Telegram Group & Telegram Channel
[من فروض الكفايات تصنيف كتب العلم لمن منحه الله تعالى فهما واطلاعا.
ولن تزال هذه الأمة مع قِصَرِ أعمارها في ازديادٍ وترق في المواهب، والعلم لا يحلُّ كتمه، فلو تُرك التصنيف لضُيع العلم على الناس وقد قال الله تعالى: {وإذ أخذ الله ميثاق الذين أوتوا الكتاب لتبيننه للناس ولا تكتمونه}، ويقال: إن في التوراة: «عَلِّمْ مجانا كما عُلِّمتَ مجانا»]

بدر الدين الزركشي الشافعي



group-telegram.com/anaskonnash/5788
Create:
Last Update:

[من فروض الكفايات تصنيف كتب العلم لمن منحه الله تعالى فهما واطلاعا.
ولن تزال هذه الأمة مع قِصَرِ أعمارها في ازديادٍ وترق في المواهب، والعلم لا يحلُّ كتمه، فلو تُرك التصنيف لضُيع العلم على الناس وقد قال الله تعالى: {وإذ أخذ الله ميثاق الذين أوتوا الكتاب لتبيننه للناس ولا تكتمونه}، ويقال: إن في التوراة: «عَلِّمْ مجانا كما عُلِّمتَ مجانا»]

بدر الدين الزركشي الشافعي

BY أنَس رُفَيْدَة


Warning: Undefined variable $i in /var/www/group-telegram/post.php on line 260

Share with your friend now:
group-telegram.com/anaskonnash/5788

View MORE
Open in Telegram


Telegram | DID YOU KNOW?

Date: |

DFR Lab sent the image through Microsoft Azure's Face Verification program and found that it was "highly unlikely" that the person in the second photo was the same as the first woman. The fact-checker Logically AI also found the claim to be false. The woman, Olena Kurilo, was also captured in a video after the airstrike and shown to have the injuries. But the Ukraine Crisis Media Center's Tsekhanovska points out that communications are often down in zones most affected by the war, making this sort of cross-referencing a luxury many cannot afford. The gold standard of encryption, known as end-to-end encryption, where only the sender and person who receives the message are able to see it, is available on Telegram only when the Secret Chat function is enabled. Voice and video calls are also completely encrypted. In addition, Telegram's architecture limits the ability to slow the spread of false information: the lack of a central public feed, and the fact that comments are easily disabled in channels, reduce the space for public pushback. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from hk


Telegram أنَس رُفَيْدَة
FROM American