Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Google Hacking for Penetration Testers, Volume 2

Buy
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information.

Johnny Long

About the Author

Johnny Long is a clean-living family guy who just so happens to like hacking stuff. Over the past two years, Johnnys most visible focus has been on this Google hacking thing which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises (Yarrrrr!), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including Google Hacking for Penetration Testers from Syngress Publishing, which has secured rave reviews and has lots of pictures.
(HTML tags aren't allowed.)

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Earthquake Engineering: From Engineering Seismology to Performance-Based Engineering
Earthquake Engineering: From Engineering Seismology to Performance-Based Engineering
Earthquake engineering (EE) is an integration of multidisciplinary knowledge in several areas of basic sciences and science-based engineering with the ultimate goal of reducing the seismic risks to socioeconomically acceptable levels.

In the U.S., the first comprehensive book covering various aspects of EE was
...
Cassandra Design Patterns
Cassandra Design Patterns

Understand and apply Cassandra design and usage patterns, and solve realworld business or technical problems

About This Book

  • Learn how to identify real world use cases that Cassandra solves easily, in order to use it effectively
  • Identify and apply usage and design patterns to solve...

Social Network Analysis for Startups: Finding connections on the social web
Social Network Analysis for Startups: Finding connections on the social web

Does your startup rely on social network analysis? This concise guide provides a statistical framework to help you identify social processes hidden among the tons of data now available.

Social network analysis (SNA) is a discipline that predates Facebook and Twitter by 30 years. Through expert SNA researchers, you'll...

Mobile Virtual Work: A New Paradigm?
Mobile Virtual Work: A New Paradigm?

This is a book about mobile virtual work. The objective is to contribute to the understanding and the improvement of an emerging new kind of work arrangement, i.e. mobile virtual work (MVW). Until now no systematic in-depth studies of this phenomenon have been available. The book has grown from several workshops that brought together experts...

How to Cheat at Managing Windows Small Business Server
How to Cheat at Managing Windows Small Business Server
You’re holding this book in your hands at the local bookstore, or maybe
viewing it online. Better yet, you’re sitting at your desk with a cup of coffee
looking at this foreword.You’re wondering if you bought the right book.

You’re probably expecting to find some serious shortcuts to managing...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy