Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Thursday 16 March 2017

How to Take Your Business Online and Work for Yourself

For entrepreneurs who are looking to start their own businesses, it's not enough to have a bustling storefront—you need to be able to supplement your sales by building a strong presence online. The internet not only widens the net of your potential customers, a digital identity has become a way of validating and informing what a store has to offer.
E-commerce is a competitive space to navigate: Online real estate is crowded, and there's no shortage of other businesses vying for the same attention on Google. That means not only do your online operations need to run seamlessly, your understanding of digital marketing needs to be sophisticated. But starting your online business doesn't need to mean going into debt earning your MBA.
If you're interested in kick-starting your online business or even just a temporary side hustle, check out online options like The Build Your Web Business Bundle. It includes courses on how to successfully run a business from your home and how to get started developing your own website. This bundle even offers a course breaking down the steps to launch and is your best bet for a comprehensive set of lessons that cover it all. 

Marketing

Marketing is essential to supporting your digital store's growth. You can start digging into the fundamentals of Facebook Ads, SEO and more with The Marketer's Growth & Acquisition Bundle. It offers key lessons on managing a social online presence to earn customers.  

Internet Marketplaces

If you're looking for something with a little lower commitment, check out The Internet Marketplace Entrepreneur Bundle—it teaches you how to use e-commerce sites already in place (Amazon, eBay and more) to start building your online store. 

Finance

And of course you don't really know yourself (or your business) without understanding the money behind it—The Complete Finance & Economics Bundle helps you discover macro and micro financial drivers that affect your purchasing and investing decisions. 

Wednesday 15 March 2017

Google doodle marks 140 years Test cricket with playful sketch

In an era of T20 cricket, many may have sounded the death knell for Test matches, the longest format of the popular sport, but for aficionados it is still the format in which they see classical sportsmanship. And while several of us may have seen countless Test matches, cheering our home teams, not many would have spared a thought to wonder when the first match of this kind was played.
Well, giving us this little nugget of information, the guys over at the Google doodle team have come up with a fun imagery that commemorates the first officially recognised Test cricket match that took place today between the established English side and a newly formed Australian team. The match was played between March 15 and 19 at the iconic Melbourne Cricket Ground, in which Australia won by 45 runs. But England won the second match to draw the series at 1:1. The rivalry between the English and Australian teams, forged on the field, endures to this day.
According to the official statement, “Today’s Doodle hits the deck with a lighthearted rendering that captures the spirit of sportsmanship and the inaugural test match. Mustachioed and musclebound, the batsmen, bowlers and opposition fielders spring into action, never losing sight of the red ball.”
Interestingly, though, going by the representational map provided by Google, the reach of the doodle is restricted to India and Australia, excluding even England, which was one of the teams to actually play that first match back in 1877.

Tuesday 14 March 2017

Hackers Versus Cyber Criminals: Know the Difference

People are often confused between two terms: hackers and cyber criminals. In this article, I’m sharing a video that tells you the difference between these two.
Cyber crime occurs when breaking into the private worlds of people, these bad hackers start to misuse the information for their own benefit and loss of others. The story of hacking and cyber crime goes back to early 1950s when some phone freaks, commonly known as “phreaks”, started hijacking world’s phone networks and making long-distance calls.
A report sponsored by the security firm McAfee estimates the annual damage to the global economy due to cyber crimes at $445 billion and near about $1.5 billion was lost in the year 2012 due to online debit and credit card fraud in the US.
According to me, there are two types of hackers: good hackers and bad hackers. The bad hackers are the ones who commit cyber crime.  Here’s a video that shows how Darren Kitchen, a hacker and the host of tech show Hak5, tells how hacking is different from cyber crime:

Insane Robot Solves Rubik’s Cube In “Just 0.637 Seconds”, Breaks Guinness World Record


The Guinness World Record has recently confirmed that the Sub1 Reloaded robot is the new world record holder for solving the Rubik’s Cube in just 0.637 seconds. This happened at an event organized by a German self-driving chip maker Infineon whose microcontroller helped the robot arrange the sides of the cube in the correct order. Last year, a robot named Sub1 Reload solved the famous Rubik’s Cube puzzle in just 0.637 seconds at an event organized by a German company Infineon, a self-driving car chip maker. Since then, it was expected that the robot would set a new Guinness World Record by breaking its own existing record of 0.887 seconds.












10 Highly Useful 3D Printed Things That Can Make Your Life Buttery Smooth

It’s the current decade when we have started to see 3D printed things more often. Just like the Jetsons, soon, we might be testing 3D printed pizzas and hotdogs. In fact, people have already developed the first versions of such food throwing machines.
Meanwhile, you wait for such a future to come, you might want to take a look at some of the 3D printed things that can be very useful in your daily life. Here it begins:

1. Earbud Holder – removes tangle from your life

 

Read more about this 3D print.

2. This “can holder” ain’t nuke

 

Read more about this 3D print.

3. A trash bag hook for your car, don’t make it filthy

 

Read more about this 3D print.

4. I don’t know why I forget the straw every time. Now, I have got this glass

 

Read more about this 3D print.

5. This helps if you don’t have a beer mug

 

Read more about this 3D print.

 6. Cutting vegetables sucks when you aren’t a pro. This one is a serious helper.

 

Read more about this 3D print.

7. Open the bottle cap like a boss

 

Read more about this 3D print.

8. They are so tiny; I always end up losing them

 

Read more about this 3D print.

 

9. Thanks

 

 Read more about this 3D print.

10. A flashlight that takes power from water, and I’m serious

 


Read more about this 3D print.

 Read full article @ www.fossbytes.com

 

 

 

 

 

Google Wants To Become The Best Search Engine For Programming Languages

Back in April 2016,  Bing implemented the executable snippet feature in its search results. It made it easier for the programmers to look for code and make changes to it right in the search engine results page.
Earlier this month, Google received a minor update that will make the search experience of programmers even better. As a result of these changes, now the search queries with sequences of 2-3 special characters (== vs === OR +=) will give results on the basis of the meaning of these sequences in programming languages.

In its blog post, Google mentions that if you’ll search for C++17, you won’t get the results of c17, the famous Boeing airplane. Instead, you’ll get the results from the programming world. Similarly, looking up for product and company names with punctuation, like Notepad++ and She++, will produce more accurate search engine results.
With this update, Google has taken one more step to become the best search resource for programmers. Google promises to bring some more improvements in near future.
Did you find this change in Google search interesting? Don’t forget to share your views with us.

Who Is A Hacker? Mark Zuckerberg Explains In His Letter From The Past

The term ‘hacker’ has always been viewed in a negative context among the general public. The contribution of the media can’t be denied in portraying a hacker as a person who does evil things. Recently, I came across the Founder’s Letter, 2012 which Mark Zuckerberg shared on his timeline. 2012 was the year when Facebook went public.
 Zuckerberg also acknowledges the fact that the term hacker has an “unfairly negative connotation” from being tagged as a person who trespasses into people’s machines.
“In reality, hacking just means building something quickly or testing the boundaries of what can be done,” Zuckerberg said.
“Like most things, it can be used for good or bad, but the vast majority of hackers I’ve met tend to be idealistic people who want to have a positive impact on the world.”
The understanding of the word ‘hacker’ has changed from being an isolated guy — sitting on a computer, sneaking into people’s lives or stealing confidential data — to the one trying to get things done quickly and efficiently.
According to Zuckerberg, hacking is an “inherently hands-on and active discipline.” Hackers will first build a prototype of an idea to see if it works rather than figuring out its success possibilities. They focus on chunks, working on smaller iterations. Eventually, product or service becomes better over time. And to do that, Facebook has a testing framework where thousands of Facebook versions can be checked at a given time.
Another hacker trait is an “extremely open and meritocratic” mindset. The attention should be paid to the outcome, the idea, instead of the people who gave it. Facebook conducts hackathons to nourish this open thinking.
The different prototype ideas submitted during hackathons are collectively looked upon. Various popular products like the timeline, chat, videos, HipHop, etc. sprung out of such internal brainstorming events.
All of that said can be assumed as one positive picture of a hacker. As far as the negative versions are concerned, some people feel more comfortable calling them crackers. The hacker culture Zuckerberg believes has been in existence for the last few decades.
The hacker culture Zuckerberg believes has been in existence for a long time, largely been associated with computer programming. We can smell the existence of the hacker culture since the 1960s when a series of practical jokes happened at MIT.

People calling themselves hackers try to demonstrate their intellectual capabilities through their activities having some hack value. And it includes doing what other people think is impossible.
As far as the definition is concerned, the Jargon File documents it as “A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.”
Also known as the hacker’s dictionary, the jargon file can’t be thought of as some official glossary for tech terms but has had its own level of influence since it came into existence.
You might be wanting to add something, drop your thoughts and feedback.

How To Get Google Assistant On Your Android Phone Right Now

Earlier this month, Google started rolling out Google Assistant on millions of Android smartphones. For those who don’t know, Google assistant was first released in October 2016 with its new Pixel and Pixel XL smartphone. Back then, Google firmly said that Google Assistant will be limited to Pixel phones, but it isn’t the case anymore.

Google Assistant could be seen as an advanced and more refined version of Google Now. Now it’s available on any Android device that’s running Android Marshmallow or Android Nougat. So, how to get Android Assistant on your Android smartphone right now? In the steps mentioned below, I’ll be outlining the complete method in simple points.

Get Android Assistant On Your Android Phone

1. Make sure that your phone is compatible

As said above, your smartphone must be running Android 6.0 Marshmallow or Android 7.0 Nougat. This is the primary requirement for getting and enabling Google Assistant on your smartphone. Just in case you’re running some older version, or you’ve grabbed the new version via ROM flashing, you may not be able to use Google Assistant.

2. Update Google Play Services App

For enabling Google Assistant on your device, the Google Play Services on your Android OS must be updated to the version 10.2.98 or later.
If the Google Play Services is older on your phone, you’ll have to wait for the automatic update. Or, you can grab the latest APK from here.

3. Update Google App to the latest version

Your Google App too must be running the latest version. Go to Google Play Store and update your Google App. I was able to enable Google Assistant using the Google App version 6.13.25.21.

4. Make sure that your device language is English (US)

As Google Assistant isn’t rolling out globally, make sure that your phone’s language is set to English (US). To do so, under the Device Settings, find Language & Input and make appropriate changes.

5. Clear cache of apps

The next step involves clearing the cache of Google App and Google Play Services apps. After this change, your phone is ready to use Google Assistant.

6. Launch Google Assistant

Now, all you need to do is simply tap and hold the Home Button of your Android smartphone. Doing so will show you a popup asking you to get started with Google Assistant on your Android smartphone.

7. It’s time to explore and try new things

There are some important settings and options that you need to explore. You can choose the Gmail account associated with Google Assistant, explore Settings, and learn more about Google Assistant’s capabilities under the option “What can you do?”


Well, that’s it. Now get Google Assistant on your Android phone and start using it.
Did you find this Google Assistant tutorial on Android 6.0 and 7.0 helpful? Don’t forget to share your queries.


Friday 10 March 2017

Nike To Launch New Performance Hijab For Muslim Female Athletes (photo)

 After launching its first plus-size sportswear range for women earlier this month, the retailer is getting ready to release the new Pro Hijab designed for Muslim female athletes.
Nike has taken another step into the lucrative Islamic clothing market by unveiling a hijab designed for female Muslim athletes.
After launching its first plus-size sportswear range for women earlier this month, the retailer is getting ready to release the new Pro Hijab designed for Muslim female athletes.
The product, which has been in development for a year, was tested by athletes including figure skater Zahra Lari.
“The Nike Pro Hijab may have been more than a year in the making, but its impetus can be traced much further back, to an ongoing cultural shift that has seen more women than ever embracing sport,” a statement from Nike read.

 Global Nike Spokeswoman Megan Saalfeld told Al Arabiya English,
“The Nike Pro Hijab was designed as a direct result of our athletes telling us they needed this product to perform better, and we hope that it will help athletes around the world do just that.”
Megan also said the concept of launching an athletic hijab came after female Emirati Olympic weightlifting athlete Amna Al Haddad visited Nike’s sport research lab at their global headquarters in Oregon.
Amna complained that she only had one hijab that worked for her, and that she had to wash it by-hand each night in the sink during competitions.
The Nike Pro Hijab is set to release in spring 2018.

Thursday 9 March 2017

Apple, Samsung vow to fix flaws after CIA hack report

Agency allegedly produced more than 1,000 malware systems to infiltrate and take control of targeted electronics.
WikiLeaks alleges devices such as smart TVs are being targeted by the CIA [Kevin Lamarque/Reuter]

Apple and Samsung have vowed to quickly fix any vulnerabilities in their products following WikiLeaks' disclosure of an alleged CIA hacking arsenal capable of breaking into iPhones and other devices.
The archive claims to show the CIA exploiting weaknesses it discovers in hardware and software systems - without informing manufacturers of the flaws in question.
"While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities," Apple said in a statement.    
"We always urge customers to download the latest iOS to make sure they have the most recent security updates." 
Samsung offered a similar response.    
"Protecting consumers' privacy and the security of our devices is a top priority at Samsung," a statement from the South Korean electronics giant said.    
"We are aware of the report in question and are urgently looking into the matter." 
WikiLeaks claims the documents it released on Tuesday are part of a vast trove of leaked CIA documents, tools and code representing "the majority of its hacking arsenal".
The CIA would neither confirm nor deny the documents were genuine.
Image result for WikiLeaks exposes alleged CIA hacking programme
However, "the American public should be deeply troubled by any WikiLeaks disclosure designed to damage the Intelligence Community's ability to protect America against terrorists and other adversaries," a CIA spokesman said in a statement.
"Such disclosures not only jeopardise US personnel and operations, but also equip our adversaries with tools and information to do us harm."
According to the documents, the CIA has produced more than 1,000 malware systems - viruses, trojans, and other software - that can infiltrate and take control of target electronics.     
US intelligence and law enforcement officials said on Wednesday they have been aware since the end of last year of a security breach at the CIA and were focusing on contractors as the likeliest source of documents being passed on to WikiLeaks.
The officials, who spoke on condition of anonymity, told Reuters news agency they believed the documents were authentic.
The White House said on Wednesday that President Donald Trump was "extremely concerned" about a CIA security breach.
"Anybody who leaks classified information will be held to the highest degree of law," spokesman Sean Spicer told reporters.
One official with knowledge of the investigation said companies that are contractors for the CIA have been checking to see which of their employees had access to the material that WikiLeaks published.
In Germany on Wednesday, the chief federal prosecutor's office said it would review the WikiLeaks documents because some suggested the CIA ran a hacking hub from the US consulate in Frankfurt.
"We're looking at it very carefully," said a spokesman for the federal prosecutor's office. "We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators."

WikiLeaks exposes alleged CIA hacking programme

Leak suggests CIA malware systems have targeted iPhones, Android systems, Microsoft software and Samsung smart TVs.Image result for WikiLeaks exposes alleged CIA hacking programme
The CIA can turn your TV into a listening device, bypass popular encryption apps, and possibly control your car, according to thousands of documents published by WikiLeaks, an anti-surveillance group.
The group posted nearly 9,000 documents on Tuesday it said were leaked from the Central Intelligence Agency, in what it described as the largest-ever publication of secret intelligence materials.
It said the trove of documents "appears to have been circulated among former US government hackers and contractors in an unauthorised manner, one of whom has provided WikiLeaks with portions of the archive".
Jonathan Liu, a spokesman for the CIA, said: "We do not comment on the authenticity or content of purported intelligence documents."
Experts who have started to sift through the material said that it appeared legitimate.
The leak, named "Vault 7" by WikiLeaks, claims the CIA developed a malware to infect mobile phones to allow easier surveillance - but lost control of the technology. If the CIA really lost control of the technology, hackers worldwide could use the tools to steal data.
Edward McAndrew, a lawyer with a speciality in cyber security, said the security breach is a major concern for the CIA because its technology could already be in the wrong hands
"What we're hearing from WikiLeaks and others is that pieces of the toolkit are now outside of Langley [the CIA's Virginia headquarters]," he told Al Jazeera.
"If that's true, once these tools are introduced into the wild of the internet, they cannot be reclaimed. We'll then see a race between those who would use these tools to exploit others and those trying to close all these vulnerabilities that have now come to light." 
The actual hacking tools were not part of the WikiLeaks trove.
WikiLeaks said it planned to avoid distributing tools "until a consensus emerges" on the political nature of the CIA's programme and how such software could be analysed, disarmed and published.
Malware systems
WikiLeaks said the documents show the CIA has produced more than 1,000 malware systems - viruses, trojans, and other software that can infiltrate and take control of target electronics.
These hacking tools have targeted iPhones, Android systems such as the kind of personal phone reportedly still used by President Donald Trump, popular Microsoft software and Samsung smart TVs, which can be transformed into covert microphones, according to WikiLeaks.
The agency has also examined hacking into the electronic control systems on cars and trucks, potentially enabling it to control them.
By infecting smartphones, WikiLeaks said, the CIA can get around the encryption technologies of popular apps such as WhatsApp, Signal, Telegram, Weibo, and Confide by collecting communications before they are encrypted.
Matthew Green, professor of computer science, told Al Jazeera that "ordinary people" should not have to worry about the revelations.
"What I would perhaps worry about is that some of this might get into the hands of very sophisticated criminal organisations or foreign governments and be used in a very targeted way against activists or human rights workers," he said.

Sunday 5 March 2017

Meet the new Arab emojis perking up Dubai's WhatsApp chats


  In the Gulf, though, users have hit a problem: There are no Arab emojis - unless you count a generic turban-wearing guy, who could equally be a Sikh.
Keen to fill the void, two Dubai-based friends have launched an app starring shisha smokers, belly dancers and 200 other playful characters.
They called it "HALLA WALLA" - which is Arabic slang for "Hi there!", and a common greeting around Kuwait, Saudi Arabia and Bahrain.
Yasmine Rasool, 31, from Bahrain, and Eriko Varkey, 30, who is originally from Japan, hit on the idea during a trip to New York.
"It's been a cultural and social experiment for us," says Yasmine. "We actually started this because we were jumping between cities, and people were asking us, 'Okay, so what is it like in the Arab world?' Me and Eriko were trying to explain what the culture is like, the beauty and the richness of it."
Eriko Varkey (left) and Yasmine Rasool created HALLA WALLA to help explain Arab culture

They made an app for the modern Middle East, to match stories of loud families, endless cousin gatherings, fashion statements, fast cars, strong feelings and late-night trips for shawarma (a much-loved meat wrap).
"People would ask me, do you have any rights, as a girl living there? And yeah, we have a lot of rights, actually," says Yasmine.
"A lot of people have such bad connotations about the Arab world, so we thought - okay, we need to explain it."
The HALLA emoticons include men in more conservative Islamic dress - the kandura, an ankle-length white robe, and the keffiyeh, a headdress. But others wear casual baseball caps.
Likewise the female emojis, which range from a bare-headed woman crying with laughter, to a girl in a loose hijab giving a flirty wink.
The emojis include a range of emotions - and sly Gulf jokes like a superbike and a blingy watch

"We really wanted to capture how fun-loving people are here - how everybody's comedic," Eriko says.
"Some of Yasmine's relatives are super-covered, they're conservative - but they're cheeky and fun-loving. Others are quite liberal, but also wear traditional dress.
"Our friends are mixed - we have some covered, some non-covered. So we really just wanted to capture all of that - to show that there's such a diversity here, especially in our generation."
Yasmine says one of their gifs - an animated snippet of a woman in a hijab, blowing a kiss - was inspired by her cousins.
"All of them are covered - but most of them are so cheeky," she laughs. "We are Arab, but we're like every other human being."
When HALLA WALLA was in the works, the duo met focus groups in Bahrain, Dubai and Saudi Arabia to find out which emojis they were pining for.
They then worked with London-based developers Oxygn Consulting to make an app for iOS and Android.
The emoji keyboard lets users pepper their texts, emails or Facebook chats with emojis, or send animated gifs.
Of course, some of the little emoticons have more fans than others.
After one too many stories about Arab playboys driving around with their pet tigers - there's an emoji for that


"I love the guy with the shisha and the heart," Yasmine sighs. "Like, a guy is blowing a heart from a shisha pipe! That doesn't happen. If I find that man - I'm gonna date him!"
Eriko favours the gifs, which include a woman contouring her make-up - a big trend for fashion-conscious Gulf girls.
She hopes HALLA WALLA will find pride of place in the big family WhatsApp groups that Arab relatives use to stay in touch - much like families in her native Japan.
"It's a beautiful marriage of the two countries," she smiles. "They're two worlds apart, but they're kind of similar."





