[<prev] [next>] [day] [month] [year] [list]
Message-ID: <78744869705CEF41A32C103C5C04F2200163A7F7@phxexc1.dswa.net>
Date: Fri Nov 18 17:09:10 2005
From: ccarpenter at dswa.net (Christopher Carpenter)
Subject: Google Base
I think you misunderstood me. Google (the search engine) indexes
information and (usually) doesn't discriminate when it comes to the type
of information. That's why, with the appropriate syntax, it's not
difficult to find credit card numbers, password files, and vulnerable
applications.
Google Base (the database engine) has a different ToS, and it appears
that uploaded content will be monitored/filtered/whatever. So while you
can find hacking-related material with the search engine, Google won't
host it for you on Google Base.
Cheers.
C
-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of Michael
Holstein
Sent: Friday, November 18, 2005 9:53 AM
To: full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Google Base
> Except anything broadly defined as "hacking-related" is forbidden by
the
> Google Base ToS:
Uh huh .. then why does searching for password files work so well on
Google?
A set of rainbow tables isn't "hacking related" per se .. it's just a
list paired values that has legitimate research purposed (eg: hash
collisions).
~Mike.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists