Skip to main content

नेपाली गजल

मुक्तक

तिमी विना बाँच्ने , सहर नैलो थियो
पीडा लुकाइ हाँस्ने, रहर नैलो थियो !१!

एकै पटक उफ्रिएर गगन चुम्न खोजेँ,
त्यसैले चोट खाने, प्रहर नौलो थियो!२!

@ केवल भण्डारी 
    पोखरा नेपाल

______________________________________________________________

** सुकेको आशा **

आफ्नो मान्छे रिसाउदा दिल दुखेकै हुन्छ,
बर्सिन्थे भेल परेलिमा माया लुकेकै हुन्छ !!

लाग्दो हो जितेर गइ उ अनि हारेको म ,
गल्ती गर्दा हरकोहि थोरै चुकेकै हुन्छ !!

सिउदोमा सिन्दुरको अर्थ नबुझ्ने तिमी,
बिच बाटोमा कसैले देख्दा थुकेकै हुन्छ !!

मरभुमिमा फूल उमार्छु भन्नू भूल भयो,
जति हालेपनी पानी पात सुकेकै हुन्छ !!

@ केवल भण्डारी 
    पोखरा नेपाल
______________________________________________________________

** जरुरी थिएन **

सम्बन्धको गहिराई नाप्न जरुरी थिएन,
म जल्दै मा आगो ताप्न जरुरी थिएन !१!

आँसु सुकेर जन्मेको हो नुनिलो मरभुमी,
मायाको थोरै भिक थाप्न जरुरी थिएन !२!

ढुंङ्गामा दक्षिणा चडाएको हुँ सपना बेचेर,
दैवले सुनेन लाग्यो अलाप्न जरुरी थिएन !३!

सपनाहरू दैनिक बलि चड्दैछन शहरमा,
यसैमा पीडा निम्ति सराप्न जरुरी थिएन !४!

नजर पुगेकै ठाउँमा फुल्छन तिम्रा तस्बिर,
अचेल लाग्छ आँखामा छाप्न जरुरी थिएन !५!

@ केवल भण्डारी 
    पोखरा नेपाल

______________________________________________________________

** समय **

बोझ धान्न सक्ने, छाती भएनन्
निराशाहरु चिर्ने, साथि भएनन् !१!

सपनाहरु बेवारिसे भएकाछन,
आँसु सहि ठाउँमा, लगानी भएनन् !२!

अतितमा आँसु तैरियो रंग छुटिए,
तैपनी आँसु कहिल्यै, पानी भएनन् !३!

उन्ले सबैलाई कोखमा बोकेकी हुन,
आमा बोक्ने सन्तान, बाँकी भएनन् !४!

कतै एक्लोपन र भारी बिसाउनु छ,
साथ दिन्छु भन्ने आज, राजी भएनन् !५!

चोट खाएको प्रमाण म आफौं हुँ,
देख्ने समयहरु, सांची भएनन् !६!

©केवल भण्डारी 
  पोखरा, नेपाल

Comments

Popular posts from this blog

Are you Hacked ? A Cozy Guide to Online Security - Must Know

Imagine your online life like a cozy house you’ve built on the internet. You store personal items (emails, photos, bank details) inside it, invite friends and family to visit (social media), and even shop for new items right from your living room (e-commerce). The problem? Hackers are lurking around, trying to sneak in when you’re not looking! Just like you’d lock your front door and install a security camera, you can take simple steps to protect your digital home. In this blog, we’ll walk through some friendly, easy-to-understand methods to keep hackers at bay.  Let’s get started! 1. Check If Your Information Is Out There What This Means Have you ever wondered if someone has your password? Or if your email was part of a major data breach? Tools like Have I Been Pwned , Pentester   can instantly check if your email address or password has been leaked during a hack. Why It’s Important If your credentials are floating around the internet, you’ll want to change those passwords im...

Quantum Computing Trends - 2023

 Introduction Quantum computing stands on the brink of a revolution. This emerging technology, harnessing the principles of quantum mechanics, promises to transform computation by performing complex tasks much faster than current classical computers. In 2023, we witness quantum computing evolving from theoretical constructs to practical, scalable technologies with broad applications in various sectors. Background Study The study of quantum computing has been marked by significant milestones. Initially dominated by theoretical studies and small-scale experimental setups, the field has seen rapid advancements in hardware, software, and algorithm development. Major tech companies and research institutions have been key players in driving these innovations, leading to an increasingly diverse and competitive landscape. Current State and Trends in Quantum Computing IBM's Pioneering Efforts: IBM has been instrumental in advancing superconducting qubits technology. After unveiling a 127-qu...

Android vs iPhone Security: Why No System is 100% Secure

When I went to the CYBERUS Spring School in early April 2025 (April 7–11, 2025, at Université Bretagne Sud in Lorient, France), one of the topics we talked about was the age old query: Which phone is safer, the  iPhone or the  Android ? The conversations were instructive to me as a security enthusiast. We discussed technical ideas like mobile app sandboxing and even how two apps from the same developer could access data in spite of platform security measures. The discussions underlined an important realization I've had over the years: while IOS and Android both have robust security mechanisms, neither is completely impenetrable. In this essay, I'll provide a professional (but hopefully easy-to-read) analysis of Android vs iPhone security, interspersed with my own viewpoints, demonstrating why no system can claim perfect security. Security by Design: IOS and Android Approaches Apple's IOS and Google's Android have fundamentally different approa...