Google hacking: Difference between revisions

Content deleted Content added
No edit summary
Tags: Visual edit Mobile edit Mobile web edit
m Reverted edits by 36.73.150.10 (talk) (AV)
 
(25 intermediate revisions by 21 users not shown)
Line 1:
{{Short description|Hacker technique}}
{{distinguish|Google Hacks}}
{{Use American English|date=September 2023}}
<ref>{{Cite journal |last=Schennikova |first=N. V. |date=2016 |title=LINGUISTIC PROJECTION: POLEMIC NOTES |url=http://dx.doi.org/10.21685/2072-3024-2016-4-12 |journal=University proceedings. Volga region. Humanities |issue=4 |doi=10.21685/2072-3024-2016-4-12 |issn=2072-3024}}</ref>{{Use American English|date=September 2023}}
{{Use mdy dates|date=February 2023}}
'''Google hacking''', also named '''Google dorking''',<ref>{{Cite web |url=http://www.businessinsider.com/term-of-the-day-google-dorking-2014-8 |title=Term Of The Day: Google Dorking - Business Insider |website=[[Business Insider]] |access-date=January 17, 2016 |archive-date=June 19, 2020 |archive-url=https://web.archive.org/web/20200619024800/https://www.businessinsider.com/term-of-the-day-google-dorking-2014-8 |url-status=live }}</ref><ref>[http://whatis.techtarget.com/definition/Google-dork-query Google dork query] {{Webarchive|url=https://web.archive.org/web/20200116045547/http://whatis.techtarget.com/definition/Google-dork-query |date=January 16, 2020 }}, techtarget.com</ref> is a [[Hacker (computer security)|hacker]] technique that uses Google Search and other [[Google]] applications to find security holes in the [[computer configuration|configuration]] and computer code that [[website]]s are using.