Wednesday, 9 October 2013

How to disable "Seen" feature in Facebook?

The ‘seen’ feature in Facebook is quite useful as it lets you know when your message has been read by your friend. It turns out to be a life saver sometimes when you want a time sensitive message to be delivered.
However this feature is also used by friends to know you are simply ignoring them or you are really away from Facebook. The feature forces you to reply to the person in a guilt that your friends might feel you are not giving importance to them.
Disabling this seen feature may come to your mind at times, fortunately there are ways to do that and read all the Facebook Messages without notifying your friends.

1. Disable ‘seen’ feature on Android:

Install this Privy Chat for Facebook, it is just like the Facebook Messenger for Android but doesn’t notify your friends that their messages has been seen by you. The feature is disabled just in this Privy Chat for Facebook app and if you check the messages from Facebook app or Facebook Messenger app, your friend will be notified with a ‘seen’ icon.



2. Disable ‘seen’ feature on PC:
Install this Chrome extension FB unseen. It blocks the ‘seen’ feature from Facebook chat. You can turn off/on the extension anytime. The “unread messages” notification stays visible as long as you do not reply (or mark it explicit as read.)


How to Outsmart Websites that force you to register?


Every now and then, you’ll encounter a website that forces you to register to view it. Rather than give the website your real email address – often an invitation to spam – you can use one of these tricks instead.

These tricks won’t help you access websites with paid registration. They’re for websites that want you to register for a free account so they can email you and collect data on what you read.

1. BugMeNot:
BugMeNot is a database of usernames and passwords for websites that force you to register. If you encounter one of these websites, visit bugmenot.com and plug the address of the website into the box. Use one of the username and password combos to log in. If they no longer work, you can help by registering your own disposable account (see below) and adding it to the BugMeNot site.


You can integrate BugMeNot into your browser, if you like. Just install the Firefox add-on, Chrome extension, or add the bookmarklet from the BugMeNot website.

Chrome extension: http://bit.ly/19jaAae

2. Mailinator:
There are a number of disposable email services you can use, but Mailinator is one of the most popular. Whenever you need to sign up for a website that requires email verification – and you don’t want to use your own email address so it won’t be spammed – you can use Mailinator.

Note that Mailinator isn’t a private service – you shouldn’t use it for any important accounts.

To use Mailinator, select a random Mailinator email address, like 450348tyhofgdfg@mailinator.com. Enter this address when signing up for an account. When you need to use email verification, visit Mailinator’s website and enter the address you mentioned earlier. Anyone can access any email inbox as long as they know its name.


Some websites block @mailinator.com addresses. To get around this, you can refresh the Mailinator website several times and use one of the “alternate domains” instead of @mailinator.com. The email will still go into the same Mailinator inbox, but most websites won’t block the alternate domains during registration.

3. Outlook.com/ Hotmail:
Microsoft’s Outlook.com and Hotmail both include the ability to create a temporary, disposable email address. This is one feature Microsoft beats Google on. (Yahoo! Mail also has this feature, but you’ll need to be a Plus subscriber.)

To use this feature, click the Create an Outlook alias option on the settings page. Create a new email address and provide it to the website during registration. You can delete the alias whenever you like – this will prevent you from being spammed at that address.


4. Gmail:
Gmail has a similar feature, although it isn’t quite as good for this purpose. You can append a plus sign plus a combination of words and numbers to your email address. For example, if your email address is example@gmail.com, you can give out the address example+spamhere@gmail.com. You can then set up a filter in Gmail, which is quite easy to do that redirects all email sent to example+spamhere@gmail.com to the trash or a special spam label, preventing it from reaching your inbox. When you sign up for something, you can quickly dip into the trash or the spam label and complete the registration process.

This isn’t quite as nice as a disposable email account as it exposes your real email addresses. Clever websites could automatically erase the +spamhere section of your address, although it’s a feature used by so few users that most websites wouldn’t bother.

This trick can also be used to figure out which websites are selling your email to spammers.

Use the tricks to prevent suffering from forceful registration.

Thursday, 25 July 2013

How websites are tracking you online?

Some forms of tracking are obvious – for example, websites know who you are if you’re logged in. But how do tracking networks build up profiles of your browsing activity across multiple websites over time?

