版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.csdn.net/topmvp - topmvp
*Learn Google Searching Basics
*Explore Googles Web-based Interface, build Google queries, and work with Google URLs.
*Use Advanced Operators to Perform Advanced Queries
*Combine advanced operators and learn about colliding operators and bad search-fu.
*Learn the Ways of the Google Hacker
*See how to use caches for anonymity and review directory listings and traversal techniques.
*Review Document Grinding and Database Digging
*See the ways to use Google to locate documents and then search within the documents to locate information.
*Understand Googles Part in an Information Collection Framework
*Learn the principles of automating searches and the applications of data mining.
*Locate Exploits and Finding Targets
*Locate exploit code and then vulnerable targets.
*See Ten Simple Security Searches
*Learn a few searches that give good results just about every time and are good for a security assessment.
*Track Down Web Servers
*Locate and profile web servers, login portals, network hardware and utilities.
*See How Bad Guys Troll for Data
*Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.
*Hack Google Services
*Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.
http://rapidshare.com/files/116170445/1597491764.zip
http://depositfiles.com/files/5474082
*Learn Google Searching Basics
*Explore Googles Web-based Interface, build Google queries, and work with Google URLs.
*Use Advanced Operators to Perform Advanced Queries
*Combine advanced operators and learn about colliding operators and bad search-fu.
*Learn the Ways of the Google Hacker
*See how to use caches for anonymity and review directory listings and traversal techniques.
*Review Document Grinding and Database Digging
*See the ways to use Google to locate documents and then search within the documents to locate information.
*Understand Googles Part in an Information Collection Framework
*Learn the principles of automating searches and the applications of data mining.
*Locate Exploits and Finding Targets
*Locate exploit code and then vulnerable targets.
*See Ten Simple Security Searches
*Learn a few searches that give good results just about every time and are good for a security assessment.
*Track Down Web Servers
*Locate and profile web servers, login portals, network hardware and utilities.
*See How Bad Guys Troll for Data
*Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.
*Hack Google Services
*Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.
http://rapidshare.com/files/116170445/1597491764.zip
http://depositfiles.com/files/5474082