The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used for acquiring confidential information from individuals and corporations.

An ideal place to look for a how to hack with Google tutorial is Amazon. Within this online store you will find two books that can help you. The first one has been written by Rael Dornfest and Tara Calishain, and it’s title is Google Hacks : Tips & Tools for Smarter Searching. This book is considered the introductory course for any computer user who wants to learn how he can exploit the potential that Google offers.

The second book is Google hacking for penetration testers, written by the author Johnny Long. Considered a more advanced lecture, it gives the user the knowledge that only black hackers are aware of. The great thing of this book is that it focuses on the weak points that most system administrators overlook and that are exploited by almost every hacker. Google, as innocent as it may be, has become another tool waiting to be exploited.

After you have read this two books, you should be able to perform the most basic kind of Google hacks and even some of the most advanced ones. But, as if everything in life, you need to master the art of Google hacking. And, if you wish to sell your services as a network security expert, it’s better to know it from the A to the Z.

The best way to do it is to contact other hackers in their specialized forums, via IRC or even at the multiple conventions that they celebrate around the USA. You will find tons of information that you will not have been able to acquire by yourself.

Explore More

Critical XSS Vulnerability in http://www.yangon.com.mm

PlanetCreator.Net’s Security Team Member has reported another critical XSS vulnerability on MM Search Engine http://www.yangon.com.mm These are some information from Vulneral Site http://www.yangon.com.mm: This vulnerability has been alerted to webmaster

Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies

IntroductionThis tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous.TheoryThe more different hops

Critical XSS Vulnerability in Thanyawzin – Myanmar Online Friends Community http://www.thanyawzin.com/

PlanetCreator has reported another Critical XSS Vulnerability in Thanyawzin – Myanmar Online Friends Community http://www.thanyawzin.com/ Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications