Heave a Sigh of Relief! There won’t be Any Internet Shutdowns in Udaipur for Govt. Exams

Internet shutdowns have become a weekend affair for all the Udaipurites as every now and then it takes place in the city and the reason is the same ‘To stop students from cheating in the government exams’. It doesn’t just frustrates the citizens but affects several aspects in the city including IT companies, digital platforms, online banking, online booking, education sectors, the stock market, and the list is endless.

Well, if you are the one who thinks the same, then it’s a good news for you. According to a letter issued by the Rajasthan Government, it has been clearly instructed to the authorities of the city that they cannot suspend internet services of the district to prevent cheating at the Government exams getting conducted in the city.


Now, all the citizens can heave a sigh of relief for those internet-less days are gone now. At the end of the day, our authorities have finally taken a smart decision for our smart city and it won’t face any internet shutdowns now, not for a government exam at least.

If you have any feedback regarding the article or have an interesting story to share with us then write to me at


Another Internet Shutdown in Smart City Udaipur

In the book of internet shutdowns 2018 of Udaipur, another internet shutdown is going to take place tomorrow i.e. 7th October 2018. The time for the same is 9 am to 5 pm. The order was released by the office of the divisional commissioner on 5th October 2018.

You ask why? This time the reason for the shutdown is Deputy Inspector General of Police Recruitment examination 2018 which will be conducted on Sunday. Like always, the decision has been taken in order to prevent the leakage of the examination papers and mass copying during the examination. And so, the most convenient option from the administration’s end was to shut down the internet.

However, some questions that raise in every commoner’s mind is that ‘Is this the most effective solution to control cheating during the examination? Is there completely no alternate for the same? Before taking such measures, does the amount of loss faced by the citizens ever cross the administration’s mind? Is it necessary to ban the internet of the entire district rather than putting jammers on the examination spots?’

Picture by: Fouzia Mirza

A thing to note:

Within a period of 3 months, the city has faced internet shutdowns for 4 days. It seems like the city is facing internet bans at a frequency at which it faced power cuts earlier. At such rate, more shutdowns like such can be expected in the upcoming month.

During the period of this internet ban, the lease line services will remain unaffected.

Do you have a feedback regarding the article? Share with us in the comment section below or write to me at


Can’t Imagine Life Without Internet? See What Udaipur’s 90’s Kids Did!

Today everything is dominated by the virtual world. Everyone hangs out on social media, make new friends on Facebook, and update pictures on Instagram and so on. Even the busiest person would take out time to post their Facebook check-in. While today’s kids are growing up within the confinement of the Internet, we, the 90s kids were roaming around in our neighborhood, hanging out with our mum and dad or probably at our friend’s place.

I am sure nostalgia will be hitting hard after this!!!

Attending Birthday Parties At Home

The definition of a friend was ‘who invited us to their birthday party’. Birthday parties were then celebrated at home, and served was some finger-licking home cooked food. Don’t we miss it sometimes? The trend is quite lost with time.

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
A glimpse of what it looked like.
Source: TradeKeyIndia

Going to the Neighbor’s House to Play

Either daily in the evening or in the summer vacation during the daytime. So many memories of playing in the houses of friends are stacked up in our minds.

Went To Play Around In the Nearest Park

What was life if not running around in the park and playing some random games like ‘pakadni’!?


‘Jhule’ was the favorite thing in those days and I was certainly a lover of swings. Weren’t you all?

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
An emptied, rusting swing…
Source: Fiveprime

Hanging out with family

Hanging out with family was a frequent sight, unlike today. There were a lot of places frequently visited with my friends and family and these places were nothing less than paradise.

Saheliyo Ki Baadi

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
Source: wikimedia

The beautiful Saheliyo Ki Baadi was one big thing for the 90s kid! On special occasions like distant relatives visiting us, called for a quick visit to Saheliyo Ki Baadi. Can you remember when the last time you went to Saheliyo-ki-Baadi was?

Nehru Garden

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
Source: Rugged Anay

I bet a lot of children haven’t been to Nehru Garden. This is an exotic landmark for our City of Lakes. When we were kids, it was one fantasy place for us- something which is floating over the water of the Lake Fateh Sagar.

Musical Fountain of Deen Dayal Park

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
Source: TripAdvisor

Because of lack of preservation and promotion, this park is sadly visited by none today. The maximum you see is tourists coming there to get into the ropeway for the sunset point at Karni Mata.

Gulab Bagh Zoo

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
A place where we loved to go.
Source: Flickr

I would fall short of words to describe the excitement that my mind was filled with when we planned to visit the Gulab Bagh Zoo. It was and is the only zoo in the city, but quite sadly is in its ruined state. A whole day-out used to be planned, and the toy train added more fantasy quotient to the entire day.

Sukhadia Circle

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
Source: Holiday Plans

What would you do if you didn’t buy a balloon from the ‘balloon wale bhaiyya’ at Sukhadia Circle? ‘Chana-Chor-Garam’ and all the ice creams of the world, not forgetting to mention the paddle boat!

Moti Magri, Guru Govind Singh Park, Dudh Talai, Sanjay Garden

These parks were the best thing of our childhood! Probably today kids don’t even know where these are, but for the 90s kids, this was the thing. Moti Magri was a bit different from what it looks today and same for the Guru Govind Singh Park overlooking Lake Fatehsagar. The gardens at Dudh Talai Garden (Manikya Lal Verma Garden) with oodles of swings were a child’s heaven. Sanjay garden has a beautiful fountain that was very enticing back then.

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
The Remains of the beautiful fountain

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!

Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
A Flickering Image of Guru Govind Singh Park
Can’t Imagine Life Without Internet? See What Udaipur’s 90's Kids Did!
Dudh Talai Garden (Manikya Lal Verma Garden)

If you remember going out with your family at any of these places or you wanna tell us about any new place, do mention it in the comments below. We would love to hear stories of your childhood. <3 


Internet Threat and Ways To Escape

Internet Threat

The Internet is a powerful medium that allows millions of users to chat, play games, download music, gather important information, and perform other various activities. All this has made the Internet an indispensable part of our daily lives. Although the Internet is useful, it also puts our personal and confidential information at substantial risk. Using the Internet unwisely may make your system vulnerable to malware infections and an easy target for hackers. This article lists the most common threats that exist when using the Internet. Although you might think you will never face these threats it is clear that everyone should be aware of them. The purpose of this article is to analyze the most common security threat faced by Internet users. There was an estimated 360,985,492 Internet users in world in 2009 which increases to 6,845,609,960 in 2010. Currently 81,000,000 users are using Internet in India. Due to large number of Internet users, it is probable that many of them are unaware of these common threats.

1. Suspicious E-Mail with attachments –The most common technique used by hackers is to send malware to their targets, and when the targets turn on their computers or run certain programs, they will trigger a Trojan horse or Remote Administration Tool (RAT) which hackers can use to gain remote access to the targets’ machines.

A report says that 90% of messages are spam messages. If you receive a suspicious e-mail from a stranger or even from your friend remember to be cautious with the attachment files. You all heard about lottery scam these days. It is unexpected email with notification “You have won!!” It asks you to contact agent for details. After contacting the agent, the target of the scams will be asked you to pay “processing fees” or “transfer charges” so that winnings can be distributed, but will never receive any lottery payment. It is wise not to believe such lottery E-Mail.

If the language used in the message is not normal, it contains a lot of spelling errors, or the message is written by foreign language, it is wise not to open the attachment file. It can be a spam message sent by a virus or even someone trying to get you runs a program in order to gain access to your computer. 95 percent of these files have the extensions of .pif, .scr, .exe, .com, .vbs, .bat, .cmd or .hta and users should immediately delete any such files without running them, unless they are explicitly aware of their origin and purpose.

A new technique that is gaining in popularity sees hackers hide malicious code within common file types such as Microsoft Word (.doc), Microsoft Excel (.xls), and Adobe Acrobat (.pdf). Installing anti-malware software and using it to scan even trusted file types is essential, although it cannot guarantee 100 percent protection against such threats.

If you are not sure that the attached file is safe it’s a good idea to send a reply and ask more info about it. If the message is clearly pure spam – which can be usually determined just by looking at the subject of the message – just ignore it and delete the message without even opening it.

2. Social network attacks are a serious cyber security threat due to the popularity of social networks, which users can access not only by computer, but also by mobile phone.


”The more personal information you put out, the easier hackers can reach you,”

Hackers use new techniques called ”intelligence information gathering”, which is more advanced than searching by Google, to carry out targeted attacks. Hackers use software that can link to the back-office of Facebook and Twitter and can search in-depth information from web servers. Many users also don’t know that the information they publish on social networks is easily searched by Google. Users must use social network programs conscientiously and avoid unnecessarily publishing any sensitive or personal information, the expert noted.

The greatest Internet threat in 2010 will be social network attacks and hacking. Social Engineering is one of the largest preventable threats. Hackers can call or email members pretending to be from legitimate institutions and ask the member to verify personal information or passwords.

How to protect yourself from social engineers:

a)     Be careful not to disclose information to someone you don’t know over the phone, through email, or when using the Internet.

b)     Don’t share personal information though Internet chat rooms.

c)      Understand how information will be used before sharing it with merchants.

d)     Know if you have a choice in how your information is used and shared.

e)     Don’t include your Account Number, Passport details or other personal information on requests.


3) Communication – Internet is a great medium for being in touch with people. And just like you do in you normal everyday life you should pay attention to who are you giving your personal information. You should pay perhaps even more attention since you can’t tell anything about the other person as you do in real life eye-to-eye situation. Anyone can pretend to be anything in the Internet. Pay very careful attention when giving up your personal information. You can compare the situation in Internet to having a conversation in telephone. If you are going to meet someone you’ve met online, you would like to do it in a public place.

These are the most common risks almost everyone will face when using the Net. Even if you don’t run into any of these threats it is important to realize that they exist. Now that you are aware of all this you can forget your futile fears and focus on the essential – what ever you do – this is the way you will be able to get the most of using the Internet.


4) Automatically downloading programs – Some websites try to install programs or add-ons to your computer. Usually you will be prompted by a window asking rights to the installation. A good rule of thumb is to always decline the installation. It is unlikely that you will need any extra programs for viewing the information you are looking for in the first place. However, sometimes a program or an extra plugin can be needed. If the web site is hosted by some big and trusted company you can rely on it is okay to install the software. However, you should always pay careful attention to what you install to your computer.

5) Fake pages – These pages are made for pretending to be something they are not. User may receive a fake e-mail with a link to a page that looks just like an authentic webpage of some service he/she is using. The user is tricked to enter the fake page and when he/she enters the confidential information e.g. username and password, the data is not send where the user supposes it is, but instead collected and afterwards used for illegal purposes. Pay always close attention that the page you are visiting is what it claims to be. One way to be sure of it is to always write the address to the address bar by yourself or use your own bookmarks when entering confidential websites.
6. Misleading popup windows – A popup window is a window that pops up in front of the other windows when you are browsing the web. Because of their great visibility popup windows have become a common way to show advertisements in the Internet. The popup windows you should avoid are the ones that open automatically when you enter a webpage. Nowadays the ways advertisers use the popup windows to catch the surfers attention have come to the limits. In some messages user may be showed an official-looking window announcing the user’s computer is infected by a virus or an ultra colorful blinking message telling they have just won a million dollars. These are nothing but blatant lies trying to get the user to click on the ads – and that are especially what you should avoid the most. If you click one of those messages it is most likely that you are brought to a webpage that tries to install some software, very likely containing some nasty things such as adware or spyware. It’s a good idea to enable a plugin that blocks unwanted popup windows if your web browser supports it.
7. Lack of security awareness/Changing cultures of Generation Y. The majority of Internet users are teenagers and people of working age, which includes ”Generation Y”, or the so-called ”Click-Through Generation”. These people are usually not concerned about security of information. The Gen-Y just clicks ‘Yes’ or ‘OK’ on Internet pop-ups and they always put personal information on social networks without realizing that this could be dangerous. Many people are deceived in this way into transferring money over the Internet. Awareness of threats is thus essential when accessing the Internet.

Ways you can protect yourself from viruses, worms and trojans:

a)     Purchase or install free Anti-Virus software and update it daily before checking your email.

b)     Obtain all Microsoft security updates.

c)      Be SUSPICIOUS.

d)     Do not open ANY unexpected email attachments.

e)     Do not download or install unauthorized software.

f)        Do not leave a Pen Drive in the floppy disk drive when you shut down or restart the computer. Write-protect your floppy disks after you have finished writing to them.

g)     Verify that the author of the email has sent the attachments. Newer viruses can send email messages that appear to be from people you know or sites you routinely visit.

Conclusion: Internet, while very useful, is not to be taken lightly. Every Internet user should be aware and educated of the threats and vulnerabilities that surround the Internet and know what to do to protect themselves against these known threats. New Internet security threats will likely arise in the coming months and years, and therefore will require users to become even more proactive in defending their computer systems. It is always important to know the risks of any activity a person chooses to pursue in life, and the Internet is no exception. There are many good sources on the Internet for current and past threats and how to setup a defense against them. The irony is that you can use the Internet to learn how to make your Internet surfing more secure. In conclusion, the Internet is full of useful material but this comes at a risk. It is important to develop safe surfing habits and a strong security plan before connecting to and utilizing the Internet.

computer security

Some good and common free antivirus list

  • Panda Cloud Antivirus – Free Cloud Antivirus Software
  • Immunet Pro – Free Cloud Antivirus Software
  • AVG 9 Antivirus Free Edition – Free Windows Antivirus Software
  • Comodo Internet Security – Free Windows Internet Security Suite
  • BitDefender 10 antivirus Free Edition – Free BitDefender antivirus
  • Microsoft Security Essentials


Cloud-based antivirus software does not store the virus definitions on your Windows computer. Rather than using your computer’s processing power, this cloud based antivirus sends data about potentially malicious files to the company’s servers for analysis. This approach is intended to take advantage of the latest signatures without the need for signature-database updates. You do not need to be connected to the Internet all the time in order to be protected. Cloud Antivirus stores a “local cache copy” of Collective Intelligence for offline operation. As soon as you disconnect, Cloud Antivirus still works in the background, checking every file against its local cache of detections.