background preloader

UPDATED – Using Googles Full Capabilities « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.

UPDATED – Using Googles Full Capabilities « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.
Here is an updated version of the ‘Using Google’s Full Capabilities’. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here. Enjoy. Each of these things can be copied and pasted into Google search for some good old fashioned fun! Enjoy! admin account info” filetype:log ! Code: nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail? “Warning: mysql_connect(): Access denied for user: ‘*@*” “on line” -help -forum “Warning: mysql_query()” “invalid query” “Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL” “Warning: Supplied argument is not a valid File-Handle resource in” “Warning:” “failed to open stream: HTTP request failed” “on line” “Warning:” “SAFE MODE Restriction in effect.”

http://www.smdepot.net/news/computer-tutorials/updated-using-googles-full-capabilities/

Related:  Google Search 3TAPPS/EXTS

7 Clever Google Tricks Worth Knowing Email Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of. Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks 27 People Share The One Cool Internet Or Computer Trick They Know 1. A shortcut to any website. Whatever you type into the URL bar can be surrounded by www. & .com by pressing control + enter. 2.

How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras Turn Your Home Router Into a Super-Powered Router with DD-WRT Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. Stay tuned, as we’ll go into more depth in a couple more days on all the great things you can do with it, but even if you don’t use the additional features, DD-WRT is worth installing to make your router work better. What Is DD-WRT? Here’s our router.

The Ultimate Guide To Cloning In Photoshop - Smashing Magazine Advertisement Photoshop’s wide array of cloning tools is the cause of many of the absolute best and worst works created with the application. In a skilled and experienced hand, these tools lead to phenomenal results. In the hands of a careless artist, Photoshop cloning can be disastrous to the credibility of the result. This article introduces the several cloning tools available in Photoshop and goes over the proper usage and best practices of each. The Clone Stamp Tool 10 Search Engines to Explore the Invisible Web No, it’s not Spiderman’s latest web slinging tool but something that’s more real world. Like the World Wide Web. The Invisible Web refers to the part of the WWW that’s not indexed by the search engines.

Use Google To Find Secrete and Hidden Files Home » Tech » Use Google To Find Secrete and Hidden Files Did you know that you can easily find unprotected, secrete files on the internet by simply doing some Google Searches on web directories that do not have a default index file or have set file and folder permissions incorrectly? With these directories, you can find some interesting and unprotected files like videos, swf files and music. Firesheep The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit]

How To Give Your Photos a Dark Processed Lomo Effect This post was originally published in 2010 The tips and techniques explained may be outdated. Follow this step by step post processing guide to give your photos a dark lomo style effect with high contrast, blue tones and vignette burns. The effect is based on the popular lomographic technique and is similar to the processing effect used in many fashion shots and advertisement designs. Overall this effect does a great job of adding impact to a plain photography with cool colour casts and unusual saturation. Google hacking master list This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. There are some drawbacks in how Johnny I hack stuff works, you have to do a lot of clicking to get to the right hacks. This master list also includes things I have not seen or tried yet meaning that the body of knowledge for Google hacks is still being expanded upon.

15 Handy Google Search Tricks Most of us use Google search to search on various topics, products, tips, etc. No doubt it’s one of the best search engines available out there. In order to search something we simply enter the keywords in the search bar and search for stuff but did you ever know that there are several built in functions within Google which makes searching stuff even easier. Some of you’ll know about them. But well if you don’t, then here they are: DuckDuckGo: Escape your search engine filter bubble "But here's why some people probably don't like personalization: It's invisible. There is nothing on the results page that tells you whether your results are personalized or not." Sorry, this is just not the case: we do provide indication on Google's search results page for personalized results. Here's a couple links that talk about how we surface whether results have been personalized: is our support page and is an article on Search Engine Land from 2008 when we started surfacing information on how results were personalized. Here's a simple demo. Do a search in Chrome incognito mode and go to the bottom of the page.

Know the Trade Your IT Security Information Portal CISSP/CEH/CISA/Hacker... Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc

Related:  Technology/SoftwareComputer stuffhectorosorioInternet...Google's Worldpcgoogle tricksdebasis005