Connect with us


Grief in Kasur as residents mourn murder of minor rape victim



KASUR: Grief and shock were evident on the faces of residents of Punjab’s Kasur city as they tried desperately to come to grips with coldblooded murder of 7-year-old Zainab after being sexually assaulted for second day on Thursday. 

Zainab’s body was found dumped in a garbage heap near Kashmir Chowk in Kasur on Tuesday. In light of initial postmortem, it was said the minor has been sexually assaulted multiple times before her murder.

The minor was a resident of Road Kot area of Kasur and was abducted on January 5 (Friday) while she was on her way to tuition centre.

The incident which shook the whole country and made headlines around the world was widely condemned and calls for justice echoed on social media and other platforms.

Tensions persist in Kasur for second day

Protests in the Kasur soon erupted after Zainab’s body was recovered from a garbage heap on Tuesday, which are still ongoing.

The residents are protesting at Kali Pul Chowk, whereas the city’s main artery has been blocked for commuters. Markets and shops are also closed in protest against the heart-wrenching incident.

The Punjab Bar Council also announced a complete boycott of courts today and lawyers have demanded immediate arrest of the killer(s).

The protests claimed two lives when police resorted to firing in a bid to stop the protesters from surrounding the District Police Officer (DPO) and District Coordination Officer (DCO) offices.

They were identified as Shoaib and Mohammad Ali. Their funeral prayers were offered on Thursday amid presence of large number of people including social and political activists.

The post-mortem of slain protesters is expected to be released later today.

Keeping the tense situation in view, the authorities have called in additional police contingents to control the law and order situation on Thursday.

FIRs lodged against policemen

Two FIRs have been registered against 16 ‘unidentified’ policemen on the complaints of the slain protesters’ relatives. The FIRs have been registered under murder charges.

To diffuse mounting pressure, authorities also claimed to have arrested two policemen for resorting to firing to disperse the protesters.

Punjab govt announces Rs1 million reward for info on suspect

Punjab Chief Minister Shehbaz Sharif on Thursday announced Rs10 million reward for any information about the identity of the culprit.

The chief minister also announced Rs3 million for heirs of the slain protesters, who were killed in police action on Wednesday.

25 years old. I help entrepreneurs become go-to in their industry. And, I like helping the next one in line. You can follow my journey on my blog, strongarticle blog

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


123Movies Streams High Quality Movies



Try out a few suggestions to find the audio and video of your internet movie synced so which you can finish watching the movie. As soon as you get started watching movies on 123movies, you won’t ever get bored again. Scan TV listings for movies that you wish to see. It’s like 123 movies which collects links from different media sources that have the highest quality of movies. Inside this site, movies from various languages are readily available. Immediately the movie will begin playing without you needing to select a host! Press Esc” if you’re watching an internet movie in full screen mode to go back to small screen viewing.

Examine the DVD cover for virtually any film you wish to watch. Decide if you want to find movies since they were originally filmed or in the event you would rather fill your complete screen with the image. As you can decide to stream movies on them, it’s important to remember it is piracy. After you’re ready to stream movies, you’re shown a log check error’. It is possible to watch all the most recent movies in the best prints. Several of the featured movies on this website are recent releases.

On occasion a website can provide a lot, but it could also trip up its users because of its complicated and messy nature. This site permits you to watch together with download movies. This site offers you the experience of watching new releases and movies each week. An individual must try out this website and take pleasure in their favourite movies here. This website has the maximum rating as it’s simple to use. 123movies site is helpful for watching full or lengthy movies online if you’ve got a fantastic and dependable connection. It is among the best sites like 123movies.

A weak wireless signal can increase the issue. Although you don’t have to do anything difficult in the means of setting this up and twinning it with devices, follow the directions you’re given on the monitor. It has quite a great user interface which makes searching very effortless. Quality 123Movies Streams High Quality Movies and TV shows you may easily watch from your browser. Thus, this 123movies app is beneficial for those that are fond of watching movies. 123movies iOS app is easily downloaded and installed. For the casting of music, you’ve got to tell the Chromecast App which sort of media you wish to stream and permit apps such as Google Play access to streaming onto your TV.

The great thing about the YouTube extension is it permits you to queue videos, so you may set up an entire evening’s entertainment. It is by far the most appropriate apk file that supports all of the movie freaks and may also be used for watching TV shows online. Accordingly, using the 123movies downloader, you may download the videos in the ideal format and at times literally thousands of them and can receive the best relaxation despite the place and the situation you’re in.

Continue Reading


News of Top Movies The Conspiracy



Movies are nothing under a magic show unfolding on the 70 millimeter screen. Today there’s a modern means to watch movies and that’s through our computer and internet. Likewise the movie continues. Because of the plot, beautiful actors and actresses, music theme, and so forth, Asian movies are becoming increasingly more popular for fans all around the world, especially Asian fans. With the access to online movies it’s now possible that you watch old movies anytime you desire. Therefore, female-centered action movies have got a whole lot of profit and audiences.

Lies You’ve Been Told About News of Top Movies.

