the Internet Windows Android

All you need to know about Instagram Stories. Facebook Privacy: Hide what is shown to read intitle All user publications

A couple of years ago, our moms and grandmothers passed to each other thick notebooks with a pile of rewritten recipes, so that somewhere accidentally not lost the family recipe for "herring under the fur coiled" or "mimosa". However, the "herring under the fur coat" no one will not surprise anyone, and the female sex has to invent thousands of new recipes ... After all, you want it to be tasty, and stylish, and not like everyone else. And on the eve of the new year, this is especially important!

By the way, we still have an article about

Fortunately, now everything has become much easier, and inspiration for their culinary masterpieces can be drawn directly from the Internet. We picked up the best culinary sites for you, which can serve as a chopstick in the right moment And they will make from you if not a real professional, then certainly a confident amateur.

Eating at home

The love of many women to cooking (including mine) begins with this resource. Actress, TV presenter and mother of two children - Julia Vysotskaya - In 2003, he created a whole project, which at the moment it was increasing to incredible scales.
On the site "Etc." shows not only Julina recipes, but also masterpieces of other users. Everyone has the opportunity to publish its recipes and photographs of dishes, evaluate other people's, compare the ingredients and rating, as well as create their own culinary book. In addition, you can see all the releases of TV shows "Eat at home" and take part in culinary competitions from partners. In general, "Eat at home" is a whole social network where there is a living communication, where experienced cooks are divided by their secrets, and ordinary lovers turn into professionals.

Deli

The culinary portal, which is perhaps the most popular portal about food not only in Russia, but also in neighboring countries. "Deli" is not in vain wears such a name: on the site you can find not only culinary recipes with step-by-step cooking, but also a large number of Material how to choose to choose and work with the products, how to make your dish look no worse than the famous chef, and where to go for fresh gastronomic impressions.

Another culinary journal, from which it is difficult to tear away to lovers to cook something "seek"! The magazine itself collected more than 35 thousand original recipes, video instructions for cooking and prompting in the ingredients. Each recipe is equipped with a special meter that helps to calculate the correct amount of ingredients depending on the number of portions. Every week, popular fudblers and chefs are divided by their stories, exclusive recipes and secrets of their preparation.

The market for food delivery today is not attempting to surprise us: someone specializes in fast cooking dishes, someone - at home kitchen, and someone - on. Perhaps in our country this direction is just beginning to gain momentum, but with almost every 3rd hostess abroad, it is already using this service to prepare your dream dish. The service "Shefmarket" offers a whole program in order to ease the life of modern housewives. The site has specially developed categories in which the menu complex is offered, step-by-step recipes for cooking and the service for the delivery of all ingredients directly to your kitchen!
All you need is just entering the site, choose a suitable complex and, voila, - all the necessary ingredients are already on your table.

Recipes Jamie Oliver

Culinary Guru Jamie Oliver is known worldwide due to its numerous shows and books. Recipes Jamie love even newcomers, because In his recipes, Oliver uses simple ingredients that can be reached at any store today. Moreover, in its video tutorials presented on the site, Jamie reveals all the secrets and shares the intricacies of cooking a dish. If you are looking for a healthy and tasty nutrition, then the kitchen Jamie is for you.

Blog with taste andy chef

Who said women preparing a better man? Culinary blog Andrei Rudkov can argue with you. Andrei began to lead his blog in 2013, when I realized that nothing inspires him as cooking food, so Andrei decided to inspire people.

"Blog with taste" is filled with many. Moreover, this "raisin" lies not only in the ingredients used, but also in the technique. All photos for each recipe Andrei makes personally. And in the aggregate recipe it turns out so appetizing that I would like to immediately go to the kitchen and repeat the experiment.

In addition to recipes on the site there is a large number. useful material On the gastronomic travel, the basics of cooking and reviews technological innovations. And as a bonus, every wishes can see the master classes with the participation of Andrei and replenish their baggage lessons of food photos.

