
Google hacking master list This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. There are some drawbacks in how Johnny I hack stuff works, you have to do a lot of clicking to get to the right hacks. This master list also includes things I have not seen or tried yet meaning that the body of knowledge for Google hacks is still being expanded upon. Check it out, here is a copy of the master list in case you do not want to go to a hacker forum in Russia, or do not want to sign up for a scribd account (the only way to download it or cut and paste the document in Scribd is to make an account). Code: admin account info" filetype:log ! nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?
7 Clever Google Tricks Worth Knowing Email Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of. Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks and hacks. 1. 2. 3. You’re connecting to a public network at a coffee shop or internet café and you want privacy while you browse the web. There are subscription services and applications available such as TOR and paid VPN servers that do the same thing. 4. 5. 6. 7. Bonus Material: Here is a list of my favorite Google advanced search operators, operator combinations, and related uses: Want more info on Google Hacking? If you enjoyed this article, check out our new best-selling book. And get inspiring life tips and quotes in your inbox (it's free)...
80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Below are some really useful hacking tutorials and resources you may want to explore in your journey of learning to hack
Heartbleed bug: Check which sites have been patched The Heartbleed bug is serious. Disclosed less than two days ago, the Heartbleed bug has sent sites and services across the Internet into patch mode. For an in-depth explanation of what exactly Heartbleed is, and what it does, read this post by our own Stephen Shankland. In essence, the bug potentially exposed your username and password on sites like Facebook, Google, Pinterest, and more. Using Alexa.com, we've been going through the list of the top 100 sites in the US, plus a few extras, and asking "Have you patched the Heartbleed bug yet?" While we wait to hear back, we will be testing the sites against the Qualys SSL Server Test. You may notice some companies will be marked as "was not vulnerable." If you're checking back after seeing earlier versions of this story, you may also notice that some statuses have changed.
REVEALED: Hundreds of words to avoid using online if you don't want the government spying on you Department of Homeland Security forced to release list following freedom of information requestAgency insists it only looks for evidence of genuine threats to the U.S. and not for signs of general dissent By Daniel Miller Published: 09:32 GMT, 26 May 2012 | Updated: 17:46 GMT, 26 May 2012 Revealing: A list of keywords used by government analysts to scour the internet for evidence of threats to the U.S. was released under the Freedom of Information Act The Department of Homeland Security has been forced to release a list of keywords and phrases it uses to monitor social networking sites and online media for signs of terrorist or other threats against the U.S. The intriguing the list includes obvious choices such as 'attack', 'Al Qaeda', 'terrorism' and 'dirty bomb' alongside dozens of seemingly innocent words like 'pork', 'cloud', 'team' and 'Mexico'. Scroll down for full list However the agency admitted that the language used was vague and in need of updating.
Science News Documentary Heaven 900-Year-Old Viking Message Solved! Photo by Jonas Nordby via forskning.no For the past several years researchers have been trying to crack a Viking rune alphabet known as Jötunvillur, a perplexing code dating back to the 11th or 12th century that’s been found in some 80 inscriptions including the scratched piece of wood found above. Recently runologist (!) For the jötunvillur code, one would replace the original runic character with the last sound of the rune name. The act of coding secret messages appears to have been a leisure activity amongst the Vikings, as some of the other translated inscriptions turned out to be playful taunts at the person doing the decoding. Update: Ida Kvittingen wrote to clarify several aspects of this piece that appears to have been lost in translation from the original article in Forskning.no. The inscription “kiss me” is NOT written using the jötunvillur code. For further information you can see more the article in an English version on ScienceNordic.
Completely Useless, Yet Interesting, Facts Collection This is a web site of all the useless facts, cool trivia, and interesting information that have been collected from various sources over the past few years. True to its name, most of the facts are useless, but many of them may actually help you in the future. Random Facts Giraffes are the only animals born with horns. Both males and females are born with bony knobs on the forehead. An old law in Bellingham, Washington, made it illegal for a woman to take more than 3 steps backwards while dancing. Golf was banned in England in 1457 because it was considered a distraction from the serious pursuit of archery. When Coca-Cola began to be sold in China, they used characters that would sound like "Coca-Cola" when spoken. The only insect that can turn its head 360 degrees is the praying mantis. The short-term memory capacity for most people is between five and nine items or digits. Richard Milhouse Nixon was the first US President whose name contains all the letters from the word "criminal".
List of common misconceptions From Wikipedia, the free encyclopedia Each entry on this list of common misconceptions is worded as a correction; the misconceptions themselves are implied rather than stated. These entries are concise summaries; the main subject articles can be consulted for more detail. A common misconception is a viewpoint or factoid that is often accepted as true but which is actually false. They generally arise from conventional wisdom (such as old wives' tales), stereotypes, superstitions, fallacies, a misunderstanding of science, or the popularization of pseudoscience. Some common misconceptions are also considered to be urban legends, and they are sometimes involved in moral panics. Arts and culture[edit] Business[edit] Federal legal tender laws in the United States do not require that private businesses, persons, or organizations accept cash for payment, though it must be treated as valid payment for debts when tendered to a creditor.[1] Food and cooking[edit] Food and drink history[edit] Music[edit]