Latest News

How to Download a Website for offline Viewing

Intro - In this tutorial I will show you how can you surf a website offline. It seems unbelievable but it is possible now you can surf a website without connecting your internet. This method is very useful for those people who want to save data from a particular website. Internet download manager has a great feature. In this tutorial I will explain you how can you surf a website without internet/ how can you download a website and surf without connecting internet.
First of all download Internet Download Manager through official website (Demo) : Click Here 

1.      Run IDM as Administrator 

2.      Select Grabber Option

3.      Select the options shown in below Image

4.      Locate the disk to save the Project 

     5.      Explorer the whole website

6.      Select file types and filter options

      7.      We almost done everything 

8.      Wait for the Grabber to download the site (time depends on your Internet speed)
After download is complete save the project

9.      Open the HTML file for offline Browsing

10.   Now you’re able to View the site Without Internet connection

(Click image for large view)

For more updates like us on

ZERO-DAY A Future Threat, And How To Protect Your Data


It is known that practically all software has security flaws (programming problems that give individuals opportunities to explore previously nonexistent), many of these vulnerabilities not yet discovered, and hundreds are corrected every month through the packages available organizations affected, sometimes new versions and updates.

The term "zero day" (zero hour or 0day ) refers to the unknown nature of security breaches for companies , this attack tries to exploit computer application vulnerabilities that are unknown yet even by software manufacturers . Explaining in a simple and generally, there are two types of "exploit", or flaws / vulnerabilities that can be used in attacks. Those found by security companies and found by hackers whose purpose is exploration.

The issue is that some hackers choose to disclose newly discovered failures to apply the necessary corrections are sometimes rewarded for it with prizes. The "black hats" prefer to save for their own benefit ne a future attack or to share with attackers before the developer of software knows about the vulnerability.


Regarding PRIVACY is important to know how to control the availability and exposure of your data , the AES algorithm was proposed to replace DES, NIST ("National Institute of Standards and Technology U.S.") held a competition (The selection process began in 1997 and ended in 2000 with the victory of the Rijndael algorithm written by Joan Daemen and Vincent Rijmen) for it to be made an algorithm that would be called "Advanced Encryption Standard " that meets the following specifications: algorithm publicly defined;

Being a symmetric cipher block; Designed for the key size can be increased; Deployable in both hardware and software; Powered freely, this algorithm Encrypt and Decrypt using an encrypted key and blocks, both sizes of 128,192 or 256 bits.

I will cite and explain how an open source tool very important: TrueCrypt (encryption on-the-fly OTFE) to confidential files , folders and entire drives on your PC , encryption, it can create a virtual encrypted disk or encrypt a partition , individual algorithms supported by TrueCrypt are AES, Serpent and Twofish, additionally , five different combinations of cascaded algorithms are available : AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES and Twofish-Serpent. Uses RIPEMD-160, SHA-512 and Whirlpool as hashing functions.


Due to the increasing amount of 0day discovered, I will present one of the safest techniques to protect the security of your data, first we store our data in a nonvolatile memory device (eg USB stick or external HD, is the storage, where once recorded, the data are not lost when you remove the power source), we will also create a volume HIDDEN, at worst it can happen that you are forced by somebody to reveal the password to an encrypted volume . There are situations where you cannot refuse to reveal the password, for example, due to extortion. The method is to use a volume "HIDDEN" that allows you to solve such situations without revealing the password to your volume true, we actually create two passwords, a password can be used for volume "False" and one for the volume "True".

In case of any extortion can provide the password "Fake" where the attacker will have access, and the information contained in this folder will be irrelevant.


Choose the "Create Volume".


Select "Create an encrypted file container" then click "Next".


Select "Hidden TrueCrypt volume" and click "Next".


Then we select this option, the wizard will first help you create a normal volume and then a TrueCrypt hidden volume within it.

Select “Normal mode” and click “Next”.


Choose a name for the file and click "Save".


Select the location of the outer volume to be created (within this volume will be a hidden, that will be created later).Go straight on "Next”.


Again click "Next".


Select the type of encryption algorithm you want to use:


Enter the volume size and click "Next".


Choose a password, the more characters better, example: p@ssword.


Select the "Format" and click.


Now wait for the formatting, you can move the mouse quickly to generate a better randomness.


Let's create the next volume, click "Next".


We will continue to do our hidden volume, again click "Next".


Select the encryption mode you want to apply to your new volume.


Enter the size of another volume.


Choose a secure password and different from the first, with many characters and click "Next".


Ready! Now the volumes are made, and beyond the expected, you have a hidden volume and secret to save your important data.


Just click on "Exit".


So let's understand how the volume created within the other, known as External.
Let's open Truecrypt and then first open the main volume, choose FILE SELECT, and we select the volume created.


Click to open.


Click on "Mount".


This screen will ask for the password, remember that you have two, the volume for false and one for true.


Choose which put password.


Pay attention to the volume that opened was the "normal".


You can use social engineering if you need some day.


Click on “Dismount”.


We will select the same item again, now to test with another password.

Step 28.

Enter the password for the hidden volume.


Note that our hidden volume appears, note the size and type.

This article shows a technique for case one day you will be forced to disclose information, learn how to get out of this trap.

It's also a great way to protect your company's data and a security strategy that should apply to stay quiet with your important data.

About the Author
This is a guest post written by , RAFAEL FONTES SOUZA.He is the maintainer of the “Project Backtrack Team Brazilian”, He is also a member of the "French Backtrack Team" and made partnerships with groups from Indonesia and Algeria, was prepared a collection of video lessons and made available on the website.

He am Founder of the "Wikileaks and Intelligence, Cypherpunks". Good communication in groups and the general public, attended college projects with a focus on business organization, he currently seeks work experience outside of brazil”.

SSL Unleashed

In this article I am going to tell you everything about SSL that what it is why we need it, technical and non technical aspects of SSL etc.. This article covers the introduction, SSL certificate, Encryption, process of encryption and how your browser interact and trust that certificate provided by the website you are visiting.

Existence of SSL
There are basically 2 aspects of SSl. One is Encryption and second is Identification.  Now encryption is what you hide the content of the data sent from one machine to another machine. It is done by changing the content of the data in identical to garbage form which is human readable but not human understandable. It is exactly like speaking in different languages with what one person is not familiar. I am Indian if someone speaks in Russian language, it is not understandable by me. So here Russian language is like encrypted language for me. However if I get a translator and he/she translates that Russian language into Hindi  then I can say that now that is understandable by me. So it is said that message has been decrypted. Identification is related to trust.  In the previous scenario, how can I trust the translator who is converting Russian language to Hindi? Is she/he legitimate ? Can I trust him/her? In the digital world, it is something like this. Your machine has to trust the SSL certificate (security mechanism), provided by the website via an SSL certificate issuing vendor.

To read full article click here..

How to make bootable USB Kali Linux

Intro - Universal USB Installer aka UUI is a Live Linux USB Creator that allows you to choose from a selection of Linux Distributions to put on your USB Flash Drive. The Universal USB Installer is easy to use.
UUI can create a Bootable UFD containing any of the following:

1.  First of all download a software Click Here
2. Downloaded software will look like this
                                                                             (click on image for large view)

3. Right Click on the Software and Click on Open

4.  Click on I Agree

5. Choose Kali Linux from drop down menu / You can also install other OS like Windows 8, Ubuntu etc select your OS flavor.  

6.  After choosing your OS type Click on browser then select the ISO file of your OS and Click on Open.

7.  Now Select your USB Drive. If you want to format then check the box otherwise you can leave it. Finally click on Create

8. Click Yes

9. Here your Making bootable USB process has been started.

10. on process….

11. Process Completed Finally click on Close

12. Select USB boot from your BIOS boot menu and check it.
(click on image for large view)
Download Link : Create Bootable USB
UUI can create a Bootable UFD containing any of the following:
— Latest Ubuntu 32/64 Bit —
Ubuntu 13.10 Desktop
Ubuntu 13.10 Server
Ubuntu 13.04 Desktop
Ubuntu 12.10 Desktop
Xubuntu 12.10 Desktop
Kubuntu 12.10 Desktop
Lubuntu 12.10 Desktop
Edubuntu 12.10 Desktop
Ubuntu Studio 12.10
Ubuntu Server 12.10 Installer
Ubuntu 12.04 Desktop
Ubuntu 12.04 DVD
Ubuntu 12.04 Alternate i386
Ubuntu 12.04 Alternate amd64
Xubuntu 12.04 Desktop
Kubuntu 12.04 Desktop
Lubuntu 12.04 Desktop
Edubuntu 12.04 Desktop
Mythbuntu 12.04 Desktop
Ubuntu Studio 12.04
Ubuntu Server 12.04 Installer

— Older Ubuntu 32/64 Bit —
Ubuntu 11.10 Desktop
Ubuntu 11.10 DVD
Xubuntu 11.10 Desktop
Kubuntu 11.10 Desktop
Lubuntu 11.10 Desktop
Edubuntu 11.10 Desktop
Mythbuntu 11.10 Desktop
Ubuntu Studio 11.10 Installer
Ubuntu Server 11.10 Installer
Ubuntu Rescue Remix 11.10
Ubuntu 11.04 Desktop
Xubuntu 11.04 Desktop
Kubuntu 11.04 Desktop
Lubuntu 11.04 Desktop
Edubuntu 11.04 Desktop
Mythbuntu 11.04 Desktop
Ubuntu Studio 11.04 Installer
Ubuntu Server 11.04 Installer
Ubuntu Rescue Remix 11.04
Ubuntu 10.10 Desktop
Xubuntu 10.10 Desktop
Kubuntu 10.10 Desktop
Lubuntu 10.10 Desktop
Edubuntu 10.10 Desktop
Mythbuntu 10.10 Desktop
Ubuntu Netbook Remix 10.10
Ubuntu Rescue Remix 10.10
Ubuntu 10.04.X Desktop
Xubuntu 10.04.X Desktop
Kubuntu 10.04.X Desktop
Lubuntu 10.04 Desktop
Ubuntu Netbook Remix 10.04
Ubuntu Server 10.04.X i386 Installer
Ubuntu Server 10.04.X amd64 Installer
Ubuntu Mini Remix 10.04.X
Ubuntu 9.10 Desktop
Kubuntu 9.10 Desktop
Xubuntu 9.10 Desktop
Lubuntu 9.10 Desktop

— Linux Mint 32/64 Bit —
Linux Mint 15
Linux Mint 14
Linux Mint 13
Linux Mint 12 Gnome CD
Linux Mint 12 Gnome DVD
Linux Mint 12 KDE DVD
Linux Mint 12 LXDE CD
LMDE 201204 Mate/Cinnamon
LMDE 201204 XFCE
Linux Mint 11 DVD
Linux Mint 11 CD
Linux Mint 11 LXDE

— Debian Live/Netinst 32/64 Bit —
Debian Netinst
Debian Live Gnome
Debian Live Standard
Debian Live KDE
Debian Live LXDE
Debian Live XFCE

— Backtrack/Kali Versions —
Kali Linux
Backtrack 3 Final
Backtrack 4 Final
Backtrack 4 R2
Backtrack 5 5R1 5R2
Backtrack 5 R3

— Fedora 32/64 Bit —
Fedora 17/18/19 Desktop 32bit
Fedora 17/18/19 Desktop 64bit
Fedora 17/18/19 KDE 32bit
Fedora 17/18/19 KDE 64bit
Fedora 17/18/19 LXDE 32bit
Fedora 17/18/19 LXDE 64bit
Fedora 17/18/19 XFCE 32bit
Fedora 17/18/19 XFCE 64bit
Fedora 16 Desktop 32bit
Fedora 16 Desktop 64bit
Fedora 16 KDE 32bit
Fedora 16 KDE 64bit
Fedora 16 LXDE 32bit
Fedora 16 LXDE 64bit
Fedora 16 XFCE 32bit
Fedora 16 XFCE 64bit
Fedora 15 Desktop 32bit
Fedora 15 Desktop 64bit
Fedora 15 KDE 32bit
Fedora 15 KDE 64bit
Fedora 15 LXDE 32bit
Fedora 15 LXDE 64bit
Fedora 15 XFCE 32bit
Fedora 15 XFCE 64bit
Fedora 14 Desktop 32bit

— OpenSUSE Live 32/64 Bit —
OpenSUSE 12.1 GNOME i686
OpenSUSE 12.1 GNOME x64
OpenSUSE 12.1 KDE i686
OpenSUSE 12.1 KDE x64
OpenSUSE 11.4 GNOME i686
OpenSUSE 11.4 GNOME x64
OpenSUSE 11.4 KDE i686
OpenSUSE 11.4 KDE x64
OpenSUSE 11.4 LXDE i686
OpenSUSE 11.4 LXDE x64

— Puppy Linux Based —
Lighthouse Puppy
Lucid Puppy
Precise Puppy
Puppy Arcade
Puppy 4.3.1
Racy Puppy
Slacko Puppy
Wary Puppy

— Linux Distros for Kids —
Qimo 4 Kids 2.0
Sugar on a Stick

— Other Distros Alphabetical —
AOMEI (Disk Cloning and Backup Tool)
Acronis Rescue CD
Android x86 2.2
Android x86 4.0
ArchBang 32bit
ArchBang 64bit
Baltix Linux 11.04 CD
Baltix Linux 11.04 DVD
Boot Repair Disk
DBAN 2.2.X
Deft Linux
Deepin Linux
DSL 4.4.10
EASUS Disk Copy
EasyPeasy 1.6
Elementary OS
Elementary Unleashed
Feather Linux 0.7.5
Fusion Linux 16
Gentoo 10.1 x86
Gentoo 11.0 x86
Gentoo 11.0 amd64
gOS 3.1 gadgets
Kiwi 9.04
KXStudio 12.04
Linux XP Like
Mandriva One 2011
MCNLive Toronto
Ophcrack XP
Ophcrack Vista/7
OSGeo Live
PCLinuxOS 2010
PCLinuxOS Minime p93a
Pear OS
Peppermint One
Peppermint Ice
Peppermint Two
Peppermint Three
Peppermint Four
Pinguy OS 12
Pinguy OS 11
PLoP Linux 4.1.0
Porteus 32bit
Porteus 64bit
Redo Backup
RIP Linux
Runt Linux 5.0
Sabayon Linux
Simply MEPIS 8.0.15
SliTaZ 4.0
Sn0wL1nuX 11
Sn0wL1nuX 11 64bit
System Rescue CD
TinyCore 4
Ultimate Boot CD
Ultimate Edition
WifiWay 3.4
wattOS R5
Zenwalk Live
Zorin OS

— Live Antivirus Rescue CDs —
AOSS (Malware Scanner)
AVG Rescue CD
Avira Antivir Rescue Disk
Bitdefender Rescue CD
Comodo Rescue Disk
DrWeb LiveCD
F-Secure Rescue CD
G DATA Antivirus
Kaspersky Rescue Disk
Panda Safe CD
Trinity Rescue Kit

— Other or Non Linux Based Software —
Hiren's Boot CD
Windows Vista Installer
Windows 7 Installer
Windows 8 Installer

— Try to use an Unsupported ISO —
Try Unlisted Linux ISO!

Contact Us

24x7 online , we happy to answer you , ,
skype: greeenchip


This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.

Featured Post

Custom Domains And HTTPS Redirection Code