counter

Google
 

Saturday, November 17, 2007

Google power...

Lot many people ask others,where do i find this ,where can i look for this?how do i get the thing i want? Well,for almost every question,google has an answer. Its undoubtedly the best thing that happened to humans since computers. You can find and get anything you want from food for your tommy to the apparel you need,from a home as unique as moon to a simple gadget as watch.You can find places you never knew.You can have whatever info you want at a click.Life is so easy with GOOGLE.

There are innumerable things you can do with “google power”.

Apart from the ADVANCED SEARCH feature of google which you can use to find many many rare files,stuff you need,i got to read some of the finest codes for search.

Copy paste these in google search bar and see for your self.

________________________________________ CODE intitle:index.of “extension” +”filename” -htm -html -php -asp “Last Modified”

Replace the filename & extension by anything like songs name,.,etc. This code makes google as file locator. Use it download lot of premium softwares for free. Note: filename is case sensitive. ——————————————————————————————————————– CODE

intitle:”BadBlue: the file-sharing web server anyone can use”

Badblue file sharing web server detection ——————————————————————————————————————– CODE

“About Mac OS Personal Web Sharing”

Mac OS Personal Web Sharing allows Mac OS users to share Folders over the Web. If you open this page you will shown the system’s major version as requirement. ——————————————————————————————————————– CODE

POWERED BY HIT JAMMER 1.0!

Hit Jammer is a Unix compatible script that allows you to manage the content and traffic exchange and make web changes, all without needing HTML. It is typicaly used by the underground sites on the Net who “pay for surfing ads” and advertise spam services or software. An attacker can find these sites by searching for the typical “powered by hit jammer !” frase on the bottom of the main page. Then if he changes the URL to www.target.com/admin/admin.php he is taken to the admin panel. Hit Jammer administrators are warned to protect this page with the .htaccess logon procedure, but many fail to do just that. In such cases, customer information like email addresses and passwords are in clear view of the attacker. Since human beings often use one simple password for many things this is a very dangerous practice. ——————————————————————————————————————– CODE

intitle:”index of” trillian.ini

Trillian pulls together all sort of messaging clients like AIM MSN, Yahoo, IRC, ICQ, etc. The various ini files that trillian uses include files like aim.ini and msn.ini. These ini files contain encoded passwords, usernames, buddy lists, and all sorts of other fun things. ——————————————————————————————————————– CODE

inurl:passlist.txt

Cleartext passwords. No decryption required! ——————————————————————————————————————– CODE

filetype:dat “password.dat”

This file contains plaintext usernames and password. Deadly information in the hands of an attacker.

——————————————————————————————————————– CODE

“adding new user” inurl:addnewuser -”there are no domains”

Allows an attacker to create an account on a server running Argosoft mail server pro for windows with unlimited disk quota (but a 5mb per message limit should you use your account to send mail). ——————————————————————————————————————– CODE

filetype:php HAXPLORER “Server Files Browser”

Haxplorer is a webbased filemanager which enables the user to browse files on the webserver. You can rename, delete, copy, download and upload files. As the script’s name says it is mostly installed by hackers ——————————————————————————————————————– CODE

intitle:MyShell 1.1.0 build 20010923

MyShell is a php program, allows you to execute commands remotely on whichever server it’s hosted on. ——————————————————————————————————————– CODE

inurl:polly/CP

You can get into admin panel without logging. ——————————————————————————————————————– CODE

“index of /” ( upload.cfm | upload.asp | upload.php | upload.cgi | upload.jsp | upload.pl )

Searches for scripts that let you upload files which you can then execute on the server. ——————————————————————————————————————– CODE

(intitle:”SHOUTcast Administrator”)|(intext:”U SHOUTcast D.N.A.S. Status”)

SHOUTcast is a free-of-charge audio homesteading solution. It permits anyone on the internet to broadcast audio from their PC to listeners across the Internet or any other IP-based network (Office LANs, college campuses, etc.). SHOUTcast’s underlying technology for audio delivery is MPEG Layer 3, also known as MP3 technology. The SHOUTcast system can deliver audio in a live situation, or can deliver audio on-demand for archived broadcasts. ——————————————————————————————————————– CODE

(inurl:81/cgi-bin/.cobalt/) | (intext:”Welcome to the Cobalt RaQ”)

The famous Sun linux appliance. The default page displays this text: “Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting. This page can easily be replaced with your own page. To replace this page, transfer your new content to the directory /home/sites/home/web”.

So next time think twice before saying that you could not find the thing you wanted on google because it can not be.You just have to search right…

A fairytale romance…Love finds its way. . .internet is not always evil in love & all

A tale of online love inspired usually cynical New Yorkers this week to help a young man find the girl of his dreams after he spotted her on a crowded subway train.

For Web designer Patrick Moberg, 21, from Brooklyn, it was love at first sight when he locked eyes with a rosy-cheeked woman while riding in Manhattan on 4th Nov,2007 at 9:30pm . She was writing in her journal.

The train was so full that he lost her in the crowd when they both got off, so he set up a Web site dedicated to finding the mystery woman — www.nygirlofmydreams.com.

He drew a picture of the girl, who was wearing blue shorts, blue tights, and a red flower in her hair, and posted his cell phone number, e-mail address and an appeal for help finding her.

It worked.And very quickly indeed.

