Originally it contained only four walls without a roof. Centuries later during the time of Kusayi who was the leader of the Tribe of Quraish in Makka a taller building was completed with a roof and a quadrangle wall around it to give it the shape of a sanctuary and doors all around the sanctuary walls.
It is now about 60 feet high, 60 feet wide from east to west and 60 feet from north to south. A door is fixed about 7 feet above ground level facing North East. A Black stone Hajar al Aswad was fixed into its eastern corner. Just outside are the Hills called Safa and Merwa and the distance between the hills is about yards. These days both of the hills are enclosed into the sanctuary walls with a roof over it. The whole building is built of the layers of grey blue stone from the hills surrounding Makka.
The four corners roughly face the four points of the compass. The four walls are covered with a curtain Kiswa. The kiswa is usually of black brocade with the Shahada outlined in the weave of the fabric.
In the Eastern corner about 5 feet above ground the Hajar el Aswad the blackstone is fixed into the wall. Its real nature is difficult to determine, its visible shape is worn smooth by hand touching and kissing. Its diameter is around 12 inches. Opposite the North west wall but not connected with it, is a semicircular wall of white marble. It is 3 feet high and about 5 feet thick. This semicircular space enjoys an especial consideration and pilgrims wait in queue to find a place to pray there.
The graves of Ismael and his mother Hajera are within this semicircular wall. Between the archway and the facade N. Inside it is kept a stone bearing the prints of two human feet. When the Black stone was to be put in its place the Makkans quarreled among themselves as to who should have the honor to place it there. They had just decided that the first comer to the quadrangle should be given the task of deciding as to who should have the honor.
Muhammad S came in and was assigned this task. It will soon host live jazz musicians to perform around the studio, while customers take part in art classes, workouts, and drink coffee.
The multi-sensory experience is further enhanced by the fragrance in each room, utterly transforming the gym aesthetic and the appeal of working out. As Loca Studios celebrated its first anniversary, Al-Turkistani revealed she had plans to open a second branch in Riyadh before expanding throughout the Kingdom. With 2, people currently subscribed on her website, and around customers joining the studio in September alone, Al-Turkistani noted that she was proud of the progressive transformations taking place in Saudi Arabia.
Latching onto the well-being trend, Al-Turkistani plans to open a Loca Academy to train others eager to enter the fitness industry. Twitter: CalineMalek. JEDDAH: The growing popularity of e-commerce, online public services and social media in Saudi Arabia has brought many benefits that can improve the quality of day-to-day life.
However as the amount of personal information and data we share online increases, so does the risk of falling victim to cybercrime. Ignorance of the dangers, or complacency based on an assumption that online spaces are probably safe, can increase the chances of falling victim to scammers.
As a result of this, and the demand for greater online safeguards and services to protect users from the criminals who prey on the unwary, cybersecurity is an expanding field in the Kingdom. Saudi authorities have taken great strides in efforts to protect people online by launching training programs and events such as hackathons, and improving the rules and guidelines for the public and private sectors relating to social media accounts and the cloud, for example.
In March, Minister of Education Hamad Al-Sheikh signed a cooperation agreement with the governor of the National Cybersecurity Authority, Khalid Al-Sabti, to strengthen cooperation in the fields of education, scientific research, training and awareness, as part of the efforts to boost capacity building in the field of cybersecurity.
Previously, in , the ministry and the NCA had signed a cooperation agreement under which the Custodian of the Two Holy Mosques Program for Foreign Scholarships allocated scholarships a year for five years in the field of cybersecurity. Anees added that she is thankful to live in a country with a generous government that offered to sponsor her education and provide support while she studies abroad. Young people do not need to travel abroad to further their knowledge and skills, however.
The Tuwaiq Academy, for example, which was established in , offers bootcamps in the Kingdom that teach 1, young men and women programming and cybersecurity skills, of international standards over the course of four to five months to prepare them for the developing requirements of the Saudi labor market.
It is said to be the largest national initiative of its kind. CyberKids, the Cybersecurity for Children Association, for example, aims to protect children from the predators that might target them while they surf the internet or play online games.
The association said that the courses it provides have benefited more than 16, children. Efforts by the authorities and other organizations to create a safer online environment can only go so far, however, and part of the responsibility ultimately lies with individuals to be aware of the dangers and the steps they can take to reduce the risks. One of the best ways to protect personal information and data is to use strong, unique passwords for every account, and regularly change them.
It is also important to be able to spot suspicious messages and emails, and never to click on any links they contain.
Mohammed Al-Sultan is an ethical hacker who helps the victims of cybercrimes on a pro bono basis, and is part of a team that works to make cyberspace safer. Ethical hackers are skilled technicians who search for vulnerabilities in systems so that they can be fixed. He explained that cybersecurity means information security, and so the goal is to protect information from theft and corruption. He added that ethical hacking is legal, as the aim is to help improve security by highlighting vulnerabilities.
He knows his job based on the internationally accredited training courses he took from CEH, certified ethical hacker, and governmental, educational centers such as Doroob platform and STC. Criminal hackers and fraudsters often use so-called social engineering techniques to deceive and manipulate their victims into revealing confidential or personal information. Perhaps the best-known and most common form of social engineering scam is phishing, in which criminals send out emails that appear to be from reputable sources in an attempt to trick recipients.
For example, an email or message might claim that recipients have won a prize and need to enter their bank account details at a link that is provided. This information can give the fraudsters access to the bank account and allow them to clean it out. Another trick hackers use, Al-Sultan said, is telling you they need you to send them your unique WhatsApp code so that they can add you to a group.
Most of the people who come to Al-Sultan for help have fallen victim to blackmail, he said. This is an area that also concerns the Saudi government, which has launched an anti-extortion website to help victims and catch the perpetrators.
Arab News spoke to some blackmail victims about their experiences. Their names have been withheld to protect their identities. Thank God, he was caught. The Black Stone, an ancient sacred stone, is embedded in the eastern corner of the Kaba, one and a half meters above the ground. The scholars of Islam have differed on who built the Kaba.
Some say that it was built by the angels.
0コメント