The app's creators say foods are among their most requested emojis
Decoding the most popular Arab emojis
Shway-Shway

The shway-shway gif is an early hit with the app's users. Shway means "little", but two shways are a plea to slow down.
It's a popular saying with a matching gesture - a pinch formed with all the fingers and an upturned palm.
Eriko explains: "It basically means, 'wait, I'm coming!' or 'calm down!'"
Shway shway is a common phrase and a firm favourite on the app

Sword dancing man
It's a vaguely menacing man waving a sword over his head. What's he up to?
Eriko has the answer: "The guy holding up the sword is a very traditional dance that people do at weddings and celebrations."
Yep, it's the Ardah - or Arabian sword dance. 

The Ardah sword dance - emojified



The female version features three long-haired women swishing their locks in unison.
"Oh! The girls dancing - that's a favourite one of mine," says Yasmine. "From childhood I always wanted long hair so I could copy the traditional dance!"
Hair tossing is a feature of traditional dance for some Arab women



The flying slipper

The HALLA creators burst out laughing when asked about this one.
"The slipper is basically - if you have done wrong, mother will bend down to pick up her slipper and throw it at you. And then you know that you should start running!"






MWC 2017: Samsung unveils two new tablets but no phone



The Galaxy Tab S3 was the first of two tablets unveiled by Samsung at a tech trade show in Barcelona
Samsung has, for the first time since 2013, opted not to unveil a flagship Galaxy S smartphone at the Mobile World Congress tech show.
Instead, it showed off two new tablet computers and a virtual reality headset that comes with a remote control.
However, a new smartphone was briefly teased at the end of the company's presentation at the Barcelona event.
Samsung said the new device would be unveiled on 29 March in New York.
"Not having [the successor to the S7] there will be a particular boon to Huawei," noted tech analyst Tim Coulling at Canalys, referring to Samsung's Chinese rival.
"But it's known something is coming out, so the Samsung fans will probably be willing to wait."
The hiatus follows trouble for the South Korean tech giant after its Galaxy Note 7 phone had to recalled twice, the second time permanently.
Faulty batteries in the devices led some to catch fire.
Greenpeace protest
Campaign group Greenpeace made an unexpected appearance at the presentation. A protestor took to the stage with a banner saying "reduce, reuse, recycle" - apparently referring to the millions of Note 7 handsets that had to be withdrawn.
More protestors rolled out another banner on the side of the building where the press conference was taking place.


Monday 8 August 2016

Using Google For Hacking.

In the previous post, I have told you about many Google search tricks and tips to up your game and find content effectively on the web. The government cyber spies and hackers also use these search engines to extract useful information.

Obviously, these search tricks are a little bit more advanced. Back in 2013, the National Security Agency released an eBook, uncovering new methods to search the intelligence information on the web.

Named Untangling the Web: "A Guide to Internet Research", this 643-page guide is full of useful advice regarding how to use the Internet Archive, search engines, public websites etc. The most interesting part of this book is titled “Google Hacking”.

What is Google Hacking? How does it work?

The NSA’s guide describes Google ( or any search engine) Hacking as follows:

“Google hacking” involves using publicly available search engines to access publicly available information that almost certainly was not intended for public distribution.”
It’s basically a clever and legal method of finding information that’s not available on the public internet.

If you want to understand how Google Hacking works, you need to read how search engines work. Thanks to its spiders, a search engine like Google can access and index all the parts of a website if a “door” is open. With the help of a Robot.txt file, webmasters have the power to restrict the search engine spiders.

Very often a webmaster fails to configure the Robot.txt file properly. This situation worsened a couple of years ago when Google started indexing file types like PDF, Word, Excel, Access, Excel etc.

Many of the organizations still don’t prevent their sensitive data and files. Thus, tons of useful information is bound to appear in Google’s database.

The information accessed using Google Hacking:

What if I tell you that you can get your hands on a plenty of shocking information using Google hacking? This data usually falls under these categories:

Personal and financial info
User ID, computer account logins, passwords
Private, or proprietary company data
Sensitive government information
Flaws in websites and servers
Common Google Hacking techniques:

These techniques are an excellent and unconventional method to discover sensitive information. Let’s tell you about some of the most common ones.

Search using file types, keyword, and site type:

Many websites and organizations store their financial, personnel, etc., data in Microsoft Excel format. So, here’s how you need to look for some sensitive information of a South African company. Don’t forget to include keywords like Confidential, Budget etc.

[filetype:xls site:za confidential]

Use stock words and phrases:

Along with file types like Excel, Word, or PowerPoint, you are also advised to use stock words and phrases like do not distribute, confidential, proprietary, not for distribution, etc.

Look for files containing login information:

You need to search for files containing login, password, and userid information. It’s interesting to note that even foreign websites usually use these terms in English. So a search for a spreadsheet file might look like:


[filetype:xls site:ru login]
Misconfigured web servers:

Very often Google contains directories that are not intended to be on the web. In Google Hacking, these servers provide a rich set of information. To exploit this error, one should use this format:

[intitle:”index of’ site:kr password]


Numrange search:

NSA describes Numrange search as one of the “scariest searches available through Google. It uses 2 number separated by 2 dots and no spaces. A user can use it with search keywords and other search options. For example:


[site:www.thisismybank.com 645..768]
For more detailed information on these searches, you read the Google Hacking chapter in NSA’s eBook.

Google Hack to search inside websites requiring registration:

Very often some websites ask you to register to view its contents. For that, you can use Google hacking to view contents without registration. You can try these queries or something similar:


[site:www.companyname.com inurl:database]

[site:www.companyname.com inurl:directory]

[site:www.companyname.com inurl:index]

[site:www.companyname.com inurl:companies]

Search in the native language:

With more and more people on the internet, people are becoming lesser dependent on English. Now millions of websites don’t use languages written in the Latin alphabet. So, a search made in native language has the more probability of returning the expected result.

The NSA eBook explains more techniques that could be applied to any search engine.

Did you find this article interesting? Don’t forget to drop your feedback in the comments section below.

8 Google Fun Tricks That You’d Love to Know

elgoog-im-image
Internet is Google and Google is Internet for many of us. You use Google everyday but you will not be knowing some tricks, funny searches and games that Google provides hidden behind its vast layers of database.
You will ask me that what is the use of these things, I would simply say that it’s just for fun. It is something you can show to your friends, impress them , show them your geeky side. In fact when I showed these things to one of my friends, he was really impressed with me and asked me how I came to knew about  them. So I thought about posting it online, therefore I tracked down all the tricks and compiled a list of them. Here it goes:
1. Do a barrel roll trickgoogle-barrel-roll-trick-pic
Go to Google.com and simply type in the search box “do a barrel roll” and see the magic . The page will rotate two times.
2. Atari Breakout Trick:atari-breakout-trick-pic
Go to Google images and type “Atari Breakout”. The images will be transformed into blocks and you can play Breakout ,classic arcade game of the 70’s era.
. Tilt page trick:
google-tiltSearch for “tilt” on Google and see how your page tilts a little .
4. Recursion trick:
Search for “recursion” on Google and you will get stuck in an infinite loop much like recursion . Recursion means repeating. Google will show “did you mean recursion?” every time  searching for recursion . It is a fun act of Google for all the geeks who understand what is recursion.
5. Google Gravity:google-gravity-pic
Type in “Google Gravity ” in their homepage and then click on the “I’ m feeling lucky” button. It will redirect you to one of the fun projects called “Google Gravity”. It is a Chrome Experiment done by Hi-Res. See how gravity bring Google to its knees. You can even search anything.
6. Zerg Rush:google-zerg-rush-pic
When you type “zerg rush” in Google .The ‘o’ and ‘o’ of Google appears from the top and the right of the Google page and slowly eats up the whole page leaving nothing . Its fun to watch.
7. Bonus: elgoog.im
A rotated version of Google.com, kind of google tricks. Provides you with a reversed Google site, known as Google backwards. You can also do surfing on elgoog.im, it’s fun.elgoog
You can fly through space using Google sky. You can see  celestial objects, including stars, constellations, galaxies, planets and the Earth’s moon via Google sky.
google-sky
Which was your favorite one? Tell us in comments below ðŸ™‚