background preloader

Hacking and security issues

Facebook Twitter

Hping Tutorial. Turn Google into Napster 2000. Post written by: Marc Chernoff Email Okay peeps, I’m sure most of you know how to use Limewire and Bittorrent these days.

Turn Google into Napster 2000

But, I’ll bet you haven’t used Google to perform a quick Mp3 search for the nagging song that’s been stuck in your head all day. The truth is that Google can be used to conduct a search for almost any file type, including Mp3s, PDFs, and videos. This functionality has been available for a long time, but most users haven’t caught on to it. The following is a Google search string for searching open web directories containing downloadable Nirvana music files. -inurl:(htm|html|php) intitle:”index of” +”last modified” +”parent directory” +description +size +(wma|mp3) “Nirvana” With some very slight modifications the same search string can easily be used to search for ebooks in DOC and PDF format: -inurl:(htm|html|php) intitle:”index of” +”last modified” +”parent directory” +description +size +(pdf|doc) “george orwell 1984″ Or perhaps your looking for some specific video file:

7 Clever Google Tricks Worth Knowing. Email Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of.

7 Clever Google Tricks Worth Knowing

Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks and hacks. Although there are many others out there, these 7 tricks are my all-time favorite. Enjoy yourself. 1. 2. 3. You’re connecting to a public network at a coffee shop or internet café and you want privacy while you browse the web. There are subscription services and applications available such as TOR and paid VPN servers that do the same thing. 4. 5. 6. 7. Bonus Material: Here is a list of my favorite Google advanced search operators, operator combinations, and related uses: Want more info on Google Hacking? If you enjoyed this article, check out our new best-selling book. And get inspiring life tips and quotes in your inbox (it's free)... Online Safety: Understanding Hackers, Phishers, and Cybercriminals. Have you ever been the victim of identity theft?

Online Safety: Understanding Hackers, Phishers, and Cybercriminals

Ever been hacked? Here’s the first in a series of critical information to help you arm yourself against the surprisingly frightening world of hackers, phishers, and cybercriminals. Some of our geekier readers will already be familiar with a lot of this material—but maybe you have a grandfather or other relative that could benefit from having this passed on. And if you have your own methods for protecting yourself from hackers and phishers, feel free to share them with other readers in the comments. Otherwise, keep reading—and stay safe. Why Would Anyone Want to Target Me? This is a common attitude; it just doesn’t occur to most people that a hacker or cybercriminal would think to target them. Who Are these Bad Guys?

Before we take a look at specifics, it’s important to understand who it is that’s looking to take advantage of you. What Is A Hacker? As most people use the word today, “hackers” are thieves and criminals. What is Phishing? Tools for survival...