About:- Rajmachi Fort (Killa) is one of the many historical forts in the rugged hills of Sahyadri Mountains (Western Ghats). It consists of two twin fortresses Shriwardhan Ballekilla and Manaranjan Balekilla, with a wide Machi (plateau) surrounding the two Balekillas. Udhewadi is a small village of about 22 houses situated on the machi, at the southern foot of Manaranjan Balekilla of Rajmachi Fort.
Rajmachi Fort is a popular destination for nature lovers, trekkers and for outdoor campers. The time to travel here is In rainy season from mid-June to mid-October, nimbus clouds, silvery water falls, streams, lush green forests and meadows, the scenic beauty of this region enhances during this period. Local families at Udhewadi on Fort Rajmachi welcome trekkers and nature lovers. The local families provide food and camping accommodation to the tourists.
Historically, Rajmachi Fort was a strategic fort to control Borghat (the Ghat between Khopoli and Khandala on Mumbai-Pune route) which was a historical trade route. In 1657, Shivaji Maharaj captured this fort from the Adilshahi ruler of Bijapur. In 1704, the Mughal Emperor Aurangzeb captured the fort from the Marathas. However, the Marathas regained its control in 1705. In 1713, Shahu Maharaj handed over Rajmachi fort to Kanhoji Angre. after which it was in the possession of Angre family, the head of the Maratha navy in the 18th century. Eventually in 1818 the British acquired the control of Rajmachi.
There are historical water reservoirs and ruins of fortifications, ramparts, and gateways on both the Ballekillas. A view from the top of the forts of the surrounding hills and valleys is quite mesmerizing. A Shiv Mandir built in the Hemdapanti style of architecture, approximately in the 8th century, on the west end of a big historical water reservoir is worth visiting. The water reservoir was constructed in 1780, by Ramrao Narayanrao Desmukh, Mamalatdar of Danda Rajpuri.
Height: 3000/2700 feet above MSL
Grade: Easy / Medium
District: Pune
Region: Lonavala
Base Village: Lonavala/Kondhane
How to Reach :- Rajmachi Fort can be reached by two approach routes from Karjat Taluka of Raigad District, one from the right bank of Ulhas river (from villages Kondivde, Kondhane or Mundhyachi Thakurwadi) and the second from Salpe village. Both the routes involve a steep climb up on foot, of about 500 metres. It is not possible to drive a vehicle on these two routes. The first route (from villages Kondivde, Kondhane or Mundhyachi Thakurwadi) reaches Rajmachi at Jambhul Met on the west side of Manaranjan Balekilla. The other route from Salpe village reaches Rajmachi at Hijadkhana, on the north west of Manaranjan Balekilla.
The other routes to Rajmachi are from Lonavla or Khandala in Mawal Taluka of Pune District. Lonavala is 15 km from Rajmachi and it is almost a plain walk, though there are a few ups and downs on this path. This route passes through Tungarli (an area in Lonavla town), Tungarli Dam, Pangoli Thakurwadi, Patel Dam, Phanasarai and Jambhali phata. It takes about three and a half hours to cover the distance on foot. The route from Khandala passes though Summer Hill, Kune village, Della Adventure Resort, Patel Dam, Phanasarai and Jambhali phata. The section of this route from Khandala to Della Adventure Resort is a good road fit for ordinary passenger cars. The further section of this route is a very rough track and therefore not fit for ordinary passenger cars. A sturdy utility vehicle can, however, be taken right up to Rajmachi, on this route. Dduring the rainy season from June to mid-October a 4-wheeler cannot be taken right up to Udhewadi (Rajmachi). A sturdy utility vehicle can be taken only up to Jambhali phata, on this route.
Nearest Railway station: Lonaval
Nearest Domestic Airport: Pune Airport
Nearest International Airport: Mumbai Airport
- Cheers
About :- The red-naped ibis (Pseudibis papillosa) Also known as the Indian black ibis or black ibis is a species of ibis found in the plains of the Indian Subcontinent. Unlike other ibises in the region it is not very dependent on water and is often found in dry fields a good distance away from water. It is usually seen in loose groups and can be told by the nearly all dark body with a white patch on the shoulder and a bare dark head with a patch of crimson red warty skin on the crown and nape. It...
Like any other Operating System (OS). Linux is an alternative OS for DOS, UNIX, Mac OS and Microsoft Windows platform. Linux belong to the family of "free and open source software" (FOSS). On September 17, 1991 the first distribution of LINUX kernel was released by "Linus Torvalds" freely. Later the project was taken up by open-source software collaboration community, which eventually contributed to todays multiple flavours distribution.
Linux was originally developed for personal computers based...
In continuation to Previous Post “What is LINUX”
Step 1: Choosing Linux Distribution and downloading it.The world of Linux is free open-source software with hundreds of active Linux distributions, and dozens of different desktop environments you could run on them. Linux distributions combine the Linux kernel with other software like the GNU core utilities, X.org graphical server, a desktop environment, a web browser, and more. To form a single operating system you can install. Do check...
In continuation to Previous Post “How to Install Linux”
Step 1 : Listing Files and Dirs - Some basic commands
clear -> clear the screenls -> list contentls -l -> list content in long listing formatls -al -> list all subcontent in long listing formatll -> an alias for the above ls -R -> list content recursivelyl. -> list hidden filesls -F -> list content and classify them
alias -> display...
What is Cloud Computing?
To be precise Cloud computing is a concept to leverage the IT infrastructure and support to optimize liability of the capital expenditure and risk to maintain and provide the digital services.
To be very simple its a pool of shared services offered and delivered on-demand often over the internet as required on dynamically configurable system resources and manageable higher-level services that can be provided with minimal downtime and effort in term of computing services...
In continuation of the Previous Post “What is Cloud Computing?”
Public CloudWhen a Cloud computing infrastructure is maintained and managed by the single cloud service provider and the shared resource services are rendered over the network to a different customer, and the cloud customer has no physical control what so ever over the infrastructure except the connectivity is called as a Public Cloud.Public cloud services can be free or have a comparatively lower cost of engagement....
In continuation to Previous Post “Cloud location-based deployment model”
As per NIST, there are three services offering model for Cloud services as IAAS, PAAS, and SAAS
Infrastructure as a service (IaaS)A cloud-based computing solution offering, where a complete infrastructure is been outsourced. Where a service provider delivers a complete set of preinstalled and configured hardware or software or both usually a LAMP or WAMP stack on a virtualized or containerized and sometimes physical...
In continuation to Previous Post “Cloud service-based offering model”
Distributed cloudGeographically distributed shared resources across multiple systems and locations assembled for serving the interconnected data on a single network or hub service as an application to the cloud computing technology platform is known as distributed cloud computing.Usually, it’s a community effort to reduce the overall cost of implementation, and expansions in terms of resource utilization require...
Information security is the process of protecting information and information systems from unauthorized disclosure, access use for destruction of intended information by Deletion, modification which can cause disruption of related services.
It deals with information, regardless of its format. It encompasses paper documents, digital data, and intellectual property.
CIA Triad: Confidentiality, Integrity, and Availability (CIA) have served as the industry-standard principles of information security.
Cybersecurity...