Thursday 6 November 2014

GOOGLE DORK



A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person.
Google dorks put corporate information at risk because they unwittingly create back doors that allow an attacker to enter a network without permission and/or gain access to unauthorized information. To locate sensitive information, attackers use advanced search strings called Google dork queries.
Google dork queries are built with the advanced search operators that IT administrators, researchers and other professionals use in their daily work to narrow down search engine results. Commonly used search operators include:
site: restricts query results to a certain site or domain.
filetype: restricts query results to PDF files or other specific file types.
intext: resticts results to those content records that contain specific words or phrases.
Because search operators can be strung together, an attacker can use complex queries to find information that was published on the Internet but was not meant to be found. The use of advanced search operators to find information that is not easily accessed through simple searches is sometimes called Google dorking or Google hacking.

Top 10 Internet tips and tricks

You don't need the http:// portion of a web page

When entering an Internet address you do not need to type http:// or even www. in the address. For example, if you wanted to visit google you could just type  google.com and press enter. To make things even quicker, if you are visiting a .com address you can typegoogle and then press Ctrl + Enter to type out the full http://www.google.com address.

Quickly move between the fields of a web page

If you are filling out an online form, e-mail, or other text field you can quickly move between each of the fields by pressing the Tab key or Shift + Tab to move back a field. For example, in the example form below you can click in the "First Name" field type anything and press tab to switch to the next field.


  •  Tip: This tip also applies to the buttons, if you press tab and the web developer has designed correctly the button should be selected and allows you to press the space bar or enter to push the button.
  • Tip: With a drop-down box that lists dozens of options you can press the first letter to scroll down to that letter. For example, click the drop down box below and then press "u" to quickly scroll to Utah.

Know your Internet browser shortcuts

There are dozens of different shortcut keys that can be used with Internet browsers. Below are a few of our top suggested Internet browser shortcuts.
  • Press Alt + D to move the cursor into the address bar.
  • Hold down the Ctrl key and press the + or - to increase and decrease the size of text. Ctrl + 0 will reset the text.
  • Press the backspace key or press Alt key + left arrow to go back a page.
  • Press F5 to refresh or reload a web page.
  • Press F11 to make the Internet browser screen full screen. Press F11 again to return to the normal view.
  • Press Ctrl + B to open your Internet bookmarks.
  • Press Ctrl + F to open the find box to search for text within the web page you are reading.

Internet Explorer shortcut keys

Internet ExplorerBelow is a listing of all the major shortcut keys in Microsoft Internet Explorer. See the computer shortcut page if you are looking for other shortcut keys used in other programs.
Shortcut Keys Description
Alt + Left Arrow   Back a page.
Backspace    Back a page.
Alt + Right Arrow Forward a page.
F5 Refresh current page, frame, or tab.
F11 Display the current website in full screen mode. Pressing F11 again will exit this mode.
Esc Stop page or download from loading.
Ctrl + (- or +) Increase or decrease the font size, pressing '-' will decrease and '+' will increase.
Ctrl + Enter Quickly complete an address. For example, type computerspirit in the address bar and press CTRL + ENTER to get http://www.computerspirit.blogspot.com.
Ctrl + D Add a Favorite for the page currently opened.
Ctrl + I Display available bookmarks.
Ctrl + N Open New browser window.
Ctrl + P Print current page or frame.
Ctrl + T Opens a new tab.
Ctrl + F4 Closes the currently selected tab.
Ctrl + Tab Moves through each of the open tabs.
Spacebar Moves down a page at a time.
Shift + Spacebar Moves up a page at a time.
Alt + Down arrow Display all previous text entered in a text box or available options on drop down menu.
Alt + D Highlights the text in the address bar

Mozilla Firefox shortcut keys

FirefoxBelow is a listing of all the major shortcut keys in Mozilla Firefox. See the computer shortcut page if you are looking for other shortcut keys used in other programs.
Shortcut Keys Description
Alt + Home Open your home page.
Alt + Left Arrow Back a page.
Alt + Right Arrow Forward a page.
F5 Refresh current page, frame, or tab.
F11 Display the current website in full screen mode. Pressing F11 again will exit this mode.
Esc Stop page or download from loading.
Ctrl + (- or +) Increase or decrease the font size, pressing '-' will decrease and '+' will increase. Ctrl + 0 will reset back to default.
Ctrl + Enter Quickly complete an address. For example, type computerspirit in the address bar and press CTRL + ENTER to get http://www.computerspirit.blogspot.com.
Ctrl + Shift + Del Open the Clear Data window to quickly clear private data.
Ctrl + D Add a bookmark for the page currently opened.
Ctrl + I Display available bookmarks.
Ctrl + J Display the download window.
Ctrl + K or Ctrl + E Move the cursor to the search box.
Ctrl + N Open New browser window.
Ctrl + P Print current page or frame.
Ctrl + T Opens a new tab.
Ctrl + F4 or Ctrl + W Closes the currently selected tab.
Ctrl + Shift + T Undo the close of a window.
Ctrl + Tab Moves through each of the open tabs.
Spacebar Moves down a page at a time.
Shift + Spacebar Moves up a page at a time.
Alt + Down arrow Display all previous text entered in a text box and available options on drop down menu.

How can I protect myself while online? Verify data is encrypted

Computer securityWhen sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock (Internet browser security lock) in the bottom right corner of your browser window or next to the address bar (as shown below). If visible, this lock should also be in the locked position and not unlocked.
Internet Explorer 7.0 secure address bar
Internet Explorer 7 secure address bar
We also suggest making sure the URL begins with https as shown above.
While the lock is in the lock position, data is encrypted, which helps anyone from understanding the data if it's intercepted. When no lock is visible or in the unlocked position all information is plaintext and if intercepted could be read. If a web page is not secure, such as an online forum, use a password you wouldn't use with protected sites such as your online banking website.

E-mail is not encrypted

Websites should not transmit confidential data over e-mail, such as passwords, credit card information, etc. E-mail is not encrypted and if intercepted by a third-party could be read.

Be aware of phishing scams

Familiarized yourself with phishing scams and techniques, which are used to trick you into divulging your account information. Online banking sites, Paypal, eBay, Amazon, and other popular sites that require logins are popular targets.

Use a safe password

Websites that store confidential data, such as an online bank site need to use strong passwords. Also, it is highly recommended that you use a different password for each website that requires a login. If you need help remembering your passwords consider using a password manager.

Use caution when accepting or agreeing to prompts

When prompted to install any program or add-on make sure to read and understand the agreement before clicking on the Ok button. If you do not understand the agreement or feel it is not necessary to install the program cancel or close the window.
Additionally, when installing any program watch for any check box that asks if it's ok to install a third-party program, toolbar, etc. These are never required and often cause more issues than good. Leave these boxes unchecked.

Be cautious where you're logging in from

Business
Your place of work can install key loggers or use other methods of monitoring the computer while online. Someone who has access to this information could read these logs and gather usernames and passwords. Also, do not store any passwords in your browser if your computer is shared with other coworkers.
Wireless network
When on a wireless network realize that all information being sent to and from your computer can be intercepted and read by someone nearby. Prevent this from happening by only logging into a secure network using WEP or WPA. If this is a home wireless network, make sure it is secure.
Friends house
Be concerned when logging into an account from a friends computer. A computer or network you are not familiar with could intentionally or unintentionally log usernames and passwords. Finally, when logging into any site on a friends computer never save the password information on their browser.

Be aware of those around you

While at work, school, library, or anywhere that has people around who could look at the monitor be cautious of anyone shoulder surfing. Someone could watch you type in your password, which would give them access to your account.
If you need everything displayed on the screen to remain private, consider a privacy filter for the display.

Update Internet browser plugins

Often many attackers find security vulnerabilities through browser plugins such as Adobe Flash. Make sure all installed Internet plug-ins are up-to-date.

Secure saved passwords

Make sure to store passwords and login information in a secure area. Never write login information on a sticky note or in a text file that is not encrypted.
To save your passwords we recommend using a password manager, which stores all login information and securely encrypts and password protects that information.
When saving password information in a browser, it may be visible by anyone who has access to your Internet browser. For example, without a master password setup in Firefox anyone can see all stored passwords.

Use a third-party service to confirm the safety and security of a page

We recommend the free Web of Trust (WOT) tool to verify the safety of all websites on the Internet.

Malwarebytes

Sometimes abbreviated as MBAM, which is short for Malwarebytes Anti-Malware is an excellent software utility program that is designed to scan your computer for any Malware and clean that malware if found. This program can be used in conjunction with your antivirus program and can help detect any threats to your computer that an antivirus program may have missed.
  • The official Malwarebytes' Anti-Malware web page can be found at: http://www.malwarebytes.org
  • How can I protect myself while online?

ROOT

1. Alternatively referred to as an admin, administrator, and gatekeeper, root is a superuser on a computer or network and has complete control. See our Administrator definition for a full explanation.
2. The root or root directory is also the highest level in a directory hierarchy. For example, in MS-DOS, the root or root directory of the primary hard drive would C:\. When working on a web page the root directory will be your home directory or your public_html directory.
  • MS-DOS help and support.
  • Users in the Microsoft recovery console can set the current directory to the system root directory by using the systemroot command.
3. Root is also an ability, effect, or spell in computer games that locks a target in place. For example, in the game World of Warcraft the Mage class has a spell called Frost Nova that freezes an enemy in place for a few seconds.