Skip to main content

EVERYONE HAS A LIFE STORY

A 24 year old boy seeing out from the train’s window shouted…

“Dad, look the trees are going behind!”

Dad smiled and a young couple sitting nearby, looked at the 24 year old’s childish behavior with pity, suddenly he again exclaimed…

“Dad, look the clouds are running with us!”

The couple couldn’t resist and said to the old man…

“Why don’t you take your son to a good doctor?” The old man smiled and said…“I did and we are just coming from the hospital, my son was blind from birth, he just got his eyes today.”

Every single person on the planet has a story. Don’t judge people before you truly know them. The truth might surprise you.

Comments

Popular posts from this blog

How to find INSPIRATION

Today There are trillions of people in this world, but some people choose the path they can stay on and can change the World . As if Inspiration is concerned Inspiration is everywhere not just Steve Jobs or Bill Gates Inspiration is everywhere... let me explain you with an example: The Inspiration you are finding is not in you role model but actually if you see from my eyes, its every where like; A begger also contains Inspiration Now you will say what Rajkumar is talking about : See if the things begger done was done by you, so you was that begger right ? people will tell you learn from your mistakes,. What I tell you Learn From Others Mistakes...!!

SQL Injections - Rajkumar Samra

  SQL injection is a procedure used to take advantage of client information through site page inputs by infusing SQL orders as proclamations. Fundamentally, these assertions can be utilized to control the application's web worker by vindictive clients.  SQL injection is a code infusion strategy that may obliterate your data set.  SQL injection is one of the most widely recognized web hacking procedures.  SQL injection is the arrangement of malignant code in SQL articulations, through website page input.  Abuse of SQL Injection in Web Applications  Web workers speak with information base workers whenever they need to recover or store client information. SQL articulations by the assailant are planned so they can be executed while the web-worker is getting content from the application server.It compromises the security of a web application.  Illustration of SQL Injection  Assume we have an application dependent on student records. Any stude...

This is a safe space, this person gets me!

Someone who has shown me they were in my corner was my friend who I first is crazy like me; we became friends after recognizing our similar tastes in books, and penchant for morning coffee. We'd eventually come to realize we had more in common than initially thought. I don't know how to explain it fully but when I talked to her, about anything and everything I felt that sense of "this is a safe space, this person gets me".