background preloader

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE!

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE!
Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in. Try a few of these searches: intitle:”Index of” passwords modified allinurl:auth_user_file.txt “access denied for user” “using password” “A syntax error has occurred” filetype:ihtml allinurl: admin mdb “ORA-00921: unexpected end of SQL command” inurl:passlist.txt “Index of /backup” “Chatologica MetaSearch” “stack tracking:” “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums put this string in google search: ?

http://www.smdepot.net/news/computer-tutorials/using-googles-full-capabilities/

Related:  Search enginesHacksIT Tips

Clustering Engine Carrot2 Search Results Clustering Engine Carrot2 organizes your search results into topics. With an instant overview of what's available, you will quickly find what you're looking for. Choose where to search: Type your query: How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

10 Best Security Software Tools for Linux that you should check out. 1. John the Ripper The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. Alt Codes - How to make those Smiley Faces For those who would like to know how to do the copyright symbol © or the Registered Trademark symbol ® or other things like funny faces etc. For all of these you press the ALT key and while the ALT key is pressed down you put in the numbers from your NUMBER PAD on your keyboard- (it won't work using the numbers at the top of the keyboard) make sure your NUM LOCK is ON. There are all different kinds of codes, from those drivers use in a truckers report forum to Alt codes like those found here. Of course when truckers report in on a truckers report forum their codes are very different from those found below, they don't comment on copyright codes but rather codes of the road...even still codes are extremely important in various occupations. Below you'll find a comprehensive list to help you learn more about Alt Codes.

Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Security Community Training For reference purposes, and whatever purposes you choose, here are the original Fate tutorials which should help you in your attempts to learn. The creators of this site or the ISP hosting this site take no responsibility for the contents of this page, everything is provided for an educational purpose only Training session 1: John the Ripper Difficulty: Extremely EasyLearn to use this tool to crack passwd files Creator: m101 Training session 2: Directory Traversal Difficulty: Extremely EasyLearn how it is possible to 'Directory Surf' Creator: m101 Training session 3: Number Systems Difficulty: Extremely EasyLearn the use of Number Systems and how to convert between them Creator: m101

MAIN - Crack a Wi-Fi Network's WEP Password with BackTrack, the Fancy Video Version - Lifehacker @Thomas Wrobel: Sadly, it is important to secure your wireless. While I'd consider it no big deal for others to leech some bandwidth for email or browsing, if they use it for piracy and get caught, you're liable. @Thomas Wrobel: You are forgetting that you can be punished for what people do with your connection. 15 Web Alternatives to Popular Desktop Software Web applications for business have come a long way. They used to be poor imitations of their desktop counterparts, with only one or two functions and not at all practical. But my, have these apps grown. Today’s SaaS business and CRM apps have become so powerful and useful that in many cases, they’ve begun to replace traditional desktop software such as Microsoft Dynamics, Sage, SAP, etc. Desktop apps are great and all, but they don’t provide the same benefits as business apps that make use of cloud computing. With most SaaS apps, you only need a browser and an internet connection to access all your data online.

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-"

Related:  InternetTools Hacks How-tos