wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Void

profile
Nagma Shaikh
Aug 18, 2017
0 Likes
2 Discussions
478 Reads
I don't wish to die . All I want is to disappear into thin air. I want to become a ghost . I want to run away into the deep forest or go plunge into the sea. There is a storm brewing inside me. I had carelessly and foolishly left the door open, so people came, trampled and walked away. I can't endure more pain, those nightmares haunts me and won't let me sleep .I want to shout till my voice goes away . I want to cry my heart out .Everything needs to be fixed. My face, my body and especially my soul . I am never good enough for anybody .There are faces I don't wish to see , there are places I don't want to go. There are things I don't want to do, they are moments I don't want to breathe. People say time heals everything , but what if time is the only thing you don't have . I am losing out on everything and everyone . I am exhausted. Someone needs to save 'me' . Someone needs to save me from myself .

Comments ()


Sign in

Read Next

Buffer Overflow

Blog banner

A Deep Dive

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Types of email

Blog banner

E-Cash (Electronic Cash)

Blog banner

Online Games

Blog banner

Jio .....A Revolution ?? ??

Blog banner

IP ADDRESS

Blog banner

Blockchain Security Technique

Blog banner

Memory management

Blog banner

Pipedrive

Blog banner

Computer Security

Blog banner

Operating system

Blog banner

Virtual memory

Blog banner

Memory managment

Blog banner

File management

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Privacy LAWs in IT

Blog banner

TEAMWORK

Blog banner

Email Privacy

Blog banner

Internet of Things

Blog banner

Artical on FreshBooks

Blog banner

Artificial Intelligence and I

Blog banner

Starvation

Blog banner

Memory Management

Blog banner

Service Strategy In ITSM

Blog banner

Process states

Blog banner

Introduction to GIS

Blog banner

Multiprocessor and scheduling

Blog banner

5 People who claimed to have Time Traveled

Blog banner

security requirements for safe e-payment

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Memory Management

Blog banner

Computer security techniques

Blog banner

DIGITAL ECONOMY

Blog banner

How I use google in my daily life

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Cloud Computing

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Tiranga - Abbas Haveliwala

Blog banner