Thursday, August 14, 2008

Extremism is in Lenience Just as it is in Harshness



- Shaykh Saalih ibn Fowzaan al-Fowzaan

Reference:

http://www.alfawzan.ws/AlFawzan/MyArchive/tabid/89/Default.aspx?new_id=117

Category:
Methodology

Al Hamdulilaah wa ba'd:

There have been increasingly numerous campaigns and refutatieons against extremism in religion lately, and they are with just right, because extremism in religion has been forbidden in the Book, the Sunnah and with the consensus of the scholars. Allaah Ta'aala stated:

{Say: "O people of the Scripture (Jews and Christians)! Exceed not the limits in your religion (by believing in something) other than the truth} Al Maa-idah: 77

In another Ayah:

{O people of the Scripture (Christians)! Do not exceed the limits in your religion, nor say of Allaah aught but the truth}

The Prophet - صلى الله عليه وسلم - said:

"Beware of extremism, for indeed the only thing that has destroyed those who came before you is extremism."

Extremism in religion is to exceed the limits of its legislated boundaries. It could be in worship, such as the three men, one of whom said: 'I will stand the whole night in prayer and not sleep.' The second said: 'I will fast continuously not missing one day without fasting.' The third said: 'I will not marry.'

Extremism can also be in rulings; such as making something that is recommended an obligation, or being extreme in the ruling of one who practices a major sin that is less than polytheism by declaring him to be a disbeliever who has left the fold of Islaam.

Extremism can be in ordering the good and forbidding the evil, such as the extremism practiced by the Mu'tazillah in the form of revolting against the rulers with the excuse of ordering good and forbidding evil as justification.

Extremism is also in declaring something permissible to be impermissible, or declaring something impermissible to be permissible.

Extremism in religion in all its forms is prohibited, it may cause the individual to exit the fold of Islaam or cause destruction, as it destroyed those who came before us, and no person who has been given understanding and foresight by Allaah in rulings and in placing things in the rightful place can doubt this.

However, there are people whose state is the exact opposite of the extremism of exceeding the limits in the religion, there are those who went to extremes in lenience and indulgence. There is no doubt that our religion is the religion of lenience, ease and justness, but this lenience must be within the legislated boundary, by acting upon the legislated permits when needed, and all the religion, and to Allaah belongs all praise, is free of hardship and restrictions.

{Allaah burdens not a person beyond his scope.} Al Baqarah: 286

{And [Allaah] has not laid upon you in religion any hardship} Al Hajj: 78

{Allaah does not want to place you in difficulty} Al Maa-idah: 6

Extremism in leniency is by overstepping the boundaries that Allaah has set, and this is not called lenience, rather this is hardship itself. Nullifying al Walaa and al Baraa in Islaam, equating the believers with the disbelievers with the justification of tolerance, invalidating the implementation of the nullifiers of one's Islaam upon those who have nullified all or some of them, equating religions such as equating Islaam to Judaism or Christianity, rather equating Islaam with all religions including paganism and atheism, claiming that 'there is no diety worthy of worship other than Allaah' does not necessitate the disbelief in Tahqhoot and does not negate false religions other than Islaam - as some columnists have written in some of our local newspapers. All of these are examples of extremism in negligence and indulgence. It is an obligation to refute it, just as it is an obligation to refute the extremism of exceeding the limits in the religion. Rather, extremism in negligence and indulgence is more dangerous than the extremism of exceeding the limits in the religion, because this type of extremism reaches the point of equating the religions of the disbelievers with the religion of truth, and this is a form of disbelief by the consensus of the scholars, in contrast to the extremism of exceeding the limits, as a lot of the scholars consider it to be misguidance but does not reach the level of disbelief.

The scholars mentioned that from amongst the nullifiers of a person's Islaam, is not declaring disbelievers to be disbelievers or having doubt in that.

Those who made these grave errors must examine their own state and return to the truth, for indeed returning to the truth is a virtue, and returning to the truth is better than remaining upon falsehood.

May Allaah grant everyone success in attaining beneficial knowledge, righteous actions, and may the Salaat and Salaam be upon our prophet Muhammad, his family and companions.

Translator:Nadir Ahmad, Abu Abdul-Waahid

Date Published:Thursday, 24 July 2008

Wednesday, August 13, 2008

The Ruling Concerning Celebrating Specific Occasions, such as the Two Eids, The Night of Isra and the Middle of the Month of Shaban.

Question:

We have some practices that we have become accustomed to and have inherited concerning some special occasions for example, making cakes and biscuits on the day of Eid al-Fitr. We also prepare meat and fruit for the night of the 27th of Rajab and the night of 15th Shaban. Furthermore, there is a specific type of sweet that we must prepare during the day of Ashura. What is the ruling of the Islamic Law concerning these things?
Answer:

As far as displaying pleasure and happiness during the days of Eid al-Fitr and Eid al- Adha, there is no harm in that as long as it is within the limits of the Shariah. That would include people preparing food, drink and so forth. It has been confirmed that the Prophet (sallallaahu ‘alaihi-wasallam) said,

'' The Days of Tashreeq are days of eating and drinking and remembrance of Allah.” [1]

The Days of Tashreeq are the three days following the Day of Eid al- Adha in which the people slaughter their sacrifices, eat from that meat and enjoy the bounties Allah has bestowed upon them. Similarly, during Eid al- Fitr there is no harm in showing one’s pleasure and happiness as long as that does not go beyond the limits of the Shariah.

As for the merriment on the night of the 27th Rajab, the night of the 15th Shaban or during the Day of Ashura, such practices have no source for them whatsoever. Indeed, they are prohibited. No Muslim should attend such celebrations if he is invited to such gatherings. The Prophet (sallallaahu ‘alaihi-wasallam) said,

'' Stay away from innovated matters. Verily every innovated matter is heresy. And every heresy is straying [from the Straight Path] .” [2]

As for the night of 17th Rajab, some people claim that it is the night of the Miraj in which the Prophet (sallallaahu ‘alaihi-wasallam) ascended into heaven to Allah. However, historically speaking, that is not confirmed. Everything that is not confirmed is false. Even if, hypothetically speaking, that was the night of that event, it is not allowed for us to introduce any new practices with respect to celebrations or acts of worship on that day, since such were not done by the Prophet (sallallaahu ‘alaihi-wasallam). Infact, such is not confirmed from the Companions who were the people who followed the sunnah and the Law of the Prophet (sallallaahu ‘alaihi-wasallam) most closely and enthusiastically. How is it permissible for us to invent something new that was not practiced during the time of the Messenger of Allah (sallallaahu ‘alaihi-wasallam) nor during the time of the Companions?

Even for the 15th of Shaban, there is nothing confirmed from the Messenger (sallallaahu ‘alaihi-wasallam) about venerating that day or praying during its night. Some of the Followers [3] used to spend its night in prayer and remembrance of Allah, and not in eating, celebrating or taking it as a holiday.

As for the day of Ashura, the Prophet (sallallaahu ‘alaihi-wasallam) was asked about fasting on that day and he said,

'' It is expiation for the previous year .”

Therefore, it is not allowed to display any form of celebration or grieving on that day as such a display of celebration or grieving goes against the sunnah. The only thing that is narrated from the Prophet (sallallaahu ‘alaihi-wasallam) is that one should fast that day , although he also ordered that a person should fast the day prior or the day after Ashurah in order to be different from the Jews who simply fast on that day alone.

________________________

[1] Recorded by Muslim .

[2] Recorded by Abu Dawud and Ahmed. Muslim also has something very similar.

[3] This is reference to the generation that followed that of the Companions.

Shaykh Muhammad bin Saalih al-`Uthaymeen
Islamic Fatawa Regarding Women - Darussalam Pg.50-52
http://www.fatwaislam.com

Tuesday, August 12, 2008

UK National Conference 2008

Misconception: That the following Credit Information only applies to People who use Credit Cards

The Basics

Your 5-minute guide to protecting your identity

Here are 20 steps to protect yourself from identity theft -- and seven ways to clean up things if you become a victim.
By MSN Money staff

Thieves may sell your information on the black market or use it to obtain money, credit or even expensive medical procedures. Unless you're vigilant in protecting your records, you'll have to work even harder to repair the damage to your credit. The average victim spends 30 to 40 hours rectifying the problem.

Some of the e-threats to your identity are:

Phishing.

You get an e-mail that appears to be from your bank or an online service, most often PayPal or eBay, instructing you to click on a link and provide information to verify your account.

Pharming or spoofing.

