background preloader

Google Dorks

Google Dorks
cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. link: The query [link:] will list webpages that have links to the specified webpage. related: The query [related:] will list web pages that are “similar” to a specified web page. info: The query [info:] will present some information that Google has about that web page. define: The query [define:] will provide a definition of the words you enter after it, gathered from various online sources. stocks: If you begin a query with the [stocks:] operator, Google will treat the rest of the query terms as stock ticker symbols, and will link to a page showing stock information for those symbols. site: inurl: Related:  interestkcmmnem

Google hacking master list This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. There are some drawbacks in how Johnny I hack stuff works, you have to do a lot of clicking to get to the right hacks. Check it out, here is a copy of the master list in case you do not want to go to a hacker forum in Russia, or do not want to sign up for a scribd account (the only way to download it or cut and paste the document in Scribd is to make an account). Code: admin account info" filetype:log ! nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?

How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. Using Google to Hack Security Cameras: There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. intitle:index.of finances.xls

Escrapbooking Feelings and Emotions Vocabulary Word List Advertisement. EnchantedLearning.com is a user-supported site. As a bonus, site members have access to a banner-ad-free version of the site, with print-friendly pages.Click here to learn more. (Already a member? Click here.) More Word Lists The National Career Development Association These links include many resources, services, and tools which assist users in exploring careers, planning for the future, searching for employment, and finding the additional training necessary to pursue a dream. Most of these resources are free, and several were developed in countries other than the United States. This is a mere sample of what is available online, but it can serve as a starting point for career counselors or for career-seekers. The following links are from the book, The Internet: A Tool for Career Planning, (Third Edition, 2011) by Debra S. Osborn, Margaret Riley Dikel, & James P. Before using the links, please review the NCDA Legal Notice and Disclaimer.

25 Common Phrases That You're Saying Wrong Being a freelance writer, I often find myself messing up common phrases. When I’m unsure, I do a quick Google search to make sure that what I’m writing is actually what I’m trying to say. This inspired me to come up with a list of common phrases that people frequently get wrong. Some of them aren’t completely our fault because the incorrect way of saying them has actually become the “norm”. Here’s my list of common phrases that you might be saying incorrectly. The phrases on the left are incorrect, the ones on the right are correct. 1: Nip it in the butt vs. Nipping something in the bud means that you’re putting an end to it before it has a chance to grow or start. 2: I could care less vs. Saying that you could care less about a topic implies that you do care about it at least a little. 3: One in the same vs.One and the same When you really sit and think about it, “one in the same” doesn’t mean anything at all. 4: You’ve got another thing coming vs. 5: Each one worse than the next vs.

All top 100 lists Our top 100 lists deliver you to the best of the web. Each list is divided into categories to help you find just what you want (Camera Reviews in the Photo 100 list, for instance, or Deals and Coupons in the Shopping 100). These categories are available from the drop-down menus above, which appear on all pages at Web100. Web 100 Our classic top 100 list of the web’s best sites. The ultimate list to discover the best of the web. Photo 100 The best in photography. Viral Video 100 Hilarious. The following lists are no longer being updated: Books 100 The best books, reviewed. Food 100 All about food. Indie 100 Music, comics, film, and more. Shopping 100 The web’s best shopping sites.

drudge report 80 Mind-Blowing Facts That Sound Stranger Than Fiction But Are Completely True Some say that facts are often stranger than fiction. Did you know that there’s an animal that produces pink milk, or that it is almost with certainty that the water you are drinking right now once passed through a dinosaur? Here is a collection of 80 fascinating facts to enrich your knowledge. 1. 2. Harvard is the oldest higher education institution in the US, founded in 1636. 3. Star Wars premiered in theaters in May 1977. 4. 5. 6. Source 7. Source 8. 9. 10. 11. 12. Source 13. 14. Source 15. 16. 17. 18. 19. 20. 21. Source 22. 23. 24. Otto Frederick Rohwedder invented sliced bread in 1928, while Betty White was born in 1922. 25. 26. 27. 28. 29. Source 30. Source While most mammoths died out long before civilizations arose, a small population survived until 1650 BC. 31. 32. 33. 34. Source 35. Source 36. 37. 38. Source John Tyler served from 1841 to 1845, a full 20 years before Abraham Lincoln. 39. 40. 41. 42. Source 43. 44. 45. 46. Source 47. 48. 49. 50. 51. 52. Source 53. Source 54. 55. 56. 57. 58.

Home - The Daily Bell Photojournal: NASA's Image Access Home Page Five common errors in requirements analysis (and how to avoid them) In the traditional waterfall model of software development, the first phase of requirements analysis is also the most important one. There are a number of problems with this theoretical model, and these can cause delays and errors in the rest of the process. This article discusses some of the more common problems that project managers experience during this phase, and suggests possible solutions. This article is also available as a TechRepublic download. In the traditional waterfall model of software development, the first phase of requirements analysis is also the most important one. This analysis includes understanding the customer's business context and constraints, the functions the product must perform, the performance levels it must adhere to, and the external systems it must be compatible with. Well, at least that's the way it's supposed to work theoretically. Problem 1: Customers don't (really) know what they want To solve this problem, you should:

Did you know

Related: