Teri Nazron K Isharon Se Badalta Hai

July 31, 2015 Add Comment

Teri Nazron K Ishare Se Badalta Hai Samaa,
Tere Qadmo Ki Rawani Se Rawan Aab E Rawan,

Roshni Choome Usey Rang Usey Pyar Karen,
Us K Har Aks Mein Ik Ayena Khana Hai Nihan,

Un Fizaon Mein Sikhaya Gya Urna Hum Ko,
Aandhiyan Jaal Uthaye Hue Phirti Hain Jahan,

Dil Mein Reh Reh K Kisi Yaad Ki Hoti Hai Kasak,
Aankh Ko Khenche Liye Jaye Talismaat E Jahan,

Zindagi Mast Rahe Chahe Sard E Chasht Rahe,
Ho Daro Bast E Jahan Ya Na Rahen Kon O Makan,

Kis Liye Sham Se Aa Betha Hoon Ghar Mein Apne,
Agar Tere Laut K Aane Ka Nahi Hai Imkaan,

Hijar Mein Gard Hua Ghum Bhi Koi Fard Hua,
Ek Tha Main Hi Yahan Aur Raha Main Bhi Kahan,

Phir Koi Qais Ki Manind Yahan Lehraye,
Moj Mein Aaye Hawa Raqs Kare Reg E Rawan.

14 August Pakistan Independence Day Wallpaper

July 31, 2015 Add Comment
Download Free Latest 14 August Pakistan Independence Day Wallpaper


Bajrangi Bhaijaan Full Movie 2015 DvdRip Non Retail HD Print

July 31, 2015 Add Comment
Banjrangi Bhaijaan Full Movie 2015 DvdRip Non Retail HD Print


Starring :  Salman Khan, Kareena Kapoor, Harshaali Malhotra
Producer : Salman Khan
Directed By : Kabir Khan
Genre : Comedy, Drama




Bangistaan Full Movie 2015 Mp3 Songs Free Download

July 16, 2015 Add Comment
Download Free Bangistaan Full Movie 2015 Mp3 Songs


Starring : Riteish Deshmukh, Pulkit Samrat, Chandan Roy Sanyal, Akash Pandey, Arya Babbar
Producer : Farhan Akhtar, Ritesh Sidhwani
Director : Karan Anshuman
Music Director : Ram Sampath
Lyrics : Puneet Krishna
  • Ishq Karen Ge - Download   - Sona Mohapatra, Abishek Nailwal, Shadab Faridi
  • Hogi Kranti - Download   - Ram Sampth, Abishek Nailwal
  • Saturday Night - Download   - Aditi Singh Sharma, Benny Danyal, Neeraj Shridhar, Janusz Krucinski
  • Maula - Download   - Ram Sampath, Rituraj Mohanty
  • Meri Zidd - Download   - Ram Sampath, Siddharth Basrur
  • Is Duniya Se Ladna Hai - Download   - Suraj Jagan, Abishek Nailwal
  • Ishq Karen Ge (Edm Version) - Download   - Sona Mohapatra, Abishek Nailwal, Shadab Faridi


3 Basic Tips To Prevent A DDoS Attack

July 15, 2015 Add Comment
Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks in that there is very low cost that the attacker has to incur to put such attacks in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let's first understand what exactly a DDoS attack is.



Understanding DDoS Attack :

A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers, resources inaccessible to its anticipated user. In order to carry out a DDoS attack the attackers never users their own system, rather they create a network of zombies computers often called as "Botnet" - that is a hive of computers, to incapacitate a website or a web server.

Let's understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.

3 Basic Tips To Prevent A DDoS Attack :

There are several ways to prevent the DDoS attack, however, here in this guest post i'll covering three basic tips that will help you to protect your website from the DDoS Attack.

1 : Buy More Bandwidth 

One of the easiest methods is to unsure that you have sufficient bandwidth on your web. You'll be able to tackle lots of low scale DDoS attacks simply by buying more bandwidth so as to service the request. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let's suppose you have 10,000 computers system each distribution 1 Mbps directed towards your way. This means you're getting 10 GB of data that is hitting your web server every second. Now, that's causes a lot of traffic.

So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse data centers and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.

However, there's problem with this method that is buying more bandwidth can be a costly affair. And as you'll know that current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2 : Opt For DDoS Mitigation Services

A lot of network or internet service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial of service attacks.

3 : Restricted Connectivity 

In case you have computer system that are connected tot he web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine online on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.

