dr.t3rr0r
Official Website


today : Thursday, April 10, 2025 | at : | safemode : ON
> / home / terror / public_html /
name author perms com modified label

Unable to Boot because Of Grub Broken...(Linux) dr.t3rr0r rwxr-xr-x 0 3:59 AM

Filename Unable to Boot because Of Grub Broken...(Linux)
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 3:59 AM
Label
Action
  • Maybe U uninstall Linux From Duel Boot With Windows,U may probably face.
  • After installing ubuntu,u install windows...u can meet with this error.
  • If Your Grub File is broken, u can use this solution

Requirement-
Ubuntu Live CD or Ubuntu Live USB Drive

Boot with Bootable CD or Media Devices
Open Terminal ...and
type it

Tag Your Whole FriendList..:D dr.t3rr0r rwxr-xr-x 0 3:13 AM

Filename Tag Your Whole FriendList..:D
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 3:13 AM
Label
Action
To Tag All of Your Friends In Facebook.....
Copy That Script..

Moxiecode File Browser Vulnerability : Upload Deface Remotly dr.t3rr0r rwxr-xr-x 0 6:32 AM

Filename Moxiecode File Browser Vulnerability : Upload Deface Remotly
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 6:32 AM
Label
Action
Here Is Another File Upload And Deface Vulnerability hitting mass Number if website..
Deface It from Ur PC Easily..

Moxiecode File Browser Vulnerability : Upload Deface Remotly

First Of all Enter This Google Dork:

Making Your Apps Portables dr.t3rr0r rwxr-xr-x 0 6:17 AM

Filename Making Your Apps Portables
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 6:17 AM
Label
Action
U can make Your favourite apps portable so it is a nice news.
 Firstly go there And Make An Account.....CAMEYO...
It is the way to make the apps portable from online....just add the download links of the installers and get a protable file...:P

Otherwise,seach cameyo in Search in there....:D

Good Luck.....

How To reset Local Group Policy dr.t3rr0r rwxr-xr-x 0 7:46 AM

Filename How To reset Local Group Policy
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 7:46 AM
Label
Action
Run CMD As Administrator
and Copy And Paste it..

"secedit/configure/cfg%windir%\inf\defltbase.inf/db defltbasesdb /verbose"

(Revolution To GUI)
Notice-It works only on Windows 7

Increase internet Speed With CMD (windows) dr.t3rr0r rwxr-xr-x 1 7:48 PM

Filename Increase internet Speed With CMD (windows)
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 7:48 PM
Label
Action
open RunBox and Type "cmd"
and
copy and paste the individual lines

"cd/
netsh int tcp show global
netsh int tcp set global chimney=enabled
netsh int tcp set blobal autotuninglevel=normal
netsh int set global congestionprovider=ctcp
netsh int tcp show global"



Revolution To GUI

About The Certification Of VMware dr.t3rr0r rwxr-xr-x 0 1:25 AM

Filename About The Certification Of VMware
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 1:25 AM
Label
Action
These Are About The Certification of VMWARE.....
1.Cloud
2.Data Center Virtualization
3.End User Computing
4.Cloud Application
and
5.Network Virtualization

The 10 best IT certifications: 2013 dr.t3rr0r rwxr-xr-x 0 8:57 AM

Filename The 10 best IT certifications: 2013
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:57 AM
Label
Action
What are the hottest, top in-demand IT certifications for this year? Not surprisingly, job candidates with certifications in security and cloud computing are hugely attractive to employers.

But basic knowledge on systems planning, development, and maintenance are attractive to employers, too. Here are the certifications employers are most likely to pay you well for in 2013.

The 10 best IT certifications: 2012 dr.t3rr0r rwxr-xr-x 0 8:48 AM

Filename The 10 best IT certifications: 2012
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:48 AM
Label
Action


Based on years of experience meeting with clients and organizations too numerous to count, I've built this list with the idea of cataloging the IT industry's 10 most practical, in-demand certifications. That's why I think these are the best; these are the skills clients repeatedly demonstrate they need most. In this list, I justify each selection and the order in which these accreditations are ranked.

Microsoft Certificates with Explanation dr.t3rr0r rwxr-xr-x 0 8:57 AM

Filename Microsoft Certificates with Explanation
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:57 AM
Label
Action

Microsoft Certified Solutions Associate (MCSA)
The Microsoft Certified Solutions Associate certification is the foundation for higher certifications and prerequisite for the Microsoft Certified Solutions Expert (MCSE). This new certification replaces the older Microsoft Certified Technology Specialist (MCTS).Despite its name, the MCSA Certification for Windows Server 2008 is "based on Windows Server 2008 R2 technology".

Exam Codes To Study...:P dr.t3rr0r rwxr-xr-x 0 8:49 AM

Filename Exam Codes To Study...:P
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:49 AM
Label
Action


U can Check which code u will study



About LPI Exam dr.t3rr0r rwxr-xr-x 0 8:14 AM

Filename About LPI Exam
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:14 AM
Label
Action

LPIC-1
Junior Level Linux Certification

The first IT certification program to be professionally accredited by National Commission For Certifying Agencies.

About Cisco Exam Certification And Its Characteristics dr.t3rr0r rwxr-xr-x 0 8:13 AM

Filename About Cisco Exam Certification And Its Characteristics
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:13 AM
Label
Action

CCNA Service Provider Overview

Cisco Certified Network Associate Service Provider (CCNA SP) certification is for service provider network engineers,
technicians and designers who focus on the latest in Service Provider industry core networking technologies and trends.
With the ability to configure, implement, and troubleshoot baseline Cisco Service Provider Next-Generation networks,

Download Videos Form Ubuntu dr.t3rr0r rwxr-xr-x 0 2:38 AM

Filename Download Videos Form Ubuntu
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:38 AM
Label
Action

sudo add-apt-repository ppa:nilarimogard/webupd8
sudo apt-get update
sudo apt-get install movgrab
5 ways to download youtube videos in ubuntu

Want To Change Your Facebook Theme? with a beatiful song? dr.t3rr0r rwxr-xr-x 0 2:14 AM

Filename Want To Change Your Facebook Theme? with a beatiful song?
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:14 AM
Label
Action


So here we go ..
First of all go here --> http://pastebin.com/raw.php?i=NcsUf8Qx <-- Copy All ( for easy select all press ctrl+a then copy it..
now go to www.facebook.com and if you use google chrome press F12 or if you use firefox press ctrl+shift+k and paste the code for pasting code press ctrl+v and enter 

or watch video...

--> http://www.youtube.com/watch?v=e0haZZndIio <---

Enjoy..

The most Secure Way to save Data On Windows Vista and Above dr.t3rr0r rwxr-xr-x 0 11:41 PM

Filename The most Secure Way to save Data On Windows Vista and Above
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 11:41 PM
Label
Action
That is the way which is the most safe way to keep your data on Windows


It depends on Your Brain...That's how i use my brain...Double Bitlocker..so it can't be opened with Linux and Can't be on Windows XP...and it's difficult to crack Bitlocker..so it may be a secure way....

Send e-mail in future dr.t3rr0r rwxr-xr-x 0 2:49 AM

Filename Send e-mail in future
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:49 AM
Label
Action
I think it may be a awesome feature..:D
U can Use this website to send  Emails in future..
First U must sign up..
The Steps Are easy so i won't write down..:D
i am lazy...heeee

Link

The Newly CCNA Question dr.t3rr0r rwxr-xr-x 0 3:49 AM

Filename The Newly CCNA Question
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 3:49 AM
Label
Action

It is about Syslog,SNMP and HSRP



Question 1
Which three are the components of SNMP? (Choose three)

A. MIB
B. SNMP Manager
C. SysLog Server
D. SNMP Agent
E. Set

Answer : A, B, D

Advanced Hacking OS named MatiruxOS dr.t3rr0r rwxr-xr-x 0 8:46 AM

Filename Advanced Hacking OS named MatiruxOS
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:46 AM
Label
Action
It is based on Debian and released on September 10 in  2013...it was updated recently in September 22...
It is mostly used for penetration and security.
It can also be used on Hypervisor Technologies and it also supports Live Boot.. 3:)
To download

Take reference from

Source

Useful and RAre Commands of Windows dr.t3rr0r rwxr-xr-x 0 8:10 AM

Filename Useful and RAre Commands of Windows
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:10 AM
Label
Action

1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl

Anonymous Mail dr.t3rr0r rwxr-xr-x 0 5:32 AM

Filename Anonymous Mail
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 5:32 AM
Label
Action
Send A Mail To A person without letting him or her know who we are.

Here is the Link

Taken From My Bro,Min Soe Yar Sar..:D

Downloader that Can Work On All Platform..:D dr.t3rr0r rwxr-xr-x 0 2:46 AM

Filename Downloader that Can Work On All Platform..:D
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:46 AM
Label
Action

 3:)
Download
1. Installation.
No installation and no setup are required.


2. Uninstallation
Delete all the files came with the compressed archive
[Windows only: Also goto Start->All programms->startup and delete the
link of XDM if exists]

iOS Hacker's Handbook dr.t3rr0r rwxr-xr-x 0 8:42 AM

Filename iOS Hacker's Handbook
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:42 AM
Label
Action

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
Also examines kernel debugging and exploitation
Companion website includes source code and tools to facilitate your efforts

iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

download PDF

How To Change Computer Name with CMD in Windows dr.t3rr0r rwxr-xr-x 0 7:21 AM

Filename How To Change Computer Name with CMD in Windows
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 7:21 AM
Label
Action
Do u Think i will not talk anymore about Windows...? U Were Absolutely wrong.
I have used Windows since i am 6 or 7...so it is my professional way...

if u want to know about what is your computer name,i think most of u go there by clicking "windows key" and "pause break"...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition dr.t3rr0r rwxr-xr-x 0 9:32 AM

Filename The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 9:32 AM
Label
Action
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition
The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.

Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks

Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws..


Download

Refer to:  http://www.backtrack-pages.com 

How To Write a Absolute HTML based Web Page dr.t3rr0r rwxr-xr-x 0 9:31 AM

Filename How To Write a Absolute HTML based Web Page
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 9:31 AM
Label
Action
Now,i want to end the lesson about HTML...if u have master it,there is only a little left in the HTML field and if u have master it,u can write your own deface page and your own lovely web pages...
i will teach u about Php in next week.."i mean not teaching just sharing"


<a href=........html>(the name that u wish to describe)</a>  ==that links multiple webpages

 <li>.......</li> means show as the list but u must use it with <ul>....</ul>

BackTrack Tutorial Book dr.t3rr0r rwxr-xr-x 0 8:28 AM

Filename BackTrack Tutorial Book
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 8:28 AM
Label
Action
   Backtrack Basics

  Information Gathering Techniques

  Open services Information Gathering

  Port Scanning

  ARP Spoofing

  Buffer Overflow Exploitation

  Working with Exploits

  Transferring Files

  Exploit Framework

  Client Side Attacks

  Port Fun

  Password Attack

  Web Application Attack Vector

  Trojan Horses

  Window Oddities

  Rootkits


Download

Basic Concept about HTML dr.t3rr0r rwxr-xr-x 0 7:04 AM

Filename Basic Concept about HTML
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 7:04 AM
Label
Action
U must Start With <html>

if U want to end just add '/' that like that  '</html>

The most Important Things in Html are <head> <title> and <body>

If U want to add configuration to the page..just add 'bgcolor' for background color... and some others...
'font color' and 'background=add location' for Color of Font..

If u want to type just use  <h_>....<h1> means the largest and the least is <h4>..:D

if u want to add another photo to that page just use  '<img src=add location'>

Introduction to Kali Linux dr.t3rr0r rwxr-xr-x 0 6:52 AM

Filename Introduction to Kali Linux
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 6:52 AM
Label
Action
What is Kali Linux ?
Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.
Kali Linux Features
Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-newinfrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.

Change Wallpaper Automatically on Ubuntu dr.t3rr0r rwxr-xr-x 0 6:41 AM

Filename Change Wallpaper Automatically on Ubuntu
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 6:41 AM
Label
Action
IT is used For Gnome,
First Open Ubuntu Software Centre and Type  'Wallch'

     or

Open Terminal and Type  'sudo apt-get install wallch'

For KDE,
First Open Ubuntu Software Centre and type "Wally"

 or

Open Terminal and Type 'sudo apt-get install wally'
 

Template © IT is Unknown! Use To Learn ! Learn to Hack ! Hack to Learn ! Hack to Use ! | by dr.t3rr0r |
VB (Vio b374k) Template design by dr.t3rr0r