Google Tips and Tricks

Excellent tips, tricks and techniques of Google Hacks

Excellent tricks and techniques of Google Hacks

tip and trick googleThese files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user.
To see results; just write in the ( search engine the code:
filetype:log inurl:"password.log"

Discover the password of the forum that use the Web Wiz Forums platform

web wiz forumWeb Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage. The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).

Attack and Take advantage of the 5800 port of VNC Viewer

attack vnc desktop viewerVNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with a password.
Even when presented with a password, the mere existance of VNC can be important to an attacker, as is the open port of 5800.

Find the link for downloading any program in any site through any search engine

Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.

Using Google we can find credit card numer, password, mp3, and a lot of interesting information.

Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find: Credit Card Numbers / Passwords / Software / MP3's ...... (and on and on and on)

Search and take user data and passwords from FlashFXP ftp client

flashfxpFlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally stable and robust program that you can always count on to get your job done quickly and efficiently. There are many, many features available in FlashFXP.


Similar Content

Dec. 21 2012 - Here's what will happen today ...

According to the Mayan calendar today should be the end

of the world as we have known it.
But the world is already finished, and no one has noticed it,
we really are living in a limbo hidden
without memory.
I have this certainty.
You just need make connections and strive to remember
some nights in which you find yourself placed during sleep, and
as it is recurrent, and how, by asking around,
this happens to more people than you think.
This year has seen everything, we realized
that religion, politics, the structure
society are all based on deception and

Identify harmful Web Shell with PHP Shell Detector

webshell php

A web shell is a script, commonly written in PHP, which can provide access as the root user to a web server compressed. Trojan also renamed PHP can be very harmful if used correctly by an attacker, it is therefore important to periodically analyze the platform's web in search of intruders.

Create applications with Ember.js


If at the beginning of his career JavaScript had a role almost decorative, merely add interactivity to Web pages, over the years its role has grown allowing you to create Web pages more sophisticated. Today, the role of this language on the Web, and not only took on such importance that enable achievement of real applications, which require skills so typical of those who develop software in a professional manner.

Tutorial Drupal Views: How to create a view

ui drupal views

Drupal Views: guide and notes
The Views module allows webmasters to drupal to create, manage and display lists of content and therefore a way of presenting the contents and tables. Essentially it is a query builder that, given some information, it can create queries, execute and lead to visual data in pages, blocks or other formats. Every single view can also have multiple views.

Encrypted files on Dropbox with BoxCryptor

crittographyOne of the main questions on the part of users, the use of cloud-based solutions is definitely the secrecy and confidentiality of the data that are stored in the storage cloud, many fear that their data (documents, photos, code, etc..) Can first eventually be violated, and in some cases compromised, thus losing days and days of work.

Taxonomy upgrade extras: 

Gallery with effect stack of images

css imageWhen he began to spread on the main browser support for CSS3 transformations, many tutorials applied this new feature to the galleries, creating the effect that here we define 'stack of images': the base image in the foreground and behind it the levels that give the illusion of a group of overlapping photos.