wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

MAHAKAL LOK UJJAIN

profile
Adarsh Rajak
Oct 21, 2022
3 Likes
0 Discussions
293 Reads

One of the major Mahakal Lok Highlights is, the mega corridor has a length of around 920 metres.The corridor has around 200 statues and it is spread along the Rudra Sagar Lake.A total of eight forms of Lord Shiva are available for Mahakal Lok Darshana.The corridor also showcases murals of the stories, which are mentioned in the Shiva Purana.The corridor has a total of 108 pillars and two grand entrance gates – Nandi Gate and Pinaki Gate.This 920-metre long corridor leads to the entrance of the famous Mahakaleshwar Temple and it also offers a mesmerising panoramic view along the way.The murals depict the concept of Mahakal Forest from the epic of Meghdoot, written by Mahakavi Kalidas.


Comments ()


Sign in

Read Next

Information Technology In E- Commerce

Blog banner

Interrupts - Types, Working & Importance

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Operating Systems Overview

Blog banner

Memory heirachy (Operating system)

Blog banner

Deadlock

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Multiple processor scheduling

Blog banner

Docker Framework

Blog banner

Memory management

Blog banner

Cache Memory

Blog banner

Threading

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Health and fitness

Blog banner

Im Photographer

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Who decides your overthinking, anyway?

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

You'll get to know about Pankaj Negi

Blog banner

File system

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

What is process

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Different Types of Data

Blog banner

ProofHub

Blog banner

Understanding - Proof of Work!

Blog banner

Supervised and unsupervised learning

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Developments in Modern Operating Systems

Blog banner

Regression Analysis

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Measuring IT Risk

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Security issues

Blog banner

All you need to know about Website Traffic

Blog banner