The contents of this blog are not old now as I have not updates it since long. The mobile trick wont work now.

Using Google as a Hacker

Posted on Tuesday, December 22, 2009 by Ajit



The first thing here you need to know is : What is Google?

Google search is a web search engine owned by Google Inc. It is the most easy and user friendly search engines. It is also the most used search engine on the Internet. Google processes several million queries everyday through its different services. Google search was originally developed by Larry Page and Sergey Brin. Beyond the word-search capability, Google provides more than 22 special features, such as: sports scores; time zones; synonyms; movie showtimes; stock quotes; airports; earthquake data; weather forecasts; maps; home listings, etc. There are special features for numbers: prices; temperatures; money/unit conversions; calculations; package tracking; patents; area codes; plus rudimentary language translation of displayed pages.

What does a Hacker Mean?

In home computing, a hacker is a person who heavily modifies the software or hardware of their computer system. It includes building, rebuilding, modifying and creating software (software cracking, demo scene) and electronic hardware (hardware hacking, modding) either to make it better, faster, give added features or to make it do something it was never intended to do.

Today, mainstream usage mostly refers to computer criminals, due to the mass media usage of the word since the 1980s. This includes script kiddies, people breaking into computers using programs written by others, with very little knowledge about the way they work. This usage has become so predominant that a large segment of the general public is unaware that different meanings exist. While the use of the word by hobbyist hackers is acknowledged by all three kinds of hackers, and the computer security hackers accept all uses of the word, free software hackers consider the computer intrusion related usage incorrect, and refer to security breakers as "crackers"

What you need to be a hacker?
Good amount of knowledge with programming and scipts like php, java script, asp, etc. A good amount of knowledge on using Search Engines like Google, yahoo, etc. Logical and different way of thinking. A hacker is simple the one who hacks [breaks/decodes/decrypts] something.

"Google is your friend." Ever wondered why this saying became famous? If you are not a good programmer but you can think logically and use a search engine in a way that helps you learn what you want, you can become a hacker.

Google has crawlers, which is an automatic progarms which crawls through websites and saves each folders and files on the web in an index. Now this can be dangerous if your website has a private folder which you do not want to let others or google know about it. For this purpose you need to create a file named robots.txt on your web server which will tell google which sites to visit and which to avoid.

Special Features of Google which a Hacker can use :

site: Searches the keyword in the specified domain, eg :"Google Hacker site:techarena.in"

allintitle: Only the page titles are searched and not the remaining text on each webpage. eg: "allintitle:TechArena Community"

intitle: Prefix to search in a webpage title, such as "intitle:techarena forum" will list pages with word "techarena" in title, and word "forum" anywhere on the entire webpage

allinurl: Only the page URL address lines are searched and not the content of each webpage. This one is very useful for a hacker as he can search a website for a file where a password or similar stuff is stored.

inurl: Prefix for each word to be found in the URL, others words are matched anywhere, such as "inurl:techarena hardware" matches "techarena" in a URL, but matches "hardware" anywhere in the entire webpage.

Some Example on how to use Google as a Hacker. If you are a good programmer, you must know what is the name and where a file is by default saved which contains sensitive data like passwords.
Examples of search queries :

Code:
allinurl:auth_user_file.txt
OR

Code:
inurl:passlist.txt
This will search for passlist.txt or auth_user_file.txt on all the websites that is available with google.

One more command which is used to find a file on a webserver like. Suppose an MP3 file has to be searched, you can search it with the following query :

Code:
filetype:mp3 filename
In the above code replace "filename" with the name which you want to search.
I will not help you with the filenames which are generally used to save passwords of a server or anything which will be considered as a security breach.
The basic fundamental of hacking is to think like a hacker and to act wisely. You can combine multiple queries to search at once.

Example of a combinational query :
Code:
site:techarena.in inurl:guides Google Hacker
You will be shown multiple results for the search which is located on techarena.in which has "hardware" in url and has "Google" and/or "Hacker" anywhere in the contents of a listed page.

How to Password Protect a Pen Drive ?

Posted on by Ajit

The confidentiality of our documents and files is to add a point in the security of our data. In most cases, personal files and bank details, passwords, confidential documents, or even multimedia files of a personal nature, are fairly safe in our home computers.

Q. What happens to the information carried in a Pendrive?

Q. Can I hide information from my pendrive?

Q. How do I put a password on my Pendrive?

Of course you can hide files on a pendrive, and we can set a password to access a Pendrive. The method is simple, and we'll do a free program called Rohos Mini Drive.

Rohos Mini Drive creates hidden and encrypted partition on the USB flash drive memory. You work with the files on the hidden partition without opening a special program. Those who have megabytes of sensitive files on the USB drive and seriously concerned with a data security, cannot imagine their USB stick without the hidden volume that is created using this tool.


Main Features:

  1. Creates a virtual encrypted partiton volume (disk) within a USB flash drive free space
  2. Automatically detects your USB stick config and creates encrypted partition
  3. Program does not require installation to work with encrypted partiton on a guest computer. You can start it right from USB drive
  4. Encrypted partition is protected by password
  5. Encryption is automatic and on-the-fly
  6. Encryption algorithm: AES 256 bit key lenght. NIST approved.
  7. Rohos Disk Browser to open encrypted partition without having Admin rights
  8. Virtual Keyboard - to protect your encrypted disk password from a key logger
  9. Autorun Folder. Saved program’s/file’s shortcut will automatically start/open up upon disk connection
  10. The limit of encrypted partition size is 2 GB

System requirements:

* Windows 2000/XP/2003/Vista
* USB 1.1/2.0 port
* USB flash drive or U3 Smart flash drive with 1 Mb or more free space


Download : Rohos Mini Drive 1.19