Within hours Moberg’s inbox was overflowing with e-mails and his phone ringing non-stop. He told the New York Post that he even received e-mails offering him love. “Some people said I’m not the girl but you’re so adorable, pick me instead.”

Tuesday night a friend of the woman contacted him and sent him a picture so he could confirm her identity. “Found Her! Seriously!” a notice on his Web site said.

“We’ve been put in touch with one another and we’ll see what happens.”

The mysterious subway brunette was named Thursday as Camille Hayton, an intern at magazine BlackBook from Melbourne, Australia, who also lives in Brooklyn.

“This is crazy. I can’t believe it’s happening,” Hayton, 22, told the New York Post.

But Moberg said he is now pulling the shutters on his love life, scribbling out the cell phone number on his Web site and leaving a message on his phone saying he will do no more interviews.

“In our best interest, there will be no more updates to this website,” he wrote.

“Unlike all the romantic comedies and bad pop songs, you’ll have to make up your own ending for this.”

Some New Yorkers may already, wondering if Moberg had made it sound too easy to find a needle in a haystack in this city of eight million people.

The guy’s pic cute gal

REUTERS

Japanese researchers breed transparent frogs

Japanese scientists have bred transparent frogs, whose internal organs can be seen through their skins, giving researchers who study diseases such as cancer insight into organ growth and development.

The frogs are the first of their kind, said Professor Masayuki Sumida, who led the project at the Institute for Amphibian Biology at Hiroshima University.

The animals have been bred from common Japanese Brown Frogs gathered in frog hunts around the country. Since they don’t dissect the amphibians, researchers can continue to use the same frogs to observe changes in organ mechanisms or the effects of certain chemicals.

“Because the frogs remain transparent from their birth to adulthood, organs of the same frog could be studied throughout,” Sumida said.

By attaching green fluorescent protein to a stretch of DNA and injecting it into the frog, researchers can trace different genes from the outside as affected areas of the frog will glow.

The scientists plan to patent the see-through amphibians but they have not yet perfected the process. Only one in 16 frogs they breed is transparent and they have not managed to maintain the transparency to a second generation.

SOURCE

Some good and unknown built in tools in xp.

I found this,and thought its worth sharing. Some of these you might be already knowing.

These applications can be run easily through a command prompt or from the Run command (Click on Start and Run and type the shortcut command for the utility).

1. Windows Media Player classic (mplayer2.exe): Yes, apart from Media Player 8, an aesthetically pleasant player, Windows XP do have the classic version of media player. It is the most basic version of media player.

2. ClipBoard Viewer (clipbrd.exe): Clipboard viewer can be used to view the contents of Windows clipboard. It stores the copied items.

3. Dr Watson error notifier (drwtsn32.exe): The prompt to send error report to Microsoft is handled by this little utility.

4. DirectX diagnosis (dxdiag.exe): To diagnose the functionality of the DirectX.

5. Synchronization manager (mobsync.exe): Useful while you are in a network. It synchronizes files on your desktop with a file server.

6. Object packager (packager.exe): Object Packager is a tool you can use to create a package that you can insert into a file.

7. Character Editor (eudcedit.exe): This tool is used to edit the fonts of Windwos XP. In order to use this tool you need admin priviledge as you ned to have write access to font folder.

8. Driver Verifier manager (verifier.exe): Verifies the integirty of the drivers.

9. Iexpress wizard (iexpress.exe): This wizard helps to create a self-extracting self-installing package.

10. System Monitor (perfmon.exe): This utility shows the performance of your computer in real time. Nice graphical interface.

11.Character map (charmap.exe) and Disk Clean up utility (cleanmgr.exe): Though this can be accessed from All programs>Accessories>System Tools, I thought it is worth mentioning here in order to tell about the shortcut to run this program from Run command.

12. Remote Access Phonebook (rasphone.exe): A storage for phone numbers you use for remote access.

13. Registry editor (regedit.exe or regedt32.exe): No need to mention about this. Do not use this unless you are advanced PC user !

14. Network shared folder wizard (shrpubw.exe): Utility to configure shared folder in a network.

15. File Signature verification (sigverif.exe): The system files are digitally signed and need not be changed. This tool will verify if the critical system files have been modified.

16. Volume controller (sndvol32.exe): Windows sound volume controller utility.

17. Syskey (syskey.exe): It encrypts the SAM database which holds local passwords. You can use the SysKey utility to additionally secure the SAM database by moving the SAM database encryption key off the Windows-based computer.

18. System Configuration editior (sysedit.exe): Editor for changing win.ini, system.ini, autoexec.bat and config.sys. Require admn rights to edit.

19. Windows chat (winchat.exe): A LAN chat utility with a very basic interface.

20. Narrator (narrator.exe): It is a text-to-speech utility for vision impaired users. Windwos will read the text through this utility.

21. Windows Version (winver.exe): To find the version and some general information about your Windows installation.

22. [b]Windows Address Book (wab.exe): The free adderss book provided in Windows and which Outlook Express use to store addresses.

23. Compress files (compact.exe): Command based utility to compress files and folders.

24. Encryption tool (cipher.exe): It is used to encrypt and decrypt files and folders. This also detects if files on NTFS partition are encrypted. In order to run this go to Start and Run, type cmd.exe and in command prompt type cipher. To get help put cipher /? in command prompt.

Never knew your windows had that much stuff? And well about its source,its from a site( torrent site) which i can not mention.

Google