When you aren’t having sex, you’re much more advisable to continue to keep your sexual energy and utilize it to move you forward in different fields of your life. Porn conditions you to live with sex for a fantasy rather than sex for a reality. After you are really connected to a woman and it feels like the both of you are alone on earth, a sexual relationship will develop alone, and you won’t need to force it. However you consider it, women are the individuals who decide who they let inside. Most men will appear at a popular girl and wish they’d be worthy enough to be with this kind of amazing woman. To compensate for a deficiency of succeeding, many men learn and utilize pick-up practices.

You may have many health issues like stomach pain, heartburn and constipation or any of the above mentioned problems for which you might want to refer to a gastroenterologist. While it can’t be used for in-depth articles, simple reports which do not need much analysis can be readily prepared by AI. There are lots of books and tapes on the myriad forms of meditation that will be easily learned and practiced daily to lessen stress and to set you in touch with your higher self,” which is completely calm and knows what is ideal for you. Although many of such stories couldn’t go alongside happy endings, they continue to be romance ones. The most important story is that of a tiny girl we first see riding a small bicycle around a place near her residence. Stories of ghosts and their misdeeds have existed since the outset of time. Well, then you can readily and indirectly indicate that idea by deciding upon a fmovies to watch together that has that idea going on in the storyline.

With the expanding popularity of internet and its accessibility from any component of the planet, finding out the top best in any field is currently sought as the very best option by many to figure out the very best in the field of interest to begin the things of. It’s about the most wanted veterans that are perceived dead and need to conserve the world as fugitives. My life is entirely different from a couple of years ago.

The Rise of News of Top Movies.

Movie business is getting increasingly more developed with several history-making movies. The dearth of very good sex education and the presence of sexual taboos combine to ensure it is tricky to speak honestly about sex. For another women and men then again it’ll be seriously challenging seeing they’re so a lot interested in making funds they overlook that in case they destroy our house there won’t be place in which they will most likely be generating that dollars.

Continue Reading


Security Made Simple with the New 8th Gen Intel Core Processor



I hope you’ll share my enthusiasm for the exceptional1 performance of computers with 8th Gen Intel® Core™ processors. The excitement of a new PC still never fades with me – and the enhanced entertainment and productivity capabilities with the 8th Gen Intel Core processors are just stunning.  However, there’s another vector of computing that carries increasing meaning to buyers of all types – and that is security.  You have seen and you will continue to see Intel deliver security innovation, built in, and never more so than with this platform announcement2.

Security Made Simple

The connected world offers terrific online benefits and value, but you need security that’s simple and easy to use. Browsing and shopping online require security precautions. The good news is that new computers with 8th Gen Intel Core processors build security into your online life — without extra hassle. The 8th Gen Intel Core processor delivers built-in security2 for a layer of protection that makes logins, browsing, and online payments safer2 and simpler than ever before.

8th Gen Intel Core processor brings new innovation to help protect your daily digital activities. For example, you can securely store your personal data and auto-fill information using one master password using free password managers from Dashlane1Password, and Sticky Password, and your master password is protected by Intel® Software Guard Extensions (Intel® SGX).

You can also be rest-assured with an automatic layer of protection built in to your new computer’s hardware powered by Intel® Online Connect. Built-in second factor authentication will help keep your information safer without slowing you down—and even better, it works on any FIDO-compliant website such as GoogleFacebookDropboxDuoDashlane, or Digidentity.

While shopping with your new 8th Gen computer, convenient built-in fingerprint recognition lowers your risk of credit card theft— online shopping with a swipe of a finger will give you a quick1, secure checkout using payment providers such as PayPal and China UnionPay. You’ll have peace of mind knowing you’re protected without the extra hassle.

How Intel Delivers Built-In Security

The traditional model of “software protecting software” no longer protects us against modern threats. Intel’s hardware-based approach establishes the root of trust to better secure every layer of the compute stack (hardware, BIOS, firmware, operating systems, applications, networks, and the cloud).

To protect against modern and evolving attacks, Intel drives consistent capabilities across our products for integrity, reliability, and recoverability. These include secure boothardware and software IDIntel® Rapid Storage Technology, and a trusted execution environment. Intel helps to simplify security for tens of thousands of hardware, software, and service providers, as well as billions of end users. Our unique position in the ecosystem, designing and protecting the hardware root of trust, benefits consumers and businesses end-to-end, as they connect their smart devices from the edge to the cloud.

Hardware, software, and service providers use Intel® hardware-enabled security capabilities together with Intel® software solutions, toolkits, and libraries to mitigate cybersecurity risks, reduce total cost of ownership (TCO), and improve overall productivity/usability. We align Intel software and hardware priorities to drive complete, usable, and highly effective solutions for users, whether delivered through partners or from Intel directly.  Our objective is to dramatically improve protection by coupling the flexibility of software with the power of silicon in ways that only Intel can.

Now you can see why I’m so enthusiastic about the exceptional performance and built-in security of new computers with 8th Gen Intel Core processors. Intel hardware-based security coupled with the best software is the right choice for today’s security demands. Just imagine what the future holds – Intel will continue to push the boundaries of cyber security protection in ways that other companies simply cannot.

Click the link to learn more about how Intel® hardware-enabled security unleashes the power of silicon and the power of the ecosystem to protect our digital world.


#  #  #


*Intel, the logo, and Core are trademarks or registered trademarks of Intel Corporation.  Other names may be claimed as property by others.2 Intel® technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer or retailer.

1 Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information, go to

Intel® technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer or retailer.

Continue Reading