Been there ... done that. +"Index of" would (and still will) supply numerous candidates for further study =;^)
You mean someone wrote an *article* about this? Who - Meinel? <LOL> G On or about 2004.04.18 18:42:07 +0000, Aschwin Wesselius ([EMAIL PROTECTED]) said: > Hello, > > Is there anybody who is common with the technique described in this article? > > http://www.ebcvg.com/articles.php?id=207 > > It says something about using Google to target servers by searching > paths to vulnerabilities. > > Any thoughts on that? > > Kind regards, -- Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED] Computer Security WWW: http://www.gilliss.com/greg/ PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
