=9
Read More >>

Obama retakes oath of office after Roberts' mistake

WASHINGTON (CNN) -- President Obama retook his oath of office Wednesday after Chief Justice John Roberts flubbed while delivering it at Tuesday's inauguration.

President Barack Obama takes the oath of office -- his second in two days -- in the White House on Wednesday.

President Barack Obama takes the oath of office -- his second in two days -- in the White House on Wednesday.

Click to view previous image
1 of 2
Click to view next image

The second oath -- also administered by Roberts -- took place at 7:35 p.m. Wednesday in the White House's Map Room. Roberts asked Obama whether he was ready.

"I am, and we're going to do it very slowly," Obama replied.

The do-over was aimed at dispelling any confusion that might arise from Tuesday's take -- in which "faithfully" was said out of sequence -- and erase any question that Obama is legally the president.

However, per the Constitution, Obama became president at noon Tuesday without taking the oath.

"We believe that the oath of office was administered effectively and that the president was sworn in appropriately yesterday," White House counsel Greg Craig said Wednesday in a written statement.

"But the oath appears in the Constitution itself. And out of an abundance of caution, because there was one word out of sequence, Chief Justice Roberts administered the oath a second time," the statement read. Video Watch Tuesday's oath »

On Tuesday, Roberts, apparently working without a copy of the oath handy on the Capitol steps, started out by reciting a six-word phrase, but Obama broke in halfway through and repeated the first three.

That seemed to throw the chief justice off stride, and he proceeded to mix up the order of the words in the next phrase.

The Constitution sets out the language that should be used in the oath: "I do solemnly swear (or affirm) that I will faithfully execute the Office of President of the United States, and will to the best of my ability, preserve, protect and defend the Constitution of the United States."

Roberts moved the word "faithfully" back nine spots, and used "to" instead of "of." That threw the president off base, and he smiled and paused to collect his thoughts, then decided to follow Roberts' lead.

But the chief justice at the same time attempted to correct himself.

Here's how Tuesday's oath went:

Roberts: ... that I will execute the office of president to the United States faithfully ...

Obama: ... that I will execute ...

Roberts: ... the off -- faithfully the pres -- the office of president of the United States ...

Obama (at the same time): ... the office of president of the United States faithfully ...

The two got the rest correct, including the nonobligatory "So help you God?" "So help me God."

Reporters, bloggers and others weighed in on the flub. The New York Post offered this headline: "Roberts is the Oaf of Office."

A Washington Post reader complained in a letter to the editor: "What could have been a moment for the ages was marred by Mr. Roberts' thoughtlessness. News outlets will report that the first words of our new president were "confused." Whether through design or an amazing lack of preparation, Justice Roberts's behavior was a disgrace."

And Fox News anchor Chris Wallace said: "We're wondering here whether or not Barack Obama in fact is the president of the United States. They had a kind of garbled oath. It's just conceivable that this will end up going to the courts."

In a congressional luncheon after Tuesday's swear-in, Roberts and Obama exchanged words, and the chief justice appeared to tell the president, "It was my fault."

Before Wednesday's do-over at the White House, Obama, waiting on a couch, joked that "we decided it was so much fun ... "

Though a Bible was used in Tuesday's oath, one was not used for Wednesday's.

After a flawless recitation, Roberts smiled and said, "Congratulations again."


"Thank you, sir," the president replied. After a smattering of applause, Obama quipped that "the bad news for the [press] pool is there's 12 more balls."

Roberts has made no public comment on becoming tongue-tied Tuesday.


For source of the new please follow the link http://www.cnn.com/2009/POLITICS/01/21/obama.oath/index.html
Read More >>

Wednesday, January 21, 2009

Introduction to the Standard Template Library

Introduction to the Standard Template Library

The Standard Template Library, or STL, is a C++ library of container classes, algorithms, and iterators; it provides many of the basic algorithms and data structures of computer science. The STL is a generic library, meaning that its components are heavily parameterized: almost every component in the STL is a template. You should make sure that you understand how templates work in C++ before you use the STL.

Containers and algorithms

Like many class libraries, the STL includes container classes: classes whose purpose is to contain other objects. The STL includes the classes vector, list, deque, set, multiset, map, multimap, hash_set, hash_multiset, hash_map, and hash_multimap. Each of these classes is a template, and can be instantiated to contain any type of object. You can, for example, use a vector<int> in much the same way as you would use an ordinary C array, except that vector eliminates the chore of managing dynamic memory allocation by hand.

      vector<int> v(3);            // Declare a vector of 3 elements.
v[0] = 7;
v[1] = v[0] + 3;
v[2] = v[0] + v[1]; // v[0] == 7, v[1] == 10, v[2] == 17

The STL also includes a large collection of algorithms that manipulate the data stored in containers. You can reverse the order of elements in a vector, for example, by using the reverse algorithm.

      reverse(v.begin(), v.end()); // v[0] == 17, v[1] == 10, v[2] == 7

There are two important points to notice about this call to reverse. First, it is a global function, not a member function. Second, it takes two arguments rather than one: it operates on a range of elements, rather than on a container. In this particular case the range happens to be the entire container v.

The reason for both of these facts is the same: reverse, like other STL algorithms, is decoupled from the STL container classes. This means that reverse can be used not only to reverse elements in vectors, but also to reverse elements in lists, and even elements in C arrays. The following program is also valid.

      double A[6] = { 1.2, 1.3, 1.4, 1.5, 1.6, 1.7 };
reverse(A, A + 6);
for (int i = 0; i < 6; ++i)
cout << "A[" << i << "] = " << A[i];

This example uses a range, just like the example of reversing a vector: the first argument to reverse is a pointer to the beginning of the range, and the second argument points one element past the end of the range. This range is denoted [A, A + 6); the asymmetrical notation is a reminder that the two endpoints are different, that the first is the beginning of the range and the second is one past the end of the range.

Iterators

In the example of reversing a C array, the arguments to reverse are clearly of type double*. What are the arguments to reverse if you are reversing a vector, though, or a list? That is, what exactly does reverse declare its arguments to be, and what exactly do v.begin() and v.end() return?

The answer is that the arguments to reverse are iterators, which are a generalization of pointers. Pointers themselves are iterators, which is why it is possible to reverse the elements of a C array. Similarly, vector declares the nested types iterator and const_iterator. In the example above, the type returned by v.begin() and v.end() is vector<int>::iterator. There are also some iterators, such as istream_iterator and ostream_iterator, that aren't associated with containers at all.

Iterators are the mechanism that makes it possible to decouple algorithms from containers: algorithms are templates, and are parameterized by the type of iterator, so they are not restricted to a single type of container. Consider, for example, how to write an algorithm that performs linear search through a range. This is the STL's find algorithm.

      template <class InputIterator, class T>
InputIterator find(InputIterator first, InputIterator last, const T& value) {
while (first != last && *first != value) ++first;
return first;
}

Find takes three arguments: two iterators that define a range, and a value to search for in that range. It examines each iterator in the range [first, last), proceeding from the beginning to the end, and stops either when it finds an iterator that points to value or when it reaches the end of the range.

First and last are declared to be of type InputIterator, and InputIterator is a template parameter. That is, there isn't actually any type called InputIterator: when you call find, the compiler substitutes the actual type of the arguments for the formal type parameters InputIterator and T. If the first two arguments to find are of type int* and the third is of type int, then it is as if you had called the following function.

      int* find(int* first, int* last, const int& value) {
while (first != last && *first != value) ++first;
return first;
}

Concepts and Modeling

One very important question to ask about any template function, not just about STL algorithms, is what the set of types is that may correctly be substituted for the formal template parameters. Clearly, for example, int* or double* may be substituted for find's formal template parameter InputIterator. Equally clearly, int or double may not: find uses the expression *first, and the dereference operator makes no sense for an object of type int or of type double. The basic answer, then, is that find implicitly defines a set of requirements on types, and that it may be instantiated with any type that satisfies those requirements. Whatever type is substituted for InputIterator must provide certain operations: it must be possible to compare two objects of that type for equality, it must be possible to increment an object of that type, it must be possible to dereference an object of that type to obtain the object that it points to, and so on.

Find isn't the only STL algorithm that has such a set of requirements; the arguments to for_each and count, and other algorithms, must satisfy the same requirements. These requirements are sufficiently important that we give them a name: we call such a set of type requirements a concept, and we call this particular concept Input Iterator. We say that a type conforms to a concept, or that it is a model of a concept, if it satisfies all of those requirements. We say that int* is a model of Input Iterator because int* provides all of the operations that are specified by the Input Iterator requirements.

Concepts are not a part of the C++ language; there is no way to declare a concept in a program, or to declare that a particular type is a model of a concept. Nevertheless, concepts are an extremely important part of the STL. Using concepts makes it possible to write programs that cleanly separate interface from implementation: the author of find only has to consider the interface specified by the concept Input Iterator, rather than the implementation of every possible type that conforms to that concept. Similarly, if you want to use find, you need only to ensure that the arguments you pass to it are models of Input Iterator. This is the reason why find and reverse can be used with lists, vectors, C arrays, and many other types: programming in terms of concepts, rather than in terms of specific types, makes it possible to reuse software components and to combine components together.

Refinement

Input Iterator is, in fact, a rather weak concept: that is, it imposes very few requirements. An Input Iterator must support a subset of pointer arithmetic (it must be possible to increment an Input Iterator using prefix and postfix operator++), but need not support all operations of pointer arithmetic. This is sufficient for find, but some other algorithms require that their arguments satisfy additional requirements. Reverse, for example, must be able to decrement its arguments as well as increment them; it uses the expression --last. In terms of concepts, we say that reverse's arguments must be models of Bidirectional Iterator rather than Input Iterator.

The Bidirectional Iterator concept is very similar to the Input Iterator concept: it simply imposes some additional requirements. The types that are models of Bidirectional Iterator are a subset of the types that are models of Input Iterator: every type that is a model of Bidirectional Iterator is also a model of Input Iterator. Int*, for example, is both a model of Bidirectional Iterator and a model of Input Iterator, but istream_iterator, is only a model of Input Iterator: it does not conform to the more stringent Bidirectional Iterator requirements.

We describe the relationship between Input Iterator and Bidirectional Iterator by saying that Bidirectional Iterator is a refinement of Input Iterator. Refinement of concepts is very much like inheritance of C++ classes; the main reason we use a different word, instead of just calling it "inheritance", is to emphasize that refinement applies to concepts rather than to actual types.

There are actually three more iterator concepts in addition to the two that we have already discussed: the five iterator concepts are Output Iterator, Input Iterator, Forward Iterator, Bidirectional Iterator, and Random Access Iterator; Forward Iterator is a refinement of Input Iterator, Bidirectional Iterator is a refinement of Forward Iterator, and Random Access Iterator is a refinement of Bidirectional Iterator. (Output Iterator is related to the other four concepts, but it is not part of the hierarchy of refinement: it is not a refinement of any of the other iterator concepts, and none of the other iterator concepts are refinements of it.) The Iterator Overview has more information about iterators in general.

Container classes, like iterators, are organized into a hierarchy of concepts. All containers are models of the concept Container; more refined concepts, such as Sequence and Associative Container, describe specific types of containers.

Other parts of the STL

If you understand algorithms, iterators, and containers, then you understand almost everything there is to know about the STL. The STL does, however, include several other types of components.

First, the STL includes several utilities: very basic concepts and functions that are used in many different parts of the library. The concept Assignable, for example, describes types that have assignment operators and copy constructors; almost all STL classes are models of Assignable, and almost all STL algorithms require their arguments to be models of Assignable.

Second, the STL includes some low-level mechanisms for allocating and deallocating memory. Allocators are very specialized, and you can safely ignore them for almost all purposes.

Finally, the STL includes a large collection of function objects, also known as functors. Just as iterators are a generalization of pointers, function objects are a generalization of functions: a function object is anything that you can call using the ordinary function call syntax. There are several different concepts relating to function objects, including Unary Function (a function object that takes a single argument, i.e. one that is called as f(x)) and Binary Function (a function object that takes two arguments, i.e. one that is called as f(x, y)). Function objects are an important part of generic programming because they allow abstraction not only over the types of objects, but also over the operations that are being performed.

For the source of the article please follow the link http://www.sgi.com/tech/stl/stl_introduction.html

Read More >>

Tuesday, January 20, 2009

The 9 hottest skills for '09

The 9 hottest skills for '09

Old notion: Certain skills, such as programming, are prime for outsourcing. New order: Firms want developers and other talented staffers in-house.

By Thomas Hoffman


December 30, 2008 (Computerworld) By almost any measure, the U.S. economy is in its worst state since the Great Depression. Consumer spending is down, credit markets remain weak, and more than 10 million Americans are out of work.

Yet despite the grim financial picture, demand for certain types of IT skills, such as SAP, .Net and help desk/support, remains strong. And while some employers will continue to look outside their companies to find workers with expertise in these and other disciplines, some CIOs are building some of this know-how internally as hiring freezes become more common. (Read about ways to boost your pay in Computerworld's annual Salary Survey.)

Here's a look at the hottest skills, as cited by respondents to Computerworld's annual Forecast survey.

1. Programming/application development

Ask any recruiter what the single most sought-after IT skill is at the moment, and the universal response is a three-letter word: SAP.

"The little joke in our industry right now is that if you have 'SAP' on your résumé right now, you have zero unemployment," says Bruce Culbert, CEO of iSymmetry Inc., an IT consulting and recruitment firm with offices in Washington and Alpharetta, Ga.

SAP experts, particularly those who are experienced with a specific module in a certain industry, are commanding $35 to $40 per hour more on average than other types of senior technicians, says Culbert. Demand for SAP skills has remained red hot because a growing number of companies are working toward establishing global instances of the ERP system, says Jill Herrin, president of IT recruiter JDResources Inc.

But not far behind is demand for IT professionals with .Net experience, say Herrin and other observers. Some companies that relied on offshore labor to deliver .Net and C# capabilities just a few years ago found that route to be "nonproductive," says Herrin. Now they're looking to fill those jobs in-house, she says.

Rich Schappert, senior director of IT at Casey's General Stores Inc. in Ankeny, Iowa, says he has been filling the retailer's demand for .Net and SQL Server programmers for the past five years by recruiting and training local college students. The company, which operates 1,500-plus stores across the Midwest, has been moving its Cobol-based financial applications into the .Net environment to reduce its mainframe costs. "[It's also] getting tougher to find people who know Cobol," notes Schappert.

 2. Help desk/technical support

Help desk and technical support skills remain in strong demand, particularly for people who offer a blend of deep technical expertise and solid customer-service abilities, says Herrin. "I have lots of customers who tell me their customer service function is broken and they need people with better communication skills," she says.

"One of the things we're seeing a demand for in this space is what we call a JOAT -- a jack-of-all-trades -- somebody who can do break/fix work and a bit of desktop support," says Katherine Spencer Lee, executive director at IT staffing firm Robert Half Technology. Demand for well-rounded technicians tends to become more acute when companies are looking to get more work done with fewer people, she says.

3. Project management

Even though many companies are cutting back on IT projects, there's still robust demand for project managers with solid track records, says Spencer Lee. "A differentiator is whether the person can articulate that they've brought a project in on time -- or, better yet, under budget -- and how they did that," she says.

Project management is one of the areas "that endure all economies and climates, where companies are constantly looking for people who understand the project and the systems development life cycles and make sure the project goals are closely aligned with the business objectives," says Harvey Koeppel, executive director of the Center for CIO Leadership in New York.

Employers also need people with project management certificates, even at the vice president level, according to some headhunters. As of late July, The Computing Technology Industry Association had awarded 20% more Project+ certifications than in the previous year, says Gretchen Koch, director of skills development programs at CompTIA.

4. Networking

The ongoing convergence of voice, e-mail, video, instant messaging and other communications systems will continue to create demand for networking specialists with implementation experience. For example, Scholastic Inc. in New York posted a job opening in November for a network convergence manager to help it create a virtual call center using voice over IP, says Saad Ayub, senior vice president and CIO at the children's education company.

Those types of projects often require new skills as well. In 2008, for example, CRST International Inc. moved from a frame-relay network to AT&T's Multiprotocol Label Switching network and installed Cisco's VoIP system. As part of that project, the Cedar Rapids, Iowa-based transportation company trained some of its IT staffers to become Cisco Certified Voice Professionals, says Steve Hannah, vice president of IT.

Network convergence projects will also heighten demand for workers with network security and data privacy acumen, Koeppel says, adding that "it's not just pure [network] backbone and infrastructure skills" that are being sought by employers.

