background preloader

Google HTML/CSS Style Guide

Google HTML/CSS Style Guide
Strictly keep structure (markup), presentation (styling), and behavior (scripting) apart, and try to keep the interaction between the three to an absolute minimum. That is, make sure documents and templates contain only HTML and HTML that is solely serving structural purposes. Move everything presentational into style sheets, and everything behavioral into scripts. In addition, keep the contact area as small as possible by linking as few style sheets and scripts as possible from documents and templates. Separating structure from presentation from behavior is important for maintenance reasons. <! <! Related:  Google Search 3T

100+ Google Tricks That Will Save You Time in School – Eternal Code [via onlinecolleges.net] With classes, homework, and projects–not to mention your social life–time is truly at a premium for you, so why not latch onto the wide world that Google has to offer? From super-effective search tricks to Google hacks specifically for education to tricks and tips for using Gmail, Google Docs, and Google Calendar, these tricks will surely save you some precious time. Search Tricks These search tricks can save you time when researching online for your next project or just to find out what time it is across the world, so start using these right away. Convert units. Google Specifically for Education From Google Scholar that returns only results from scholarly literature to learning more about computer science, these Google items will help you at school. Google Scholar. Google Docs Google Docs is a great replacement for Word, Excel, and PowerPoint, so learn how to use this product even more efficiently. Use premade templates. Gmail Use the Tasks as a to-do list.

Google hacking Basics[edit] The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file. intitle:admbook intitle:version filetype:php One can even retrieve the username and password list from Microsoft FrontPage servers by inputting the given microscript in Google search field: "#-Frontpage-" inurl:administrators.pwd Devices connected to the Internet can be found. Another useful search is following intitle:index.of[1] followed by whatever you want to search. Advanced operators[edit] There are many similar advanced operators which can be use to exploit insecure websites: See also[edit] Johnny Long#Google hacking External links[edit]

GHH - The "Google Hack" Honeypot How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” 3. “?

Power Google www.google.com Welcome to Power Google, By Robert Harris, a practical, how-to book about using Google to locate information on the Internet. Below you will find a brief description of each chapter’s content along with two formats in which they can be viewed (Adobe® or HTML). Please note: Download times will depend on the Internet connection. Chapter 1: Why use Google? (41.0K) | or |HTML| Chapter 2: Developing a Search StrategyIf you want only a quick take on a common idea, you can simply type in the appropriate phrase into Google’s search box and quickly find your answer. (41.0K) | or |HTML| Chapter 3: Building a QueryOne of the advantages of Google’s effective method of finding and ordering pages for you is that even a simple search, such as typing in a couple of words, can produce excellent results. (42.0K) | or |HTML| (48.0K) | or |HTML| (37.0K) | or |HTML| (39.0K) | or |HTML| (52.0K) | or |HTML| (38.0K) | or |HTML| Chapter 9: More GoogleGoogle features much more than a Web search engine.

Focus on the User 7 Clever Google Tricks Worth Knowing Email Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of. Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks and hacks. Although there are many others out there, these 7 tricks are my all-time favorite. 1. 2. 3. You’re connecting to a public network at a coffee shop or internet café and you want privacy while you browse the web. There are subscription services and applications available such as TOR and paid VPN servers that do the same thing. 4. 5. 6. 7. Bonus Material: Here is a list of my favorite Google advanced search operators, operator combinations, and related uses: Want more info on Google Hacking? If you enjoyed this article, check out our new best-selling book. And get inspiring life tips and quotes in your inbox (it's free)...

UPDATED – Using Googles Full Capabilities « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Here is an updated version of the ‘Using Google’s Full Capabilities’. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here. Enjoy. Each of these things can be copied and pasted into Google search for some good old fashioned fun! Enjoy! admin account info” filetype:log ! Code: nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail? “Warning: mysql_connect(): Access denied for user: ‘*@*” “on line” -help -forum “Warning: mysql_query()” “invalid query” “Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL” “Warning: Supplied argument is not a valid File-Handle resource in” “Warning:” “failed to open stream: HTTP request failed” “on line” “Warning:” “SAFE MODE Restriction in effect.”

Google bomb A Google bomb on March 31st, 2013. Despite Google's intervention, some of the first search results still refer to Bush. The terms Google bomb and Googlewashing refer to the practice of causing a web page to rank highly in search engine results for unrelated or off-topic search terms by linking heavily. In contrast, search engine optimization (SEO) is the practice of improving the search engine listings of web pages for relevant search terms. It is done for either business, political, or comedic purposes (or some combination thereof).[1] Google's search-rank algorithm ranks pages higher for a particular search phrase if enough other pages linked to it use similar anchor text (linking text such as "miserable failure"). By January 2007, however, Google tweaked its search algorithm to counter popular Google bombs such as "miserable failure" leading to George W. History[edit] Uses as tactical media[edit] Alternative meanings[edit] Google bowling[edit] Beyond Google[edit] Motivations[edit]

Les 200 paramètres de l’algorithme de Google | ThuGeek, blog geek, web et thug ! Suite à un article très complet de la charmante Ann Smarty, spécialiste du référencement naturel sur le site searchenginejournal.com, qui présente les 200 paramètres de l’algorithme de Google, je sous présente ici une traduction en Français pour que le SEO n’ai plus aucun secret pour vous ! Le domaine… - l’age du domaine - la durée d’enregistrement du domaine - la mise à disposition des information sur l’enregistrement du domaine (nom, adresse, etc.) - l’extension du domaine (extension locale : .fr ou générique : .com) - l’utilisation de sous-domaines - derniers enregistrements du domaine (fréquence de changement de l’ip associée) - derniers propriétaires du domaine (fréquence de changement du propriétaire) - mots clefs dans le nom de domaine Le domaine doit faire preuve de longévité et de stabilité pour avoir la confiance de Google quand aux intentions du propriétaire. « Le contenu est roi »! Il est important de faire attention aux liens que l’on fera vers d’autres sites web.

Related: