background preloader

Google Search Operators

Google Search Operators
The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description — or, to read about all of the operators, simply scroll down and read all of this page. The following is an alphabetical list of the search operators. This list includes operators that are not officially supported by Google and not listed in Google’s online help. Each entry typically includes the syntax, the capabilities, and an example. Some of the search operators won’t work as intended if you put a space between the colon (:) and the subsequent query word. allinanchor: If you start your query with allinanchor:, Google restricts results to pages containing all query terms you specify in the anchor text on links to the page. Anchor text is the text on a page that is linked to another web page or a different place on the current page. allintext: allintitle: allinurl: In URLs, words are often run together. author: cache: define: ext: filetype: group: id: inanchor:

http://www.googleguide.com/advanced_operators_reference.html

Related:  Usare GoogleGoogleGeekTipsGoogleDIVERS

Google Calendar Guide - Part I: Managing and Customizing Calendars Welcome to Part I of the Google Calendar Users Guide. This guide begins with a short overview of Google Calendars and how to get started. This User Guide then provides a comprehensive list of answers to"How do I" questions, broken down by category, to give you the tools you need to use the calendar effectively. We discuss how how to view, manage, add, delete, and rename calendars; how to make a calendar public, private, or shared, and how to customize the calendar window. We also discuss many customizing options such as setting working days, working hours, and the time zone; setting the format for dates and times, enabling keyboard shortcuts, and more.

About amnesia, noun: forgetfulness; loss of long-term memory. incognito, adjective & adverb: (of a person) having one's true identity concealed. Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux. Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.

Google Search Operators - Search Help You can use symbols or words in your search to make your search results more precise. Google Search usually ignores punctuation that isn’t part of a search operator. Don’t put spaces between the symbol or word and your search term. A search for site:nytimes.com will work, but site: nytimes.com won’t. TipSheet for IRE 2013 ( #IRE13 ) Today we have a special edition of SearchResearch. I'm attending the annual conference for Investigative Reporters & Editors and giving a 1 hour (fast!) tutorial on some aspects of advanced Google searching. I figured everyone might like to see this presentation, so I've put my notes here... This also serves as a TipSheet for the attendees at IRE. ____________________Digging in with Google: Search Tips & Strategies for Researchers A tipsheet/presentation summary for Investigative Reporters and Editors Conference (2013) San Antonio, TX (June 21, 2013) Full slide deck of my presentation.

10 URLs to Find Out What Google Knows About You Google is much more than just a search giant. It is also home to many of your favorite products: Gmail, YouTube, and Chrome, just to name a few. Apart from that, it also offers many products to help you keep track of your data. Stealthy malware targeting air-gapped PCs leaves no trace of infection Researchers have discovered highly stealthy malware that can infect computers not connected to the Internet and leaves no evidence on the computers it compromises. USB Thief gets its name because it spreads on USB thumb and hard drives and steals huge volumes of data once it has taken hold. Unlike previously discovered USB-born malware, it uses a series of novel techniques to bind itself to its host drive to ensure it can't easily be copied and analyzed. It uses a multi-staged encryption scheme that derives its key from the device ID of the USB drive. A chain of loader files also contains a list of file names that are unique to every instance of the malware. Some of the file names are based on the precise file content and the time the file was created.

Improve Your Google Search Skills [Infographic] Don’t limit yourself to just plugging in simple search terms to Google; check out this infographic and learn a search string search or two. You don’t need to limit yourself to searching just for simple strings; Google supports all manner of handy search tricks. If you want to search just HowToGeek.com’s archive of XBMC articles, for example, you can plug in site:howtogeek.com XBMC to search our site. Get More Out of Google [HackCollege via Mashable] Jason Fitzpatrick is a warranty-voiding DIYer who spends his days cracking opening cases and wrestling with code so you don't have to. If it can be modded, optimized, repurposed, or torn apart for fun he's interested (and probably already at the workbench taking it apart).

LunelBaar's Bookmarks (User twinzystich) Already a member? Log in Sign up with your... 10 amazing Google infographics I've rounded up ten recent infographics on Google, with lots of stats, tips on searching Google, the most expensive keywords, and 2011 revenues. Where possible, I've added the infographics to this post in a readable size, but for others you can click on the image to see a larger version... Google's 2011 revenues (via scoop.it) 3 Strange Things You Can Do With Google Docs That Are Actually Super Useful - The Gooru Google Docs has always been much more than just a cloud based text editor. Some of its best features are also some of its strangest. I often discover these obscure tools tucked away in Google Docs only to find myself pleasantly surprised when I end up using them everyday.

Meet KeySweeper, the $10 USB charger that steals MS keyboard strokes It sounds like the stuff of a James Bond flick or something described in documents leaked by former NSA subcontractor Edward Snowden. In fact, the highly stealthy keystroke logger can be built by someone with only slightly above-average technical skills for as little as $10. Called KeySweeper, it's a device disguised as a functioning USB wall charger that sniffs, decrypts, logs, and transmits all input typed into a Microsoft wireless keyboard. Power Google www.google.com Welcome to Power Google, By Robert Harris, a practical, how-to book about using Google to locate information on the Internet. Below you will find a brief description of each chapter’s content along with two formats in which they can be viewed (Adobe® or HTML). If you do not have an Adobe® Acrobat® reader or would like to update your current reader to the latest version, click on the Adobe® icon below for a free download. Please note: Download times will depend on the Internet connection. Chapter 1: Why use Google?

How to Use Google Search More Effectively [INFOGRAPHIC] Among certain circles (my family, some of my coworkers, etc.) I'm known for my Googling skills. I can find anything, anywhere, in no time flat.

Related:  googlingInformationalGoogleWebsite EvaluationgoogleFavorite Websitesgooglesafety first wear your googlesReadingsRandomGoogleGooglePearltrees videosMOTORES DE BUSQUEDA