+ Reply to Thread
Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 31

Thread: Google: We're Actually Really Small

  1. #16

    Join Date
    16.02.09
    Location
    switzerland
    P2P Client
    bitrcomet
    Posts
    179
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss179
    What are some of these "known exploits" and how are they beneficial to the common user?
    Reply With QuoteReply With Quote
    Thanks

  2. #17
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    What are some of these "known exploits"
    Their intention is making developers aware of this flaws and give them a way for fix them - sadly, there are script kiddies and lamers that think it's cool to misuse them to hack or crash servers, etc.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  3. #18
    Retired Seal
    SealLion's Avatar
    Join Date
    03.05.08
    Location
    The Arctic--Believe it!!
    Posts
    2,079
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2079
    Ok, so does SBI have something akin to prevent the google -god from caching what's texted in here??

    I realized to late after posting that it was meant for servers, not for ohter uses. I jjust decided to not edit my post after doing so,.....I got lazy, I guess.

    See, slikrapid. I 'm repeating his name. I'm gonna hypnotize you and eventually, you'll start repeating it too. Just by the consistant use of it.
    "God, from the mount Sinai
    whose grey top shall tremble,
    He descending, will Himself,
    in thunder, lightning, and loud trumpet’s sound,
    ordain them laws".


    John Milton (1608-1674) in Paradise Lost


    Ripley's SealLion's Believe it or Not! ~ NASCAR car crashes and Windows have just one thing in common.
    Oh, oh. Better use LINUX.
    Reply With QuoteReply With Quote
    Thanks

  4. #19
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Ok, so does SBI have something akin to prevent the google -god from caching what's texted in here??
    No, since that file controls whether Google can "see" us at all, no one could find us through it if we did.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  5. #20
    Retired Seal
    SealLion's Avatar
    Join Date
    03.05.08
    Location
    The Arctic--Believe it!!
    Posts
    2,079
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2079
    ok, so when I did a google search for sb-innovation, this is what comes up:

    Now you mentioned that no-one could find the it through it, if we did.

    You mean the site or the search??

    I don't think that I understand completely.

    It's either so simple for me that it's actually going right over my head or I'm missing something.
    Last edited by SealLion; 07.06.09 at 01:25.
    "God, from the mount Sinai
    whose grey top shall tremble,
    He descending, will Himself,
    in thunder, lightning, and loud trumpet’s sound,
    ordain them laws".


    John Milton (1608-1674) in Paradise Lost


    Ripley's SealLion's Believe it or Not! ~ NASCAR car crashes and Windows have just one thing in common.
    Oh, oh. Better use LINUX.
    Reply With QuoteReply With Quote
    Thanks

  6. #21

    Join Date
    13.03.09
    Location
    United States of America
    P2P Client
    vuze extreme mod
    Posts
    336
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss336
    Quote Originally Posted by anon View Post
    It appears Goolag is a service letting you search the cDc hacker group database for known exploits.
    Also, it is a downloadable scanner program that interfaces google using various exploits "to audit" websites and entire domains for security holes. Doing this in even a mild capacity will get your IP banned. I do not recommend it. Besides most of the exploits incorporated into this utility are mostly public knowledge these days, so access to the previously available information and security holes on the individual servers have been patched up by the sites themselves.
    Reply With QuoteReply With Quote
    Thanks

  7. #22
    Retired Seal
    SealLion's Avatar
    Join Date
    03.05.08
    Location
    The Arctic--Believe it!!
    Posts
    2,079
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2079
    well, it seems to me anonftw that the easiest way around it then is an IP change then, yes??

    That's said on account that your IP is being banned pretty much everywhere you go then when you have the program in use, yes??
    "God, from the mount Sinai
    whose grey top shall tremble,
    He descending, will Himself,
    in thunder, lightning, and loud trumpet’s sound,
    ordain them laws".


    John Milton (1608-1674) in Paradise Lost


    Ripley's SealLion's Believe it or Not! ~ NASCAR car crashes and Windows have just one thing in common.
    Oh, oh. Better use LINUX.
    Reply With QuoteReply With Quote
    Thanks

  8. #23

    Join Date
    13.03.09
    Location
    United States of America
    P2P Client
    vuze extreme mod
    Posts
    336
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss336
    Quote Originally Posted by SealLion View Post
    well, it seems to me anonftw that the easiest way around it then is an IP change then, yes??

    That's said on account that your IP is being banned pretty much everywhere you go then when you have the program in use, yes??
    Oh yes, an IP change will fix you right up, but the ban is only temporary as well. It has been awhile, but I remember it lasting only part of the day. It seemed to have 403 banned from every google subdomain I had tried at the time. I remember going to bed and waking up unbanned on my static IP that I was using back then.

    This only happened to me at the time because I used too many search options with the tool and google detected too many hits in a short period of time from my IP address.
    Reply With QuoteReply With Quote
    Thanks

  9. #24
    Retired Seal
    SealLion's Avatar
    Join Date
    03.05.08
    Location
    The Arctic--Believe it!!
    Posts
    2,079
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2079
    so what kind of search options are there available on this tool that you used??

    That is, what would they individually search of while you were browsing and the program was doing it's work??
    "God, from the mount Sinai
    whose grey top shall tremble,
    He descending, will Himself,
    in thunder, lightning, and loud trumpet’s sound,
    ordain them laws".


    John Milton (1608-1674) in Paradise Lost


    Ripley's SealLion's Believe it or Not! ~ NASCAR car crashes and Windows have just one thing in common.
    Oh, oh. Better use LINUX.
    Reply With QuoteReply With Quote
    Thanks

  10. #25

    Join Date
    13.03.09
    Location
    United States of America
    P2P Client
    vuze extreme mod
    Posts
    336
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss336
    Quote Originally Posted by SealLion View Post
    so what kind of search options are there available on this tool that you used??

    That is, what would they individually search of while you were browsing and the program was doing it's work??
    It uses
    detailed search patterns that show untapped results for web sites previously indexed by Google
    . It has been quite a while, but from what I recall it scanned for various items known to be blocked out by the google crawlers due to specified rules that were set in place to prevent the indexing of pieces of code/scripts used by websites as well as certain directories/files on servers that it indexes. (i.e. /etc/passwd) I remember it also scanning ports and subdomains.
    Reply With QuoteReply With Quote
    Thanks

  11. #26
    Retired Seal
    SealLion's Avatar
    Join Date
    03.05.08
    Location
    The Arctic--Believe it!!
    Posts
    2,079
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2079
    So basically, it just prevented one from accessing certain info on websites. LIke you say...passwords; pics from some album, perhaps; for-your-eyes-only type of info; scripts used to make up a website; ports for accessability..etc..etc..

    That sounded like an interestin program that you used, then.

    I don't think that I'd use it myself, though. Perhaps just not in my interest. Nontheless, an interesting proggy.

    so how exactly did the websites realize that you were scanning??
    You mentioned that it audits a website. How wold a website recognize an audit, then??
    "God, from the mount Sinai
    whose grey top shall tremble,
    He descending, will Himself,
    in thunder, lightning, and loud trumpet’s sound,
    ordain them laws".


    John Milton (1608-1674) in Paradise Lost


    Ripley's SealLion's Believe it or Not! ~ NASCAR car crashes and Windows have just one thing in common.
    Oh, oh. Better use LINUX.
    Reply With QuoteReply With Quote
    Thanks

  12. #27

    Join Date
    13.03.09
    Location
    United States of America
    P2P Client
    vuze extreme mod
    Posts
    336
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss336
    Actually most "normal" websites or hosts at the time did not notice such activity unless they had set in place software to monitor excessive activity as a preventative measure against DDOS attacks, set in place bandwidth caps, or flag excessive activity, etc. However, this is more likely to be the case in the current state of things. It was google that mainly noticed the excessive hits from a single location and flagged/blocked the address because they DID monitor such activity and did not/do not tolerate such excessive activity outside of which they would consider a reasonable amount of usage per location. The websites themselves usually did not notice unless you were, for example, grabbing alot of files really fast from an adult website or trying to access a certain portion of the tree structure without proper permissions.

    As far as the term "auditing" in this context, it can be applied to computer security or the opposite of such. Basically looking for vulnerabilities for the good or harm of the website in question.
    Reply With QuoteReply With Quote
    Thanks

  13. #28


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    so basically google blocked a software that *could* be dangerous, meaning the google-god (:hypnotized: ) applied censorship as they saw fit, even though internet users have the 'right' to browse freely and look up any information they want (referring to that hacks database)

    as for extensive 'auditing' - it is customary for the site owner to agree to such a procedure before its applied
    Reply With QuoteReply With Quote
    Thanks

  14. #29
    Retired Seal
    SealLion's Avatar
    Join Date
    03.05.08
    Location
    The Arctic--Believe it!!
    Posts
    2,079
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2079
    ahh. I see. That's actually quite interesting and would also make sense on the methodoloy of how Google-god did things with people who used proggys like the one yours did, anonftw.

    I imagine that there's more websites that are protected against some of the vulnerabilities that are audited once thier found out, yes??


    See. Look. It worked.

    (hypnotized )
    One down.
    50,000 more to go....I guess.
    "God, from the mount Sinai
    whose grey top shall tremble,
    He descending, will Himself,
    in thunder, lightning, and loud trumpet’s sound,
    ordain them laws".


    John Milton (1608-1674) in Paradise Lost


    Ripley's SealLion's Believe it or Not! ~ NASCAR car crashes and Windows have just one thing in common.
    Oh, oh. Better use LINUX.
    Reply With QuoteReply With Quote
    Thanks

  15. #30


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Quote Originally Posted by SealLion View Post
    I imagine that there's more websites that are protected against some of the vulnerabilities that are audited once thier found out, yes??
    sure, some 'patches' are applied by hosting companies, some by web admins - one of their assignments is to keep up to date with known issues/vulnerabilities announced by different security sites/companies or through a specifically requested audit

    Quote Originally Posted by SealLion View Post
    One down.
    50,000 more to go....I guess.
    oh no, it must be less than that by now - google g** made sure of that
    Reply With QuoteReply With Quote
    Thanks

  16. Who Said Thanks:

    SealLion (08.06.09)

+ Reply to Thread
Page 2 of 3 FirstFirst 123 LastLast

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •