background preloader

Google Dorks

Google Dorks
cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. link: The query [link:] will list webpages that have links to the specified webpage. related: The query [related:] will list web pages that are “similar” to a specified web page. info: The query [info:] will present some information that Google has about that web page. define: The query [define:] will provide a definition of the words you enter after it, gathered from various online sources. stocks: If you begin a query with the [stocks:] operator, Google will treat the rest of the query terms as stock ticker symbols, and will link to a page showing stock information for those symbols. site: inurl: Related:  interestkcmmnem

Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. Always be cautious when running one of these (or similar) commands (or downloaded scripts) that have been "recommended" as a solution to a problem you may have with your computer. It is also worthwhile to always enable a Kubuntu screensaver or Ubuntu screensaver with a password so that a casual passerby is not able to maliciously execute one of these commands from your keyboard while you are away from your computer. Here are some common examples of dangerous commands that should raise a red flag. rm -rf / rm -rf . rm -rf * rm -r Forkbomb In Perl or

Google hacking master list This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. There are some drawbacks in how Johnny I hack stuff works, you have to do a lot of clicking to get to the right hacks. Check it out, here is a copy of the master list in case you do not want to go to a hacker forum in Russia, or do not want to sign up for a scribd account (the only way to download it or cut and paste the document in Scribd is to make an account). Code: admin account info" filetype:log ! nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?

How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. Using Google to Hack Security Cameras: There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. intitle:index.of finances.xls

Hexxeh's Blog - Home of…um, well, Hexxeh… Escrapbooking Feelings and Emotions Vocabulary Word List Advertisement. EnchantedLearning.com is a user-supported site. As a bonus, site members have access to a banner-ad-free version of the site, with print-friendly pages.Click here to learn more. (Already a member? Click here.) More Word Lists KaKaRoTo's Blog The National Career Development Association These links include many resources, services, and tools which assist users in exploring careers, planning for the future, searching for employment, and finding the additional training necessary to pursue a dream. Most of these resources are free, and several were developed in countries other than the United States. This is a mere sample of what is available online, but it can serve as a starting point for career counselors or for career-seekers. The following links are from the book, The Internet: A Tool for Career Planning, (Third Edition, 2011) by Debra S. Osborn, Margaret Riley Dikel, & James P. Before using the links, please review the NCDA Legal Notice and Disclaimer.

25 Common Phrases That You're Saying Wrong Being a freelance writer, I often find myself messing up common phrases. When I’m unsure, I do a quick Google search to make sure that what I’m writing is actually what I’m trying to say. This inspired me to come up with a list of common phrases that people frequently get wrong. Some of them aren’t completely our fault because the incorrect way of saying them has actually become the “norm”. Here’s my list of common phrases that you might be saying incorrectly. The phrases on the left are incorrect, the ones on the right are correct. 1: Nip it in the butt vs. Nipping something in the bud means that you’re putting an end to it before it has a chance to grow or start. 2: I could care less vs. Saying that you could care less about a topic implies that you do care about it at least a little. 3: One in the same vs.One and the same When you really sit and think about it, “one in the same” doesn’t mean anything at all. 4: You’ve got another thing coming vs. 5: Each one worse than the next vs.

Zone-H.org - Unrestricted information All top 100 lists Our top 100 lists deliver you to the best of the web. Each list is divided into categories to help you find just what you want (Camera Reviews in the Photo 100 list, for instance, or Deals and Coupons in the Shopping 100). These categories are available from the drop-down menus above, which appear on all pages at Web100. Web 100 Our classic top 100 list of the web’s best sites. The ultimate list to discover the best of the web. Photo 100 The best in photography. Viral Video 100 Hilarious. The following lists are no longer being updated: Books 100 The best books, reviewed. Food 100 All about food. Indie 100 Music, comics, film, and more. Shopping 100 The web’s best shopping sites.

drudge report Google hacking From Wikipedia, the free encyclopedia Hacker technique Basics Devices connected to the Internet can be found. A search string such as inurl:"ViewerFrame? History The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database (GHDB) in 2004.[5][6] Google Dorking has been involved in some notorious cybercrime cases, such as the Bowman Avenue Dam hack[11] and the CIA breach where around 70% of its worldwide networks were compromised.[12] Star Kashman, a legal scholar, has been one of the first to study the legality of this technique.[13] Kashman argues that while Google Dorking is technically legal, it has often been used to carry out cybercrime and frequently leads to violations of the Computer Fraud and Abuse Act.[14] Her research has highlighted the legal and ethical implications of this technique, emphasizing the need for greater attention and regulation to be applied to its use. Protection References External links

Related: