Google Hacking Archives - Hacking Articles
First login in your Gmail account than Go to google.com and search for what you want. You got the search results and you saw that domain which you don’t want to see again in your search results. Click the browser’s back button from the website, which will give you the previous search results, but this time you can see a new link as shown in below image. Now you will be able to see “Block all Feature to this Website. Manage your blocked sites by clicking on the above ‘Manage blocked sites’ link or log-in to google and accessing the reviews URL.
100+ Google Tricks That Will Save You Time in School – Eternal Code
[via onlinecolleges.net] With classes, homework, and projects–not to mention your social life–time is truly at a premium for you, so why not latch onto the wide world that Google has to offer? From super-effective search tricks to Google hacks specifically for education to tricks and tips for using Gmail, Google Docs, and Google Calendar, these tricks will surely save you some precious time.
Finding Serial Key Of Any Software Using Simple Google Trick
Most of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very intersting google trick which will allow you to find serial key of any software very easily How To Find Serial Key Of Any Software ? The key 94FBR is a part of Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for.
How To Use Google For Hacking
Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras
Bugtraq: Multiple vulnerabilities in OpenText Documentum Content Server
Bugtraq mailing list archives Multiple vulnerabilities in OpenText Documentum Content Server From: "Andrey B. Panfilov" <andrew () panfilov tel> Date: Sat, 14 Oct 2017 00:40:37 +1100 CVE Identifier: CVE-2017-15012 Vendor: OpenText Affected products: OpenText Documentum Content Server (all versions) Researcher: Andrey B. Panfilov CVSS v3 Base Score: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Fix: not available Description: Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) does not properly validate input of PUT_FILE RPC-command which allows any authenticated user to hijack arbitrary file from Content Server filesystem, because some files on Content Server filesystem are security-sensitive this security flaw leads to privilege escalation CVE Identifier: CVE-2017-15013 Vendor: OpenText Affected products: OpenText Documentum Content Server (all versions) Researcher: Andrey B.
14 Google Tools You Didn't Know Existed
Now that you've written your eulogies for Google Reader, it's a good time to remember that Google has an abundance of other resources that may not be as popular but still deserve a spotlight. We rounded up some lesser-known Google tools and applications that could help you cope with the loss of Reader and rekindle your love for Google. From fun tools like Google Ngram Viewer to useful resources like Full Value of Mobile Calculator, you'll find an array of tools for developers to small business owners to the average consumer. Take a look at the gallery and let us know what your favorite Google tool is in the comments. Image courtesy of Flickr, Scobleizer.
TCP/IP Fingerprinting Methods Supported by Nmap
Nmap OS fingerprinting works by sending up to 16 TCP, UDP, and ICMP probes to known open and closed ports of the target machine. These probes are specially designed to exploit various ambiguities in the standard protocol RFCs. Then Nmap listens for responses.
Webmin 1.850 - Multiple Vulnerabilities
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] ISR: ApparitionSec Vulnerability summary The following advisory describes three (3) vulnerabilities found in Webmin version 1.850
dorkbot – Scan Google search results for vulnerability. – Security List Network™
LEGAL DISCLAMERThe author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build to show how resource files can automate tasks. dorkbot is a modular command-line tool for performing vulnerability scans against a set of webpages returned by Google search queries in a given Google Custom Search Engine. It is broken up into two sets of modules: + Indexers – modules that issue a search query and return the results as targets + Scanners – modules that perform a vulnerability scan against each target Targets are stored in a local database upon being indexed. Once scanned, any vulnerabilities found by the chosen scanner are written to a standard JSON report file.
PGP word list
The PGP Word List ("Pretty Good Privacy word list", also called a biometric word list for reasons explained below) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel. They are analogous in purpose to the NATO phonetic alphabet used by pilots, except a longer list of words is used, each word corresponding to one of the 256 unique numeric byte values. History and structure[edit]
Node.js and MongoDB - Getting started with MongoJS
HEADS UP! This article was written for an older version of node. More up-to-date information may be available elsewhere. It won't be an exaggeration if one claims that in the past few months Node.js and MongoDB have literally taken the software and web industries by storm. Not just bleeding-edge startups but even medium and large enterprises are leveraging these two technologies to deliver a better experience to their users by build more capable, performant and scalable apps. So what is Node.js?
Official Website
Public Key for PGP Signing Starting from v3.3.4 all source tarballs and binaries are signed. The key currently used is: 4096R/5B7CC9A2 Fingerprint: D8F3DA77AAC6741053599C136E4A2D025B7CC9A2 You can also download it from here Previously the following key was used to sign the v3.3.4 source tarballs and v3.3.4 Windows installer only: 4096R/520EC6F6 Fingerprint: F4A5FD201B117B1C2AB590E2A1ACCAE4520EC6F6