Tracking is generally used by advertising networks to build up detailed profiles for pinpoint ad-targeting. If you’ve ever visited a business’ website and seen ads for that business on other websites later, you’ve seen it in action.

Know How...!!!

1. IP Addresses:
The most basic way of identifying you is by your IP address. Your IP address identifies you on the Internet. These days, it’s likely that your computer shares an IP address with the other networked devices in your house or office. From your IP address, a website can determine your rough geographical location – not down to street level, but generally your city or area.

 If you’ve ever seen a spammy ad that tries to look legitimate by mentioning your location, this is how the ad does it. IP addresses can change and are often used by multiple users, so they aren’t a good way of tracking a single user over time. Still, an IP address can be combined with other techniques here to track your geographical location.



2. HTTP Referrer:
When you click a link, your browser loads the web page you clicked and tells the website where you came from. The HTTP referrer is also sent when loading content on a web page. For example, if a web page includes an ad or tracking script, your browsers tells the advertiser or tracking network what page you’re viewing.

  “Web bugs,” which are tiny, one-by-one pixel, invisible images, take advantage of the HTTP referrer to track you without appearing on a web page. They’re also used to track emails you open, assuming your email client loads images.

3. Cookies & Tracking Scripts:
Cookies are small pieces of information websites can store in your browser. They have plenty of legitimate uses – for example, when you sign into your online-banking website, a cookie remembers your login information. When you change a setting on a website, a cookie stores that setting so it can persist across page loads and sessions.


Cookies can also identify you and track your browsing activity across a website. This isn’t necessarily a big problem – a website might want to know what pages users visit so it can tweak the user experience. What’s really pernicious are third-party cookies.

While third-party cookies also have legitimate uses, they’re often used by advertising networks to track you across multiple websites. Many websites – if not most websites – include third-party advertising or tracking scripts. If two different websites use the same advertising or tracking network, your browsing history across both sites could be tracked and linked.

Scripts from social networks can also function as tracking scripts. For example, if you’re signed into Facebook and you visit a website that contains a Facebook “Like” button, Facebook knows you visited that website. Facebook stores a cookie to save your login state, so the Like button (which is actually part of a script) knows who you are.



4. Super cookies:
You can clear your browser’s cookies. However, clearing your cookies isn’t necessarily a solution – “super cookies” are increasingly common.One such super cookie is evercookie. Super cookie solutions like evercookie store cookie data in multiple places – for example, in Flash cookies, Silverlight storage, your browsing history, and HTML5 local storage. One particularly clever tracking method is assigning a unique color value to a few pixels every time a new user visits a website. The different colors are stored in each user’s browser cache and can be loaded back – the color value of the pixels is a unique identifier that identifies the user.

When a website notices that you’ve deleted part of the super cookie, the information is repopulated from the other location. For example, you might clear your browser cookies and not your Flash cookies, so the website will copy the value of the Flash cookie to your browser cookies. Super cookies are very resilient. 



5. User Agent:
Your browser also sends a user agent every time you connect to a website. This tells websites your browser and operating system, providing another piece of data that can be stored and used to target ads. Know more about User Agents at: http://whatsmyuseragent.com/WhatsAUserAgent.



6. Browser Finger-printing:
Browsers are actually pretty unique. Websites can determine your operating system, browser version, installed plug-ins and their versions, your operating system’s screen resolution, your installed fonts, your time zone, and other information. If you’ve disabled cookies entirely, that’s another piece of data that makes your browser unique.
The Electronic Frontier Foundation’s Panopticlick website is an example of how this information can be used. Only one in 1.1 million people have the same browser configuration I do.



I don't say only these are the ways available. There are surely other ways that websites can track you. There’s big money in it, and people are brainstorming new ways to track every day – just see evercookie above for evidence of that.

Cool Geeky Prank-1

Everybody loves a good prank… unless you are the one on the receiving end of the fun. It’s time to hone your pranking skills, not just to make sure you are the best, but so you can avoid being pranked by others.

Disclaimer: Get a sense of Humour 


Lets learn a funny trick now. If you really want to screw with somebody, just enable the Dvorak alternate keyboard layout that even most geeks aren’t familiar with. When they type, everything will go haywire.

Know How...!!!
1. Head into Control Panel –> Region and Language –> Keyboards –> Change keyboards.
2. Then click the Add button and pick the Dvorak layout (or any other random layout you want).



3. You’ll probably want to flip over to the Language Bar tab and set that to hidden as well, so they won’t be able to figure it out easily.

Alright, that's it. Now,prank wisely.

Friday, 19 July 2013

How TrueCaller App Works???

There was a News Headline yesterday saying that: "Hackers claiming to represent the Syrian Electronic Army have reportedly hacked database of Truecaller".Between, do you know what's Truecaller? First let me explain what's all about it.

-->Truecaller is the world's largest global phone directory application for smartphones and feature phones, and accessible via a Web site, developed by True Software Scandinavia AB. It finds contact details globally given name or telephone number, and has an integrated caller ID service using Crowd-sourcing to achieve call-blocking functionality and social media integration to keep the phonebook up-to-date with pictures and birthdays. The name Truecaller comes from the app being able to show the True name of the Caller. The client is available for Android, BlackBerry OS, iOS, Series 40, Symbian, Blackberry, and Windows Phone. Now, let's learn how it works.


Know How...!!!
-->In short, people basically upload their phonebook to TrueCaller's servers which contains names, phone numbers and other details. Once the information is uploaded, TrueCaller knows which number corresponds to what name. Each person who installs the app uploads the phonebook and the overall database at TrueCaller keeps on growing. So even if you shared your phone number with only one of your friends who is a TrueCaller user, your number has been shared with TrueCaller and if you call any other TrueCaller user, you won't be anonymous.

-->It's a very simple concept that's executed very well. I have big concerns over the privacy breach this causes because your friends and relatives are sharing your phone number - something which you just cannot control.

Interesting facts about it:
-->I began searching for my friends’ land line and mobile numbers and those of my own as well, and noted a few interesting things:
  • Sometimes somebody else’s name would prop up. This would probably be a previous owner, or the former name of the person in case of a name change.
  • Sometimes the company name would be suffixed or prefixed to the name.

How to unlist your number from Truecaller?

Luckily, fixing this privacy issue turns out to be easy. Head over to Unlist your Phone Number to request an automatic unlisting of your number. It took a few hours for my numbers to get unlisted, and I heaved a sigh of relief after that, today. 

Monday, 15 July 2013

How to type on Computer without physically typing?

We have many programming languages, but I prefer Java to any other. It's because of its huge libraries. Thanks to James Gosling.Oh..,I revealed..!!!Yea..it's through Java.. 



Know How...!!!
1. Open your Java IDE or cmd or whatever you are using to execute Java programs.
2. Copy the following code and paste it in your IDE. Make sure class name and program name matches.

import java.awt.*;
import java.awt.event.*;
import java.io.IOException;

class Notepad {

public static void main(String args[]) throws IOException, InterruptedException, AWTException{
Runtime.getRuntime().exec("notepad.exe");
Thread.sleep(2000);
Robot r=new Robot();
r.keyPress(KeyEvent.VK_T);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_H);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_I);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_S);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_SPACE);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_I);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_S);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_SPACE);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_F);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_U);
Thread.sleep(500);
r.keyPress(KeyEvent.VK_N);
}
}

3. Run the program to view the result.

Okay...!You did this..But, why did this happen?Why did notepad open automatically and something is typed without, you physically typing?
The Runtime.getRuntime.exec() gives the power to Java to execute notepad directly. A starting delay of 2000 millisecs is introduced so that Notepad gets a chance to open and our program writes in Notepad and not anywhere else. After each letter, i introduced a delay of 500 millisecs so that it looks like someone is typing.

That's funny part of Java...!!! :) Let's learn many such techniques in upcoming articles... 

Sunday, 14 July 2013

How DBA Universe evolved?

I found this funny Genesis of DBA universe, while going through Oracle forums. Read this my dear Oracle developers and DBA freaks...!!! I got to know why DBA's are quite serious people. And you find the reason behind their bristling with anger :)


In the beginning was the disk array, and all was empty and raw, and Unix moved over the face of the platters.
And the DBA said: Let there be Oracle. And there was Oracle. And the environmental variables were set and the disks were striped and mirrored and the OFA was established, and behold spindle was rent asunder from spindle. And the DBA saw that all was in spec.
And it was day and it was evening of the first day.

And the DBA said: Let there be scripts. And sql.bsq brought forth myriad crawling things upon the face of the array. And catalog.sql brought forth all manner of tables and views that swim unseen beneath the waters. And catproc.sql brought forth all the built-in programs and all the hosts of the air, that the users might be given wings and take fight over the data.And it was day and it was evening of the second day.

And the DBA said: Let there be tablespaces. And there were tablespaces. And the network administrator looked upon the disk array and did see what the tablespaces had wrought upon the disk arrays, and he did gnash his teeth and seek a new work upon the Internet with an engine of search. And it was day and it was evening of the third day.

And the DBA created users. Male and female he created them. And he said unto the users: Thou mayest create tables and views as thou wilt. Yea, though mayest create even indexes upon the data. Only meddle not with the system tablespace, for it is a holy place,
and on the day wherein thou treadest upon it, on that day thy create session shall surely be revoked. And the serpent crept among the users and whispered to them, saying: Thine roles shall not be revoked. Taste ye all of the system tablespace, for ye shall know of
b-trees and hints and ye shall be as DBAs. And the users heeded the serpent and filled the system tablespace with crap. And the instance did crash and the client did wax wroth at the DBA. And the DBA did gnash his teeth and partake of the fruit of the vine, for behold the users were permanent employees and the DBA was but a contractor and could not revoke their create session. And it was day and it was evening of the fourth day.

And the DBA did set default tablespaces and temporary tablespaces and did lock down all that was upon the face of the array with roles and profiles and all manner of quotas, yea even from the rollback segments even unto the archived redo logs. And it was day and it was evening of the fifth day.

And the DBA created synonyms and links and did tune the server and apply patches upon the face of the database.And it was day and it was evening of the sixth day.

And on the seventh day the DBA did rest from all the labors of the creation. And his pager did ring and he ceased from resting and did spend his sabbath on the telephone with Oracle support. 

And by the time the DBA got through to someone who knew whereof they spake behold it was day and it was evening of the eighth day.
And the DBA waxed wroth.

Keep Laughing...!!! :D

Friday, 12 July 2013

How to check if a company is fake or not?

Hello...! :)If you are zealous enough to get a job in the company, but didn't yet and trying for it, please read this article. It's for caution. As placements are very low at present, many fraudulent companies are visiting the engineering institutions for providing jobs. The selection process remains a question mark, because we don't understand their priorities in offering the job (clumsy to the peaks!). 

Even colleges, being unable to bring good companies, are fetching those companies which arrive at half the cost of genuine ones, just to piggyback the count of placements. It doesn't cost anyone else's lives except those of students. You get a mail saying you got selected, when in the campus. When you get out of the college with heart full of joy as a graduate and wait for offer letter, you check your mails daily and you get to see nothing from the so-called Company. 

 I got a doubt regarding a company that conducted a campus drive in our college. I felt like it is fake, based on the way the selection took place and immediately called our T.P.O (Training and Placement Officer) to know about it.  Some times, it may  happen to you and you may get a doubt about a company too.  But, how can you determine whether it is a genuine one or not? 

Know How...!!!
Here is how you can verify whether a company is registered or not:

1. Click here to open the website of Ministry of Corporate Affairs.

2. Enter the Company Name and Click on Search 
3. If the company is registered, you get information like:
  • LLPIN/CIN/1ARef No.  
  • Company or LLP Name
  • State
  • Registration Date and
  • Company Status 
4. If it isn't, you get a Pop-up blocked message (or) information not found message.


5. Check out this link to find the list of a few fake/fraudulent companies.

Be cautious...!!! 
Sometimes, the companies arrive with the same name as the registered company, but   
 have a different website than that of the registered one?
Here's how:
1. Click here to open the website and enter the name of it.

2. You get lot of information such as registered date of website domain, traffic info, registrar info, website info, history of it and so on.

3. If registration was done very recently just before the company visited (or) domain has expired long ago due to non-payment of money or whatever ( information will not be properly available), you can doubt its genuinity. 

What if the company is registered and you want to know the CMMI level of a company?
Here is how you get info about it:
1. You can search for a company and find its maturity level and capability level ratings in the Published CMMI Appraisal Results (PARS ) database of appraisal results. 
2Click here to check out the companies' CMMI levels.
3. Also check out the websites like LinkedIn, GlassDoor and many others which provide feedback, reviews and ratings about the company, its work-culture and how it feels like working in the organization. 
4. Verify if anyone from around your place or family, are working in the company and ask them about the company, so you get relevant and genuine info.

Note:
Remember, no genuine company asks its employees to pay money for joining, as it requires best working people, but not those who pay. If it asks so, just quit from trying for that job. Here are a few tips:
  • Don't believe anyone who says you can get job through back-door. Remember! you aren't a dullard and dumb-head to go through back-door. Believe in your own talents than believing fraudulent people. Just say NO!
  • Think twice before paying money to any job sites. 
  • Never pay registration fees to write written test. 99% of the companies, asking for fee are fake!
  • Don't believe in any "job guarantee" programs from training institutes.
I tell you again! Believe in yourself. If you feel like you aren't ready enough to work in a company, learn a technology than spending the same on  paying fee to job-guarantee institutes. It's time to be serious..All the very best buddies...!!!

Have a nice time..!! Share your thoughts in Comments if you have any idea to find the fake companies..!

Wednesday, 10 July 2013

How to add a shutdown title to Start Menu?

Shutting down the PC in Windows is not really a straightforward matter. You have to move your mouse over to the lower-left corner and open up the Start Menu before you can select the “Shut Down” option. Using the trick stated here, you can easily pin a “Shut Down” tile to the Start screen where you can select to shut down the PC immediately.

Know How...!!!
Here are the steps to create shortcut for shut down process:
1. Go to Desktop, right click on the mouse and select New--> Shortcut.



2. Now, it asks for the location to link with shortcut. Type "shortcut /p" and click on "next", followed by "Finish".


3. Now, right click on the shortcut and select "Pin to Start Menu" or "Pin to Task bar".

Simple trick, but saves a lot of time..!!Try it now

Note: Why did shutdown happen when "/p" is added to shut down? It is a command prompt command to shutdown the computer. Here is more info:
Syntax
      SHUTDOWN [logoff_option]  [/m \\Computer] [options]

logoff_options:
    /i         Display the GUI (must be the first option)
    /l         Log off. This cannot be used with /m or /d option
    /s         Shutdown
    /r         Shutdown and Restart
    /a         Abort a system shutdown.
               (only during the time-out period)
    /p         Turn off the local computer with no time-out or warning
               (only with /d)
    /h         Hibernate the local computer (only with /f )
    /e         Document the reason for an unexpected shutdown of a computer

Tip: Each time Windows is shut down or restarted manually, including via the shutdown command, the reason, type of shut down, and [when specified] comment are recorded in the System log in Event Viewer. Filter by the USER32 source to find the entries.

How to get VLC to download subtitles automatically?

VLC is a great media player that can play almost any media format. When you have a video file such as, .mkv that your usual media player can’t play, simply play it with VLC and there is high chance it can play it without installing additional codec. VLC also comes with a subtitle feature where you can load the subtitle file for the video file. The thing it doesn’t do is to find and download the subtitle automatically. Wouldn’t it be perfect if VLC can download the subtitle automatically?It's possible using a single installation.

Know How...!!!
1. Download VLSub from its Github page. Extract the compressed file. You can find a “vlsub.lua” file in the folder. Here is the link: https://github.com/exebetche/vlsub/

2. Assuming that VLC is already installed in your computer, the next thing to do is to move the “vlsub.lua” file to the VLC extension folder.
Copy the file and paste it in: %ProgramFiles%\VideoLAN\VLC\lua\extensions\

3. Open the VLC and load a video. Under the View menu, you should now see a “VLSub” option.


4. In the VLSub window, you can select the subtitle language and add the title of the movie. Click the “Search by name” button to fetch all the related subtitles from OpenSubtitles.org. If you prefer, you can use the “Search by hash” button where it will calculate the hash for the video and find the subtitle that matches this hash. If you have converted the video from one format to another, or modified it, the hash method won’t work well.

5. When you found a match in the result list, highlight it and click “Download selection”. It will prompt you to select the location to download the subtitle file (the default location is the location of the currently playing video). Once that is done, you will be able to load the subtitle file in VLC.


VLSub is a useful extension that makes VLC even better. Now you can watch video without wasting time searching the Web for the correct subtitle file. Try it out and let me know if it works for you.

Monday, 8 July 2013

How to Password Protect your USB drive without any software?



Today, I'm gonna talk something interesting about USB drives and their security. I'll show you a simple trick to lock your USB drive without using any 3rd party software. Most of the people doesn't like other people checking their personal files and folder on USB, including me. This insecure situation creates a huge space to theft our personal data by someone. If you use password protection to your USB, you can reduce the data theft.

Lots of USB password protecting software is available in present market, but you want to pay money to use it for lifetime. If you're using Windows, you don't need any software.

Know How...!!!
So let's see how to set a password protect on your USB without using any software. This can be done using Bitlocker Drive Encryption. 

1. Insert your USB drive to computer.
2. Click on Start.
3. In "Search programs and files" box, type Bitlocker Drive Encryption. Now launch that application.
4. Then look for your USB drive and click on Turn on Bitlocker. You can do this through going to Control Panel->System and Security->BitLocker Drive Encryption.


5. Windows will ask you to set a password. Now set a strong password,set your preferences and then click on Next.

6. It prompts how to save the password, whether to a file or to print it.Store the key in a safe place,click on Next

7. Now click on Start Encrypting.

That's all !!! :)
From now on, if someone tries to access your USB, Windows will ask him/her to enter the current password and this works only with Windows OS... :)

Importantly, you can use it not only to to help protect all files stored on removable data drives (such as external hard drives or USB flash drives) but also files stored on the drive Windows is installed on (operating system drive) and on fixed data drives (such as internal hard drives).

Note: 
When you add new files to a drive that is encrypted with BitLocker, BitLocker encrypts them automatically. Files remain encrypted only while they are stored in the encrypted drive. Files copied to another drive or computer are decrypted.

How to browse websites without internet?

Being an Internet addict, you might be having a long list of favorite websites, right? I know that Google and Facebook must be there in the list, but I am talking apart from the social media and service websites.There are many more websites that are there to keep you updated with latest news and provide helpful articles. Anyways, accessing the websites and reading out the important stuff has become an important part of life.


One feels one’s day to be empty without accessing one’s favorite websites. But sometimes, the situations arrive in which we don’t have the Internet facility and thus we can’t access our favorite website.So, does this mean that you can’t open the website without having Internet? 

No! You can open and browse any website without the Internet as well. This is done by downloading the website onto your computer/laptop.

Know How...!!!
Yeah, you can download the entire website on your computer and then can access it whenever you want, without the need of Internet. Of course, the website that you access offline is only updated to the point when you download it.


The content getting published on the website after the time of your download, can’t be accessed offline until you download the updated website. Come on, it’s not any hard point to understand, just a common sense! Here is the list of best tools to download websites into your computer.

1. HTTrack:
HTTrack is an incredible and simple-to-use software to download the website. It is available for Windows, Mac and Linux. After running the software, you just need to enter the URL of website that you wish to download. You can also define your desired depth level. The rest work is of the software only. It downloads the website and enables you to access it offline.

2. Internet Download Manager (IDM):
The world’s best download manager, the Internet Download Manager a.k.a IDM, also allows you to download the entire website. To use it, you need to run the  Site Grabber that lies in the ‘File’ tab of the download manager. Just enter the URL of site and tell the software that what you want to download. The rest work is of IDM.

3. Scrapbook:
If you use the popular browser Firefox, then there is nothing better than Scrapbook add-on for you, to download the entire website, and then access it in the offline mode. After installing the plugin, you will get a new tab on your Firefox browser, where you will see the option to download the website.
You can set the depth level to tell the plugin, to what extent it should follow the links and download the pages located behind them. You can export the download webpage as HTML and thus can enjoy the offline reading on mobiles and tablets as well.

4. Offline Commander:
Offline Commander – an amazing software for Windows – lets you download any particular web page or the entire website for offline access. You just need to define the settings like ‘Depth’ and other options, and rest work will be done by Offline Commander.

5. SurfOffline:
Yet another simple-to-use software that allows you to download the entire website. Those who live on the ideology of ‘keep it simple’, should go with this software. You can enjoy this software for free for first 30 days.

So, download and go through your favorite content offline now...!!! :)