nishant kashyap

keep calm and love technology

Leave a comment

Bland Indore’s public transport

Today, after contemplating about the transport in Indore, I am going to write which i found here within 20 days.

After a long time, I came in Indore. I have found one BRTS (Bus Rapid Transport System) which is working fine. This system gives relief for a common man, students and others who are traveled daily by local transport in a particular road. This BRTS  is in one of the main road in Indore. Except this BRTS, It is hurdle to travel from other areas of Indore. I am talking about the bland Indore’s public transport. This public transport glimpses how, In a city, passengers are treated. There is no frequently city buses on other roots except BRTS. I agree, The approach of BRTS should be accolade in this city. But what’s about the other roots where people have no frequent city buses. People have to traveled by some other local transport where there is no respect of people, no value of passenger but people have to travel since there is no alternate for them especially in the evening time. Govt. should try to solve this riddle.

I supposed that some one who is related to public transport in Indore, may read this blog and instead of tripping up, try to get some solution for this bland transport.


Leave a comment

Paris Attack: A cyber Challenge


     Paris attack which was an attack by ISIS (an terrorist organization) on 13 November 2015. This attack shows how much they are strong. They were communicating continuously with each other during attack or before attack by some chatting applications like wechat or telegram but France secrete agencies and many other Govt. agencies were not able to get there Communication. Since, It is very difficult for any organization to break the encryption of modern encryption algorithms. So Govt. is demanding decryption key or some backdoor entry for secrete agencies so that they can get the actual data. But, Question is that Will it helpful? No, It will not. Because, They can use some other applications which are not under the Europe govt. encryption policy.


     Now, lets talk about NSA whistle blower Edward Snowden  , He is a former NSA contractor and whistle blower and now blamed for the cause of Paris attack by some official agencies. The blame on him is that he leaked the changes made by the Obama administration to surveillance. This leaked information led directly to the inability of the Intelligence organization in US and France for preventing the Paris Attack. Still, By the metadata of encrypted messages, US govt. already got some hits of PARIS ATTACK and It is also in news that US Govt. warned to the France Govt. before 2 months about the attack. Now, If France Govt. already knew that the attack might be happened, then how anyone can accuse Edward Snowden for this attack.


     We can not forget Anonymous and GhostSec groups, These are most popular groups who are fighting with ISIS in cyber space. Anonymous is the most famous ‘hacktivist’ group in the world. and they are famous for doing cyber attacks on the corrupted corporations and organizations. Now, Anonymous group announced that they will destroy the existence of cyber space of ISIS. within 2 days, A Telegram channel that’s believed to be affiliated with ISIS hackers then sent out a message to its followers instructing them how to prevent getting hacked by Anonymous.


     Another group GHOSTSEC, they are working for last more than 1 year against ISIS. On their website, the mission is :

      “Our mission is to eliminate the online presence of Islamic extremist groups such as Islamic State (IS), Al-Qaeda, Al-Nusra, Boko Haram and Al-Shabaab in an effort to stymie their recruitment and limit their ability to organize international terrorist efforts.”

     After analysis of above information, We can say ISIS also has great team of technical people and they are more intelligence in cyber space. Now Let’s see who will win in cyber space ISIS who is killer or Govt and these groups who are fighting against terrorist.


Leave a comment

social life as silence player


As we know that we grow with our society. Whatever we get in our nature and behavior , all adoptions come by society and family . We live in such a society where we can flourish with joyfulness . Our society gives us whatever we need to grow so that we will live with all dimensions of life. After our family , society is the main player to make us whatever we are now.

If we are now in a good position , there is also a role of social life in your present condition. Whenever we have in that position where you can do something for your society then you should do definately. you should not wait for some moment , just do. you should be ubiquitous for your society . you should not even think once for giving your effort and time for your society.

Believe me my friend, your little time and effort will be tremendous help for your society . You can do something for your society any time by doing anything. Like If you are student , you can make some community with your classmates and try to aware people for any social issue . you can do camping with your colleagues. You can also do these things by giving support to some social agencies (NGOs) .

You can manage your camping with your social sites like facebook , G+ etc. . you can make some pages for your camping on facebook.

There are several NGOs where you can join, you can search state wise agencies :

you can visit and find any suable NGOs for you by this above website.

“Even in social life, you will never make a good impression on other people until you stop thinking about what sort of impression you’re making”

thanks .

Leave a comment

Things you should know as a web user


Recently, one of my relative has been victimized by an unknown person by the means of some cyber crime techniques . Now a days , The Number of  web users are increased so crime related to web technologies ,also increase. Because of unawareness of cyber crimes , innocent people are victimized .  Here, i am trying to aware about some crimes sothat you can save your data, personal information, money etc.

The techniques are:

1. Social engineering

2. Phishing page

3.  Key logger

4. viruses, web worms , malwares .

5. cookies


1. Social Engineering:-

People are tricked into performing actions they would not otherwise want to perform. that is, By some social medium , somebody try to force you do to some wrong action so that hacker can get access to your computer, account or anything.  there are a lot of methods for this some are

fake codec:– During your browsing , suddenly some message come(prompt) and message may be say that you need to download that file for some purpose but actually that file may be a virus, trojan or any other malicious code which let hacker to connect your computer with hacker’s computer.  So do not download any unknown file which you do not know.

malicious peer to peer files: –  there are some sides which support peer to peer file sharing system like utorrent, Bittorrent , pando etc. sides which let you download the files which are shared by someone else like you . so it is more chance to add viruses , trojans with there movies files, songs files , software files etc. and when we download that file that malicious code can be installed in your system.

malicious updates:  some time , during browsing , some updates may be come like operating system updates , browser updates or ay scanner for scanning your pc for virus . these all can be a trap for you. actually this type of updates may be some malicious code which can infect your PC as well.

fake calls:– Somebody can call you as an employee of any bank, organization or any hospital etc. he may ask your personal details .

fake person:- some time , for a short time like journey in trains, buses, any seminar , you can make friends . after  one or two hours somebody can ask you about your mobile number, facebook id etc. If someone knows about your personal details like your parents name , number of brother sisters , date of birth etc. then he can go to your side and click on password forgot button . Then Computer will ask about the personal question which you wrote at that time when you created  your account. If that question you gave same which that hacker knows , he can access your account. so be sure when you meet any stranger , do not reveal all the information .

2. Phishing page :-

Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. that is, a webpage which is looking like a standard any perticular website but it is not actual web page ,it is made for getting whatever you will write in that webpage.

Example: suppose you are  browsing facebook page . you find that page by searching on google. may be that facebook page is fake. when you write your user id and password it will go to the hacker’s computer.

3 key logger:- Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

Whenever you use other’s computer , be sure that this computer does not have key logger . otherwise whatever you will press on keyboard everything will save on a file and after that that person who installed that keylogger can read what you typed on that computer.  there is also a keylogger plug-in by mozila firefox so just see all the plug-in  in your browser whether any keylogger is installed or not.

4. virus, malware, web worms :

Do not open untrusted sites, malicious sites or other those sites which are banned and Do not download and install any file from untrusted sources.

5.  cookies:Cookies are usually small text files, given ID tags that are stored on your computer’s browser directory or program data subfolders. Cookies are created when you use your browser to visit a website that uses cookies to keep track of your movements within the site, help you resume where you left off, remember your registered login, theme selection, preferences, and other customization functions. So always clear your cookies , if someone can access your cookies he or she can find a lot of information about you.

How you can save your self:

1. your awareness

2. digital certificates

3. https

4. anti-virus

5. turn-off java-script

1.  Awareness :- If somebody ask you about your personal information , you should firstly think that how can you trust him . do not say any information to strangers . Do not say your password of bank account , facebook account or any type of account , if someone ask you about your password then you can be 100% confirm that he is a fraud.

2. Digital certificates :-

Now a days, every good website has digital certificates . Digital certificates means there are certain organization which give certificates to only secure sites so that people can trust on these type of sites.

digital certifciate

3. https:

https protocol using sites always be trusted so just remember that if you are going to transfer any money see the protocol name on the address bar.


4. anti-virus:

You should always have a good anti-virus and you should also update that anti- virus frequently . without updating of your antivirous can fight with only those viruses which were in the past . By updating your anti-virus , you make it strong and able to fight with latest viruses .

5. turn off javaScript :-

In normal browser always turn off your javaScript . because maximum viruses are written in javascript on web .

If you are victim of any cyber crime then you need to write F.R.I. in your local police station and you can also contact with cyber cell .

this is the link where you can find all details regarding cyber cell:



Leave a comment

Role of money in higher studies


Everyone knows , Importance of money in our day to day life. We can see how our works stop due to lack of money. When we talk about our higher education , we need a huge amount of money for paying the fee. As we know that most of technical and management degree’s fee is too high.  So there are certain amount of student who want to do technical or management degree but due to the financial problem , they have to go in science field even they do not have that much interest in the science faculty .  When we seek the solution of this problem , we can say that , there are several banks which provide education loan, or even we can say that there are several scholarships or funds which are provided by govt. .  But problem is still there with some particular type of people who do not have anything for bank and who do not have such type of criteria by which they can get the scholarships or funds . So , I think , We cannot do any thing with those who do not have anything for bank but we can do something for them who are not under the criteria but they are poor .

In India , The scholarship is provided only for a particular community . The scholarship provides on the basis of community, not on the basis of poverty . and As we know that many communities which are not consider for scholarship or fund but there are many people who are under poverty line . So government should also provide some help these type of people.  Diversity1

Leave a comment

Right for vote


In India , The vista is totally different now a days because Parliamentary Lok Sabha election is going on. Every politicians are busy with their party advertisement.  But what’s about a normal people . Are you ready to cast your vote ?  May be somebody will say yes . But If we are talking about youngsters , It is not true.  A lot of youngsters  are not present in their native places. They are outside  because of  either for study or  jobs. So these people also have right to cast their vote with no problem. Yes, There is already some laws or rules , but Who wants to do that much stuff for giving their vote.

There should be a better and easy way to cast our vote from anywhere in India . even , not only in India but also from abroad . The age for giving vote is 18th in India. Approximately above 70% Students passed 12th in this age. Then after completing 12th standard, usually ,Students have to go outside from their native place  for their degree or may be for preparing any competition exams.

We all always  talking about technology , technology which can change the scenarios , technology which allows us to change the future. Our Indian government also always prefer a good topic for attracting youngsters . But why Indian government is not trying to use technology in the field of election .

So ,Indian government should try for providing voting facility in anywhere in India at least.

Leave a comment



somebody says true that  ” we do not realize the value of things that we got too easy. ”  everyone has friends . If anybody says to you that categorize your friends then how you will categorize your friends. most of people will categorize their friends as best friends and only friends  or may be someone categorizes his/her friends as boy friends and girlfriends .

firstly , i want to say how a person is made your friend and why some people become your best friends or some not. I think the person who has same thinking as you have, will become your best friend . I can also say that a person who listens  you , will become your best friend. so try to listen other’s voice , other’s thoughts , definitely they will become your best friends. I have rare friends , but i have that rare friends with 100% dedicated friendship. I am also true friend for them .