5. Business intelligence

Now more than ever, corporate executives want to be able to analyze customer and sales data in order to make informed decisions about business strategies. That's driving demand for business intelligence specialists across the board, including people with data mining, data warehousing and data management skills.

At Aspen Skiing Co., which operates four ski resorts in western Colorado, company officials will be making year-over-year comparisons on customer spending, including analyses of spending habits during the previous recession, says CIO Paul Major. "We're going to have to get very granular with our analytics," he says.

Meanwhile, there's steady demand for IT professionals with experience using vendor-specific BI tools from companies such as Business Objects and Cognos, says Spencer Lee. But the toughest people to find in this area are those who can help business managers understand the type of data they're trying to analyze and how to interpret the results, she says. "What's difficult," she adds, "is to find someone who's the full-meal deal."

6. Security

When it comes to demand for certain types of security professionals, those with SAP security experience "are probably the hottest of the hot right now," says Herrin.

But interest in security professionals remains strong across the board. "Companies can't ignore security requirements, even in tough economic times," says Stephen Pickett, CIO at Penske Corp. and past president of the Society for Information Management.

There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems Security Professional accreditation.

7. Web 2.0

While many companies are just starting to noodle with corporate implementations of social networking applications such as MySpace and Facebook, "more and more companies are trying to reach their customers via the Web," says Pickett.

Demand for Web 2.0 skills is also driven by the continuing expansion of business-to-business connections. For instance, Children's Hospital and Health System in Milwaukee recently created a portal for roughly half of its physicians who work remotely. The system provides them with access to summary medical data on patients, says Mike Jones, vice president and CIO.

8. Data center

Most of the glass-house buzz is about server and storage virtualization projects that help organizations lower their energy costs and shrink their data center footprints.

But few companies are recruiting specifically for data center skills. Instead, they're retraining existing staff in VMware and other virtualization technologies. For instance, Aspen Skiing is considering virtualizing up to 40% of its servers in 2009, says Major. To achieve that, Aspen Skiing plans to rely on VMware and EMC to provide staff with the necessary training.

9. Telecommunications

VoIP and projects involving unified communications continue to drive demand for blended telecommunications and networking skills, particularly among small to midsize businesses that are just beginning to deploy these systems, says Spencer Lee. Interest in Wi-Fi, WiMax, Bluetooth and related skills is also growing, says Koeppel, "particularly as cities look to WiMax as a feature to attract businesses."

Hoffman is a former Computerworld writer. Contact him at tom.hoffman24@gmail.com.

This article has been taken from  http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=Management&articleId=330106

Read More >>

Hitler Yesterday Israel Today & God's Punishment of Ariel Sharon - Neither Dead Nor Alive!


Hitler Yesterday Israel Today

THE GRANDCHILDREN OF HOLOCAUST SURVIVORS FROM WORLD WAR II ARE DOING TO THE PALESTINIANS EXACTLY WHAT WAS DONE TO THEM BY NAZI GERMANY …

BUILDING WALLS & FENCES TO KEEP PEOPLE IN PRISON

 

 

CHECK POINTS NOT TO ALLOW PEOPLE BASIC FREEDOM OF MOVEMENT

ARRESTS & HARASSMENTS

DESTROYING HOMES & LIVELIHOODS

GIFTS (WITH LOVE) FROM THE CHILDREN OF PEACE-LOVING & CIVILIZED COUNTRIES

 

 

  *********

Ariel Sharon, caused lots and lots of damage in Palestine... he murdered thousands of innocent palestinians women and children in refugee camps of Lebanon..

But today, he enjoys the 'curse' of those innocent peoples sincere pray and God punishing this new-Pharoa very cruelly!

Sharon butcher of sabra and shatilla almost dead! - GupShup Forums

And today he is in such a position (Please see picture). The media all over the world is quite, feeling shame to publish/ show Sharon on any world news. For your information, he is lying in coma since years, and no doctor is able to find the correct disease.  

 

No life - No death, this is the result of killing thousands of innocent people in Palestine . What we do in this world, we have to taste, before we leave this on our heavenly abode as well.

Read further on the link..

Franklin Lamb: The Palestinians of Shabra-Shatila

Al Jazeera English - Middle East - Sabra Shatila recalled


Read More >>