background preloader

How To Search On Google Like Elite Hackers

How To Search On Google Like Elite Hackers
Google is best search engine in the world. Actually people think that Google's popularity is because of its simple and fast searching interface but friends, its more popular because it has rich operators and query support that will make your searching experience even better. Most of us doesn't know which operators are supported by Google and if they know some of them, they doesn't know how actually these operators work and enrich our searching practice. Today, i will tell you How we can search on Google like elite hackers or simply say computer experts do. But for this its necessary that you should know and understand all the Google operators properly. So lets learn how we can enrich our searching experience in Google. Google operators: Google operators are classified into two basic categories:1. Basic Google Operators:- Advanced Operators:- 1) Intitle :- This operator searches within the title tags. intitle:"index of" returns all pages that have string "index of" in their title. 1. 2. 3.

http://www.hackingloops.com/2011/10/how-to-search-on-google-like-elite.html

Related:  doxingsecurity and hackingsecurity and hackingGoogle Hacksgoogling

Hidden Search Operators Want to search through your WorkFlowy account like a pirate ninja? There are a number of “secret” search operators that you can use to get a lot more power out of the search feature. These operators are unofficial features because we plan to add nice interfaces for (most of) them, but for now you power users (you know who you are) will find these useful. Start Hacking Google Dorks I have explained what is google dork and how to create it. If you have not read that post you can read here Google hacking So now i am going to explain you how hacker use these google dorks to create complex query to google search engine to extract the results that normal user can’t.

How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites.

How-To Find Files In Unprotected Directories We’ve all got a little voyeurism in us. That’s a big reason why the post, Clearing Google Search History to Maintain Your Privacy sent my visitor counts off the charts :). In this article, I’m going to show you how to create search queries that will list the contents of unprotected directories on the internet. You’ll be able to play the music files, watch the videos, look at photos and more. I have to say, it’s really addicting.

10000 Search Engine Queries for your Link Building Campaign Here I present to you, the most exhaustive list of beginners and advanced search engine queries which can help you greatly in finding potential linking partners. You can also use CTRL F + ‘Search Term’ to find what you are looking for. Search Queries Menu Find Websites where you can find industry resources: Keyword + “top 10 resources”/”top resources” Keyword + “top 10 sites/”top sites” Keyword + “top 10 websites”/”top websites” Keyword + “top 10 articles”/ “top articles” Keyword + “top 10 tools”/”top tools” Keyword + “top 10 web resources”/”top web resources” Keyword + “top 10 internet resources”/”top internet resources” Keyword + “top 10 online resources”/”top online resources” CELL PHONE HACKS Since the popularity of text messages have significantly increased during the recent years, it has also become a popular channel for most people to exchange secret messages and engage in dubious activities. These text messages can Read More

FireEye, Inc. - Videos - Google+ -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Corporate Headquarters 1440 McCarthy Blvd. Milpitas, CA 95035 Toll-free: (877) FIREEYE (877-347-3393) (Option 1 for Support, 2 for Sales, 3 for Analyst Relations, 4 for Marketing/Public Relations) Main line: +1-408-321-6300 Fax line: +1-408-321-9818 Email: info@fireeye.com -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Federal DC 1420 Beverly Rd. Ste. 150 McLean, VA 22101 Main line: +1-703-942-6970 Fax line: +1-703-942-6971 -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Latin America Misiones 5251 Buenos Aires, B1880CAI Argentina Main line: +5 491144945285 Email: LATAM@fireeye.com Mexico Av.

How To Hack Google Plus For SEO Value People tend to think of Google Plus as just another social network, built as Google’s challenge to Facebook’s incredible growth over the past decade. What most people don’t realize, however, is the SEO value that makes Google+ so much more than just a social networking platform. How so? Studies show a powerful correlation between search rankings and the number of Google +1's received by a URL. Google Guide Quick Reference: Google Advanced Operators (Cheat Sheet) The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description — or, to read about all of the operators, simply scroll down and read all of this page. The following is an alphabetical list of the search operators.

10 URLs to Find Out What Google Knows About You Google is much more than just a search giant. It is also home to many of your favorite products: Gmail, YouTube, and Chrome, just to name a few. Apart from that, it also offers many products to help you keep track of your data. Most of these are hidden deep inside the My Account dashboard, which many users don’t really know of. These hidden tools may reveal interesting details about your usage of Google’s many services. We’ve compiled a list of important Google URLs of some hidden tools that carry information of what you did with Google, mostly from the searches that you have made on their many products, the voice searches and typed out Google searches that you have made.

The definitive glossary of hacking terminology We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks. Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not. Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. Top 50 Hacking Tools That You Must Have Whether you are a Penetration tester, a hacker or an aspiring newbie trying to learn Cyber Security, you must have a nice catalogue of tools to make your life easier. While these tools do make working simpler but cannot compensate for the vast amount of knowledge required in this field. In this post i’m going to mention 50 different tools under 9 categories that your ‘Hack Lab’ must have.

Related: