Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Advanced Search Engine Techniques

2.570 visualizaciones

Publicado el

Google isn\'t just yer plain ole vanilla

  • Inicia sesión para ver los comentarios

  • Sé el primero en recomendar esto

Advanced Search Engine Techniques

  1. 1. Advanced Search Engine Techniques/Privacy and Computers
  2. 2. Topics <ul><li>How to use the advanced search features of Google </li></ul><ul><li>Privacy on the web and some implications for investigators </li></ul>
  3. 3. This is Google... Google is your Friend!
  4. 4. <ul><li>Google isn’t just yer plain ole vanilla Search Engine. </li></ul><ul><li>Google can be used to search news groups... </li></ul><ul><li>Google can do reverse telephone lookups... </li></ul><ul><li>And much more…. </li></ul>Google Searchs
  5. 5. Google Searchs <ul><li>Google can be used to search files with a specific DOS extension. </li></ul><ul><li>This can be done with the following syntax in the search field </li></ul><ul><ul><li>Search terms filetype:ext </li></ul></ul><ul><ul><li>e.g. elmer fudd filetype:doc </li></ul></ul><ul><ul><li>The only limit is your imagination </li></ul></ul>
  6. 7. Google Searches <ul><li>You can also use google to search through a site for specific content. </li></ul><ul><li>This can be done with the following syntax </li></ul><ul><ul><li>search terms </li></ul></ul><ul><ul><li>e.g. staroffice </li></ul></ul>
  7. 9. Google Searches <ul><li>Google can also be used to search links to a specific site or search a specific title to restrict hits. </li></ul><ul><li>This is done with the following syntax </li></ul><ul><ul><li>Search terms </li></ul></ul><ul><ul><li>allintitle: search terms </li></ul></ul><ul><ul><li>e.g. linux </li></ul></ul><ul><ul><li>e.g. allintitle: linux </li></ul></ul>
  8. 12. Google Searches <ul><li>Google can also do reverse telephone lookups with the following syntax </li></ul><ul><ul><li>area code ###-#### </li></ul></ul><ul><ul><li>e.g. 517 321-6595 </li></ul></ul>
  9. 14. Google Searches <ul><li>Google also caches pages and saves them as html so if if you can’t get into a document one way you may be able to by clicking on the link and viewing Google’s copy. </li></ul><ul><li>There is also a GUI Web interface for advance searching. </li></ul>
  10. 16. Google Searches <ul><li>Google currently has the capability(beta) to translate text or sites or to search specific languages. </li></ul>
  11. 18. Google in Hacker…..
  12. 19. And Google in Elmer Fudd….
  13. 20. Questions???
  14. 21. Privacy Issues and The Internet <ul><li>Cookies, web bugs and GUID </li></ul><ul><li>Configuring your browser to use a proxy server </li></ul><ul><li>Spyware </li></ul>
  15. 22. <ul><li>What types of information are you leaking to the internet. </li></ul><ul><li>Http:// </li></ul><ul><li> </li></ul>Privacy Issues and The Internet
  16. 26. <ul><li>Cookies-contain username/ID, computer type, IP address and server location </li></ul><ul><li>Web Bugs- extremely small, transparent gifs placed on web sites. Lets the site hosting the ad banner to know your IP and correlate cookie information that may be sent by your browser. </li></ul>Privacy Issues and The Internet
  17. 27. <ul><li>Browsers also contain other data such as hit logging and GUID. </li></ul><ul><li>Hit logging keeps track of all your offline activites; when you click on a banner , how long you looked at it, what ad you clicked on as well as any information stored in your I.E. browser </li></ul>Privacy Issues and The Internet
  18. 28. <ul><li>Hit logging cont’d- Hit logging will also call the server the server that created it. </li></ul><ul><li>GUID numbers are unique. They will remain even if you get rid of cookies and Spyware. </li></ul><ul><li>They are on your system and can be retrieved at any time. </li></ul>Privacy Issues and The Internet
  19. 29. <ul><li>GUID cont’d </li></ul><ul><ul><li>Microsoft keeps it on all its databases along with your name, address and other registration details. </li></ul></ul><ul><ul><li>Office 97 attaches its own permanent GUID you create. </li></ul></ul><ul><ul><li>Author of the Melissa Virus was caught by the identification of his GUID </li></ul></ul>Privacy Issues and The Internet
  20. 31. <ul><li>For a free software utilities that will find GUIDs visit the following link </li></ul><ul><ul><li> </li></ul></ul>Privacy Issues and The Internet
  21. 32. Http://
  22. 35. Http://
  23. 36. Http://
  24. 39. <ul><li>Spyware-in a nutshell programs that you install on your computer that track you. </li></ul><ul><li>Instances of spyware </li></ul><ul><ul><li>Realjukebox </li></ul></ul><ul><ul><li>Pkzip </li></ul></ul><ul><ul><li>zbubbles </li></ul></ul><ul><ul><li>Cuteftp </li></ul></ul>Privacy Issues and The Internet
  25. 40. <ul><li>Spyware continued… </li></ul><ul><ul><li>Surfmonkey is an applcation that’s supposed to block inappropriate sites for kids but also keeps their personal ID, phone number and email address. </li></ul></ul><ul><ul><li>Many applications come with Spyware by Radiate embedded in them </li></ul></ul><ul><ul><li>Comet Cursor </li></ul></ul>Privacy Issues and The Internet