Wrapping Up !

Websites are largely getting attacked by hackers every second. Denial-of-Service attack is insanely getting huge and is creating a lot of problems for business organization having strong online vicinity. In this guest post you'll not only understand what a DDoS attack actually means, but will also come to know about a few type of method to prevent DDoS attacks. Aforementioned are three tips that i'll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.

Convert A Wordpress Blog To Blogger Simple And Easy Way

July 14, 2015 Add Comment
Blogger is a very widely used publishing platform, mostly because its strength lies in its simplicity and ease to use. It is quite easy to use, and is recommended for beginner bloggers who are looking for a quick and easy way to create a presence for themselves online. For bloggers who have created a Wordpress blog, but are at loss to maintain or modify it, they have great option in Blogger.



They can easily migrate their WordPress Blog to Blogger without hitch. In this post, we will talk about how you can shift WordPress to free Blogger.

Normally, such a transfer isn't easy. Data needs to be imported from WordPress first, and the imported to Blogger. Since Blogger doesn't allow any data format expect its own, there needs to be a conversation process that will convert WordPress exported files. Luckily, there's just such a utility available. Here, we will guide you through the simple steps. Following them, you can convert self-hosted WordPress blogs to Blogger, as well as migrate from free WordPress to Blogspot.

There are some steps you have to follow !

Step 1 : Importing From WordPress

Login to your WordPress account (for free WordPress users), and the choose the blog you want to convert into Blogger. Alternatively, you can login to your Blog's Dashboard directly by adding the /wp-login.php  suffix to your blog's home URL (eg yourblog.com/wp-login.php or yourblog.wordpress.com/wp-login.php) .

Navigate through your WordPress menu, and find the Tools option. When you click on it, you'll see further options, among which you will see Export option. Click on it. Choose what to export, you can select Posts, Pages, or feedback, but it is recommended that you select all content to ensure maximum content is transferred. Then click on Download Export File, which will let you save the exported file to your hard drive. You have completed step 1 at this point.

Step 2 : Convert Into Blogger Format

There is a useful little app that will do this job for you. To convert, visit this app's page, and navigate to the button in the middle of the content that says 'Choose File'. Browse to the file you downloaded from WordPress, and upload it here. The click Convert. After the conversion, you will need to save the output file. this file is in Blogger-Friendly format, and will be used inside Blogger.

Step 3 : Import To Blogger

The import process into Blogger is pretty straightforward. Simply login to, or sign up for your Blogger Account, and click on Create a Blog link. I'm assuming you want to create a new blog for your new content. But if you want to, you can import into an existing blog as well.

From the Dashboard, click on Settings >> Other >> Import Blog.

Now, all you need to do is follow the simple instructions, and upload the converted file. You well be guided through a wizard that will import data from this file into Blogger. Once done, you will see all your posts from WordPress ready to be published !

How To Generate Twitter API Key

July 14, 2015 Add Comment
After Twitter has closed the access to version 1.0 of API, we all are pushed to change the Latest Tweets Widget and Twitter Follower counter widget settings in order to make it work with Twitter API version 1.1 .



To make things straight, you have to create a Twitter application to generate Twitter API Keys, Access Token and Secret Keys and so on.

Creating A Twitter Application :

To use Twitter counter widget and other Twitter related widgets, you need OAuth access keys. To get Twitter Access Keys, you need to create Twitter Application which is mandatory to access Twitter.

  • Go to https://dev.twitter.com/apps/new and login, if necessary.
  • Enter your Application Name, Description and your Website URL. You can leave the callback URL empty.
  • Accept the TOS, and solve the CAPTCHA.
  • Submit the form by clicking Create Your Twitter Application.
  • Copy the consumer key (API Key) and consumer secret form the screen into your application.


Create Your Access Token For OAuth :

After creating your Twitter Application, you have to give the access to your Twitter Account to use this Application. To do this, click the Create My Access Token.

" Get The Consumer Key, Consumer Secret, Access Toke, Access Toke Secret "

In order to access the Twitter, that is to get recent tweets and twitter follower count, you need the four keys such as Consumer Key, Consumer Secret, Access Token, Access Token Secret.

To get all these keys, click the OAuth Tool tab in your Twitter Application and copy those keys and paste in our Theme Options page. That's it. Now your Twitter Counter will get the followers count and display them in your widget.

System Proxy Switcher Download For PC

July 07, 2015 Add Comment
System Proxy Switcher is a simple to use application dedicated to changing the outgoing IP address of your system, replacing it with the specified proxy server. This lightweight tool can thus help you browser the internet anonymously and protect important information about yourself.



Manually Change The IP Address :

System Proxy Switcher is small and uncomplicated, serving as a GUI for the system IP modifying function. It allows you to specify any IP address that you wish, in the designated field, as well as enter the corresponding port.

This program does not provide you with lists of proxy server addresses, nor does it features automatic connection features. Therefore, you need to manually provide the proxy server IP address, regardless if it is a public one or an encrypted one.

The program allows you only to change the IP address of your system, so in case you are using an encrypted proxy server, you need to provide the login credentials before you can access any URL, from your browser.

Quickly Reset The Proxy Options To The Default Configuration :

System Proxy Switcher allows you to clear the previously entered information and to reset the IP address of your system, with two mouse clicks. You need to simply select the "No proxy" option and click the "Set" button for the change to take place.

A notification bubble is prompted in the lower right corner of your screen, near the system tray area, whenever you make changes to the IP address. Moreover, the program indicates the current IP configuration in its interface.

Enable Or Disable The Desktop Notifications :

By default, System Proxy Switcher displays a small notification bubble on the screen, informing you of the successful IP address modification. You may disable this feature if you wish, with one mouse click, by checking "Silent" box at the top of the program's window. The application does not indicate the state of the proxy server you selected.


Adobe Reader And Adobe Acrobat Cleaner Tool Download For PC

July 07, 2015 Add Comment
Adobe products can come in quite handy since they come with great feature-sets and intuitive interface, yet it is very hard to completely get rid of them should you decide to uninstall them. The best way to make sure all traces are removed is to rely on dedicated cleaning apps or to try Adobe Reader and Adobe Acrobat Cleaner Tool.



As the name implies, this toll can only be used to erase the leftover items of Adobe Reader and Adobe Acrobat, so if you are interested in thoroughly cleaning your PC of another Adobe app, you need to keep looking.

The software utility does not require any installation so you can carry it on your USB device and run the app off it whenever needed. It can efficiently remove all user settings or preferences that are left behind after having uninstalled the said apps.

You will need to run Adobe Reader and Adobe Acrobat Cleaner Tool and specify the Adobe product you want to thoroughly clean. This way, if you want to keep another Adobe program on your PC, its settings will be modified.

Next, the app will scan your PC and detect all leftover files. If this process fails, you can manually specify the folder where the remaining items are stored.

If the product you are interested in removing is Adobe Acrobat, please not that its traces can only be cleaned if you installed it as separate app, that is, not as part of a creative suit.

All in all, Adobe Reader and Adobe Acrobat Cleaner Tool can prove to be a useful app for removing all traces left by compatible Adobe products, if the typical uninstallation process did not complete successfully.


1 Pathan Ne Buzrg Se Kuch Pucha

July 07, 2015 Add Comment

1 Pathan Ne Buzrg Se Kuch Pucha To Buzrg Ne 2 Thapar Laga Diye,
Kisi Ne Pathan Se Kaha K Khan Sb Kya Pucha Tha Aap Ne ?

Pathan : Main To Sirf Itna Poocha Tha K 14 August Ki Namaz Kahan Ho Gi :/ :( :P

Aao Aaj Sare Dost Mil K

July 07, 2015 Add Comment

Aao Aaj Sare Dost Mil K Ek Wada Karen,
K August K Poore Mahine Koi Bhi Underwear Nahi Pehne Ga,
Kyun K August Ka Mahina Azaadi Ka Mahina Hai :P


Azaadi Ki Kabhi Shaam

July 07, 2015 Add Comment

Azaadi Ki Kabhi Shaam Nahi Hone Den Ge,
Shaheedon Ki Qurbaani Badnaam Nahi Hone Den Ge,

Bachi Ho Jo Ek Boond Bhi Garam Lahoo Ki,
Tab Tak Pakistan Ka Aanchal Nilaam Nahi Hone Den Ge,

"Happy Independence Day"

Mr. X Full Movie 2015 100 MB HD DvdRip For Mobile

July 06, 2015 Add Comment
Download or Watch Online Mr. X Full Movie 2015 in 100 MB HD DvdRip For Mobile


Starring : Emraan Hashmi, Aymra Dastur, Noora Fatehi
Genre : Sci-Fi, Thriller
Directed By : Vikram Bhatt


Watch Online :




Download Free :



OpenVPN Download Free For PC

July 06, 2015 Add Comment
OpenVPN provides a full featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site to site VPNs, Wi-Fi security, and enterprise scale remote access solutions with load balancing, fail-over and fine grained access controls.



A Secure Means Of Internet Surfing :

Starting with the fundamentals premise that intricacy in the enemy of security, OpenVPN offers a cost-efficacious, lightweight alternatives to other VPN technologies that is well-targeted for the SME and enterprise markets. OpenVPN's lightweight design sheds many of the intricacies that characterize other VPN implementations. The OpenVPN security model is predicated on SSL, the industry standard for secure communications via the cyber world.

OpenVPN implements OSI layer 2 or 3 secure networks extension utilizing the SSL/TLS protocols, fortifies flexible client authentication methods predicated on certificated, perspicacious cards, and/or 2-factor authentications, and sanctions user or group concrete access control policies utilizing firewell rules applied to the VPN virtual interface. OpenVPN is not a web application proxy and does not operate through a web browser.

Compatible With Various Devices Out There :

OpenVPN's principal strengths include cross platform portability across most of the kenned computing universe, excellent stability, scalability to hundreds or thousands of clients, relatively facile installation, and support for dynamic IP addresses and NAT.

OpenVPN provides an extensible VPN framework which has been designed to facilitate site concrete customization, such as providing the capability to distribute a customized installing package to clients, or fortifying alternative authentication methods via OpenVPN's plugin module interface.

OpenVPN offers a management interface which can be acclimated to remotely control or centrally manage an OpenVPN daemon. The management interface can withal be acclimated to develop a GUI or web-predicated front-end application for OpenVPN.

Using Revolutionary Connection Technologies :

TLS is the latest evolution of the SSL family of protocols developed pristine by Netscape for their first secure web browser. TLS and its SSL predecessors have optically discerned widespread utilization on the web for many years and have been extensively analyzed for impatiences.

In turn, this analysis has led to a subsequent invigorating of the protocols such that today, SSL/TLS is considered to be one of the most vigorous and most mature secure protocols available. As such, we believe TLS is an excellent cull for the authentication and key exchange mechanism of a VPN product.

To Sum It Up :

The bottom line is that OpenVPN is built for portability, is facile to utilize, has been rigorously designed and tested to operate robustly on unreliable networks with a vigorously modular design. Moreover, OpenVPN is expeditious and while OpenVPN provides many options for controlling the security parameters of the VPN tunnel, it additionally provides options for forfending the security of the server itself.

Portable Hide All IP Free Vpn Software For PC

July 06, 2015 Add Comment
Hide All IP is a simple but powerful network software utility whose purpose is to hide your IP address when you're navigating the web, in order to protect your online identity from hackers. It is very easy to work with, so no special experience is required for it.



Portable Perks :

This is the portable edition of Hide All IP, which means that you can drop the program files in any part of the hard drive and just click the executable to launch the app. Otherwise, you can copy it to a USB flash disk to directly run it on any computer. More importantly, it does not modify Windows registry settings or create extra files on the disk, thus leaving no traces behind once it is removed. Administrative privileges are necessary, though...

Connect To A Fake IP Address In The Desired Country :

The GUI may seem cluttered at a first glance, but its options are neatly organized in the main window. In order to hide your IP address, you must replace it with a new and fake one. This is easy done by picking the preferred country along with the frequency for automatically changing the IP.

Furthermore, you can explore a list with preset countries, IP addresses and the signal strength. Once linked, you can launch a web browser from the main window to establish a safe connection. Additional browsers may be added to the list by pointing out their location on the disk. Plus, you can clear cookies.

Advanced IP Hiding Rules For Experienced Users :

Hide All IP also enables you to modify rules when it comes to the tunnel destination or IP address together with a port range. You can build a list with apps to hide, minimize Hide All IP to the system tray and make it automatically run at every Window startup until further notice, put together an exclusion list with auto tunnel programs, clear cache, change the UI language, and so on.

Evaluation And Conclusion :

The software utility comes loaded with a surprisingly advanced set of adjustable settings for the IP hiding mode. It uses low CPU and RAM, so it doesn't hamper system performance. We have not come across any issues in our tests, since the tool did not hang or crash.

Taking everything into account, Hide All IP delivers a solution to all users looking to protect their online identity, especially ones who want to tinker with every aspect.


Hide All IP Free Vpn Software Download For PC

July 06, 2015 Add Comment
Hide All Ip is a simple software tool which can be used to protect your identity when surfing the internet, by hiding your real IP and replacing it with a fake one.



The installation process is quick and typical, yet if you want to bypass it, you should know there is also a portable version of this utility.

With a modern and minimal design, the interface is built on several tabs and thus, enabling you to quickly access all options available. Aside from that, it is intuitive and allows all user categories to easily work with it.

First and foremost, you can view all the web browsers installed on your computer and a list of available servers, along with their location, IP address and signal. You can connect to any country and even program Hide All IP to change the IP used at a specified time period.


Second Hand Husband Full Movie 2015 Mp3 Songs

July 04, 2015 Add Comment
Download Free Second Hand Husband Full Movie 2015 Songs Mp3


Starring : Gippy Grewal, Dharmendra, Narmada Ahuja, Deepshika, Geeta Basra, Vijay Raaz, Mukesh Tiwari, Ravi Kishan, Alok Nath, Sanjay Mishra
Director : Smeep Kang
Music Director : Badshah, Jatinder Shah, Surrinder Rattan, Dr Zeus
Producer : Iqbal Singh, Palwinder Singh, Manwider Singh, Gurwinder Singh
Lyrics :  Various 

  • Mithi Meri Jaan - Download   - Gippy Grewal, Jasime Sandlas
  • Bad Baby - Download   - Gippy Grewal, Badshah
  • Channa - Download   - Sunidhi Chauhan
  • Jawani Din Chaar - Download   - Labh Janjua
  • Second Hand Husband (Title Song) - Download   - Gippy Grewal
  • Rab Jaisa - Download   - Ravindra  Upadhyay, Amanjot
Download Full Movie Mp3 Songs - Download   - (128 Kbps)
Download Full Movie Mp3 Songs - Download   - (320 Kbps)


Maxthon Browser For Android Free Download

July 03, 2015 Add Comment
One of the first things that people should install on their phones is an internet browsers. There are many free and reliable browsers out there, but if you've grown tired of the popular ones, why not use Maxthon. It's truly lightweight, easy to use and really reliable.



Intuitive Browser That Fails To Stand Out :

The browser opens directly with the home page. There's no tutorial instructions to show you how to operate the app, but its layout is really intuitive and you'll get the hang of it fast. The browser has all settings neatly arranged in a bar at the bottom of the page making them accessible at all times.

It doesn't come with additional theme, but it does support a night mode with dark background for whenever the lights are dim or out. The browser lets users add shortcuts to their favorite websites on the home page.

You can scroll through all the recommended and most visited websites, or add the URL manually. Other than that, the browser comes with a website section which features thumbnails with pictures and headlines of top events in several industries.

Browse The Internet Fast : 

Just like most other browsers, Maxthon allows users to open multiple tabs at once. The address bar at the top of the page is automatically hidden, to provide users with more screen space. A QR scanner is also features on the toolbar.

Users have the option of bookmarking pages, turning their screen brighter or searching for words in text. In addition, you can download images and files or check your history. Users can also share pages with friends on social networks. In addition to that, the app lets you change font size and format the reading mode. It comes with folders in quick search and the hot search keywords in the address bar vary depending on your location.

Sync Your Browsing History :

The app lets you sync your tabs and information in cloud, to make it available on more than one device that you may use so you won't lose your browsing history. The app also comes with an incognito mode, for private browsing during which the device won't record pages that you've visited.

In addition, the app comes with the option to access Game Center from Quick Access page. It also has Quick Type feature. When you tab the address bar, a website address suggestion will appear above the keyboard.

Aahat Jo Sunayi Di Hai

July 01, 2015 Add Comment

Aahat Jo Sunayi Di Hai Hijar Ki Shab Ki Hai,
Yeh Raaye Akele Meri Nahi Hai Sab Ki Hai,

Sunsaan Sarrak Sannata Aur Lambe Saaye,
Yeh Sari Fiza Aye Dil Tere Matlab Ki Hai,

Teri Deed Se Aankhen Jee Bhar K Sairaab Hui,
Kis Roz Hua Tha Aisa Baat Yeh Kab Ki Hai,

Tujhe Bhool Gaye Kabhi Yaad Nahi Karta Tujh Ko,
Jo Baat Bohat Pehle Karni Thi Ab Ki Hai,

Mere Sooraj Aa, Mere Jism Pe Apna Saaya Kar,
Bari Taiz Hawa Hai Sardi Aaj Ghazab Ki Hai.

Ghum Ki Barish Ne Bhi

July 01, 2015 Add Comment

Ghum Ki Barish Ne Bhi Tere Ghum Ko Dhoya Nahi,
Tu Ne Mujh Ko Kho Diya Maine Tujhe Khoya Nahi,

Neend Ka Halka Gulaabi Sa Nikhar Aankhon Mein Tha,
Yoon Laga Jaise Woh Shab Ko Dair Tak Soya Nahi,

Har Taraf Deewar O Dar Aur Un Mein Aakhon K Hujoom,
Keh Sake Jo Dil Ki Halat Woh Lab E Goya Nahi,

Jurm Adam Ne Kiya Aur Nasal E Adam Ko Saza,
Kaat'ta Hoon Zindagi Bhar Maine Jo Boya Nahi,

Janta Hoon Ek Aise Shakhs Ko Main Bhi Munir,
Ghum Se Pathar Ho Gya Lekin Kabhi Roya Nahi.

Udaas Logon Se Pyar Karna

July 01, 2015 Add Comment

Udaas Logon Se Pyar Karna Koi To Seekhe,
Safaid Lamhon Mein Rang Bharna Koi To Seekhe,

Koi To Aaye Khizaan Mein Patte Ugaane Wala,
Gulon Ki Khushboo Ko Qaid Karna Koi To Seekhe,

Koi Dikhaye Muhabbat K Saraab Mujh Ko,
Meri Nigaahon Se Baat Karna Koi To Seekhe,

Koi To Aaye Nayi Ruton Ka Payam Le Kar,
Andheri Raaton Mein Chand Ban'na Koi To Seekhe,

Koi Payambar Koi Imam E Zamaan Hi Aaye,
Aseer Zehno Mein Soch Bharna Koi To Seekhe.

Abhi Is Taraf Na Nigah Kar

July 01, 2015 Add Comment
Abhi Is Taraf Na Nigah Kar Main Ghazal Ki Palken Sanwar Loon,
Mera Lafz Lafz Ho Aiyna Tujhe Aiyne Mein Utaar Loon,

Main Tamam Din Ka Thaka Hua Tu Tamam Shab Ka Jaga Hua,
Zara Thehar Ja Isi Mor Par Tere Sath Sham Guzar Loon,

Agar Asmaan Ki Numayeshon Mein Mujhe Izn E Qayam Ho,
To Main Motiyon Ki Dukaan Se Teri Baliyaan Tere Haar Loon,

Kahin Aur Baant De Shehar Main Kahin Aur Bahsh De Izaten,
Mere Paas Hai Mera Aaiyna Main Kabhi Na Gard O Gubaar Loon,

Kayi Ajnabi Teri Raah Mein Mere Paas Se Yoon Guzar Gaye,
Jinhe Dekh K Yeh Tarap Hui Tera Naam Le K Pukaar Loon.

Ainaa Ab Juda Nahi Karta

July 01, 2015 Add Comment

Ainaa Ab Juda Nahi Karta,
Qaid Mein Hoon Riha Nahi Karta,

Mustaqil Sabar Mein Hai Koh E Giraan,
Naqsh E Ibrat Sadaa Nahi Karta,

Rang E Mehfil Badalta Rehta Hai,
Rang Koi Wafa Nahi Karta,

Aish E Duniya Ki Justaju Mat Kar,
Yeh Dafeena Mila Nahi Karta,

Ji Mein Aaye Jo Kar Guzarta Hai,
Tu Kisi Ka Kaha Nahi Karta,

Ek Waris Hamesha Hota Hai,
Takht Khali Raha Nahi Karta,

Ehad E Insaf Aa Raha Hai Munir,
Zulm Dayem Hua Nahi Karta.

Yeh Kya Jagah Hai Dosto

July 01, 2015 Add Comment

Yeh Kya Jagah Hai Dosto Yeh Konsa Dayar Hai,
Had E Nigah Tak Jahan Ghubar Hi Ghubar Hai,

Har Ek Jism Rooh K Azaab Se Nidhaal Hai,
Har Ek Aankh Shabnami Har Ek Ankh Figaar Hai,

Humein To Apne Dil Ki Dharkano Pe Bhi Yaqeen Nahi,
Khosha Woh Log Jin Ko Dosron Pe Aitbaar Hai,

Na Jis Ka Naam Hai Koi Na Jis Ki Shakal Hai Koi,
Ek Aisi Sheh Ka Kyun Humein Azzal Se Intezar Hai.