Hackers redirect a legitimate Web site's traffic to an impostor site, where you'll be asked to provide confidential information.

Smishing.

This is phishing done with text messaging on your smart phone. It instructs you to visit a bogus Web site.


Spyware.

You've unknowingly downloaded illicit software when you've opened an attachment, clicked on a pop-up or downloaded a song or a game. Criminals can use spyware to record your keystrokes and obtain credit card numbers, bank-account information and passwords when you make purchases or conduct other business online. They also can access confidential information on your hard drive.


You don't need to have a computer to become a victim.

Vishing -- voice phishing.

You get an automated phone message asking you to call your bank or credit card company. Even your caller ID is fooled. You call the number and are asked to punch in your account number, PIN or other personal information. (See "Your phone may be under attack.")
Bank-card "skimming." Crooks use a combination of a fake ATM slot and cameras to record your account information and PIN when you use a cash machine. Your credit or debit card also can be skimmed by a dishonest store or restaurant worker armed with a portable card reader. (See "
Is your waiter a thief?")

Crooks will steal your wallet or go through your mail or trash.

More than half of identity theft cases involve credit card fraud. Checking accounts are the second most popular target. But some crooks have other plans:

At least 250,000 people have been the victim of medical identity theft in the last several years. (See "Diagnosis: Identity theft.") Crooks use fraudulently obtained personal information to get expensive medical procedures or dupe insurance companies into paying for procedures that were not done.

The victims of about 5% of reported identity theft cases are children. The fraud often goes
undetected for years -- until the young adult applies for credit. (See "Stolen innocence: Child identity theft.")

20 tips to protect yourself You can take steps to protect yourself from identity fraud:
Keep your confidential information private. Your bank or credit card company won't call or e-mail to ask for your account information. They already have it.

Keep an inventory of everything in your wallet and your PDA, including account numbers. Don't keep your Social Security card or any card with your Social Security number, such as an insurance card, in your wallet.

Stop getting banking and credit card information in the mail. (See "Go paperless for safer banking.")

Monitor your bank and credit card transactions for unauthorized use. Crooks with your account numbers usually start small to see if you'll notice.

Keep your vehicle registration and insurance forms in a sealed envelope in your glove box and lock it and your car when at home or away.

If you conduct business online, use your own computer. A public computer is less secure, as is wireless Internet.

Look for suspicious devices and don't let anyone stand nearby when you use an ATM. Take your card and receipt with you. Keep your PIN in your head, not in your wallet.

Don't store credit card numbers and other financial information on your cell phone. (See "Is your cell phone spilling your secrets?")

If you're job hunting using resume Web sites, don't apply unless the employer has a verifiable address.

Protect your computer from vulnerability:
Keep system and browser software up to date and set to the highest security level you can tolerate. Install anti-virus, anti-spyware and firewall protection, and keep them up to date as well. When possible use hardware firewalls, often available through your broadband connection router.

If you use wireless Internet access, make sure that you get help from someone who understands wireless security when you set up your access point or router.

Back up your data and store it way from your computer.

Don't open e-mails from strangers. Malware can be hidden in embedded attachments and graphics files.

Don't open attachments unless you know who sent them and what they contain. Never open executable attachments. Configure Windows so that the file extensions of known file types are not hidden.

Don't click on pop-ups. Configure Windows or your Web browser to block them.

Don't provide your credit card number online unless you are making a purchase from a Web site you trust. Reputable sites will always direct you to a secure page with an URL starting with https:// whenever you actually make purchases or are asked to provide confidential information.

Use strong passwords: at least six characters, including at least one symbol and number, and no reference to your name or other personal information. Use a different password for every site that requires one, and change passwords regularly.

Never send a user name, password or other confidential information via e-mail.
Consider turning off your computer when you're not using it or at least putting it in standby mode.

Don't keep passwords, tax returns or other financial information on your hard drive.
7 steps to clean up the mess If you suspect your identity may be compromised, place a fraud alert with the three credit bureaus. When you place an alert, you are entitled to a free copy of your credit report. After that, take advantage of the free annual reports the bureaus are required to give all consumers. Stagger your requests so that you get a report every four months.

If you've been phished, contact the bank or company named in the fraudulent e-mail. You also may want to notify the Internet Crime Complaint Center and forward the e-mail to spam@uce.gov.

If you are the victim of identity theft, take the following steps:

Make an identity-theft report to the police and get a copy. File a complaint with the Federal Trade Commission. Also, contact the office of your state's attorney general; you may be able to file a report there.

Close accounts that have been tampered with. Contact each company by phone and again by certified letter. Make sure the company notifies you in writing that the disputed charges have been erased. Document each conversation and keep all records.

Place a seven-year fraud alert or a "freeze" on your credit reports. (See "Lock your credit away from ID thieves.")

Begin the process of having the fraudulent information removed from your credit reports. (See "Don't let credit-report errors fester.")

Consider purchasing identity theft insurance. It cannot protect you from becoming a victim of identity theft, but it can help you pay the cost of reclaiming your financial identity.

Find victim support at the Identity Theft Resource Center.

Monday, August 11, 2008

Women Wearing Kohl
Question:

(***) asks from Cairo - Egypt: the beautification of the woman by putting kohl in her eyes;is it allowed?
Answer:

"It is permissible for the woman to wear kohl in her eyes infront of the women and her husband or mahaarim. As for infront of the foreign man (al-ajnabee),it is not permissible for her to uncover her face and neither her kohled eyes, due to his statement the glorified:
'And when you ask(his wives)for anything you want,ask them from behind a screen, that is purer for your hearts and for their hearts'

(Surah Al-ahzaab:53)

So there is no harm in her wearing the face veil in which her two eyes or one of them are apparent, but without applying kohl, infont of the ajnabee. And what is intended by the ajnabee is, whoever is not a mahram of the woman like her husband's brother, or her husband's paternal uncle, or the son of her paternal uncle (cousin), or other than them,regardless of whether they are Muslim or kuffaar."


Shaykh `Abdul-`Azeez Bin Baz

Translated by Umm Mujaahid Naheeda bint Abdul Khaaliq bin Muhammad Faadil

http://www.binbaz.org.sa/mat/2211


Credit: Fatwa Islam

NATIONAL ISLAAMIC CONFERENCE 2008 SALAFI PUBLICATONS - UK

Sunday, August 10, 2008

New Class from Maasjid Al Faarooq Effective August 17, 2008 "Forty Hadith Nawawi"








MAASJID AL FAAROOQ ANNOUNCES CLASSES AFTER ASR SALAT EACH SUNDAY beginning next Sunday 17 August 2008

IN SHAA ALLAAH IN THEIR PALTALK ROOM

"MAASJID AL FAAROOQ LIVE NYC"

(approximately 5:00 PM EST, 10:00 PM GMT)

PRESENTED BY BROTHER ABU YUSUF KHALEEFAH : "forty nawawi hadeeth"

SALAFI PUBLICATIONS LIVE PALTALK ROOM CLASS ANNOUNCEMENT



SALAFI PUBLICATIONS LIVE" PALTALK ROOM ANNOUNCEMENT



Masjid as-Salafi UK: The lessons will begin 19:15 UK TIME with 'Usool us-Sunnah' Of Imaam Ahmad, followed by 'al-Aqeedatul Waasitiyyaah' EVERY DAY, excluding Wednesday, insha'Allah - for more information please visit www.salafitalk.net (Salafi Talk down temporarily due to high usage, they are adjusting settings with ISP and will be back soon (2:15PM EST, 11:15PM PST)
updated note from Salafi Publications 11 august 08;

Usoolus-Sunnah and Aqeedatul-Waasitiyyah will continue throughout the week & commences at 19:15 Uk Time accept Wednesday. Friday maybe subject to change due the conference commencing then insha Allaah.

Sisters Upon Al-Istiqaamah

Muslim Women's status In Islâm | Shaykh Ibn Bâz (Rahimahullâh) credit: easyonetwothree youtube

Da'waah Section

Da'waah Section
Click BANNER ABOVE to Hear Call to Prayer from Makkah

COVERED GEMS WEEKLY TUES CLASSES ON PALTALK!

COVERED GEMS WEEKLY TUES CLASSES ON PALTALK!
Br. Abu Yusuf Khaleefah-Instructor & Other Speakers 7PM EST

Salaf.Com | Articles

Highlighted Sisters Blogs

Recommended General Blogs

eSnips.com: Writings of the Ulamaa and Students of Ilm

TawhidFirst.Com | Latest News | Basics

Junnah's Site

HealthyMuslim.Com | Latest News | Nutrition