Caidika

Another author's blog that will not leave an indifferent one woman! Irina Chadeev is a real cake specialist and the author of such famous books, like "cakes and something else ...", "Baking according to GOST. The taste of our childhood "," All about the pies "and others. When for the first time you get to the personal page of Irina LiveJournal, time flies unnoticed, and for 3 hours it has been evaporated somewhere. "Pie with blueberries", "Pie with the Lemon Ganash", "meringue with chocolate", "Cherry Cakes" ... and this is just a small part of those names that cause an increased influx of endorphins in the body. Each recipe is supported by beautiful and stylish photos of the author. And if something does not work, then in the comments you can ask all the questions you are interested in. Be sure they definitely do not remain unanswered!

In August, Instagram launched a new feature - stories that disappear after 24 hours. In a new review, I decomposed all the possibilities on the shelves

Literally on the first day of the appearance of "stories" I wrote an article with. Nevertheless, questions about how to use Stories every day becomes more and more. Therefore, I decided to prepare the full instruction on Instagram Stories.

Here we go? 🙂

What is instagram stories?

This question is asked in different ways. That's just part search queries by new function Instagram: "What a mug in instagram from above", "how to make in instagram so that you are in a circle", "what kind of circles in the news", "what a circle around the avatar", "Circles in Instagram", "what a new Fine in Instagram "and so on.

- This is a new feature of the application, which in Russian is called "stories" or "stories". These are photos and videos that will disappear exactly after the day after loading.

What is the meaning of "stories"?

Instagram launched STORIES with the idea to make users more than the moments from real life. Because now, if you see the ribbon in the social network, most photos are perfect: they are working on them for 5 minutes in the photo edits to set, analyze the statistics and choose the best time to publish time.

In addition, it is believed to do more than 1-3 photos per day - Moveton. And Stories allows you to do at least 10 publications, while you will not be a spammer.

And in general, the content that disappears is a new trend. Pioneer - Snapchat, in a sense, a competitor Instagram. And apparently, the second decided not to lag behind.

Where are Stories?

You can see the "stories" at the top of the news feed, where they are presented in the form of a separate tape. Looks like this.

The first avatar is my "story." The + sign in the blue circle means that I have no photo or video in "Stories", and I can add it. To add "story", I need to press on a plus in a black circle over my avatar.

The following avatars in the color circle are the "stories" of the people I have been signed, and who have something new that I was unbot. If you browse the list to the left, you can see all the "stories", published by my friends. Including those that I have already seen - these "stories" are not colored circles, but white. Example below.

How to connect Instagram Stories?

"Stories" are available to all users of the application. Somehow it is not necessary to connect it. If this function for some reason you have not appeared, it is worth updating Instagram to the latest version.

How to start your "story"?

Click on the plus in the black circle in the left corner of the "News" tab. Another option - swipe your finger across the screen to the left in any part of the news feed. So in front of you will also appear Instagram Stories.

We will analyze what is there.

Circle in the center - This is a button to make a photo or video. Click once to make a photo. Press and hold your finger to make a video.

Just a few days ago, Instagram added a new feature: Now in the "stories" you can immediately shoot Boomerang (rounded video). To remove Boomerang, tap this word at the bottom of the screen, and then the mug to make a video.

Two arrows iconto the right of the white circle is the button to switch between cameras - front and external. You can also switch by pressing twice on the screen, which is especially convenient if you take a video and you need to quickly change the camera.

To the left of the white mug you see two icons. Lightning in a circle - This is a flash. Click on it to add lights in a photo or video. Moon in a circle -it appears automatically when the phone sees that there is not enough lighting. It is worth clicking on it to improve the quality of the photo (though, I think you understand that with poor lighting, even with a flash or "moon" - the quality will not be ahti).

In the upper left corner you see icon setup.
So what is there.

Opportunity hide "Stories"From people who are signed on you, but you would not want them to view these photos and video (as you can see, I have two such people).

Below - restriction on comments. You can choose anyone to write a message-answer to the "story", those who are signed or disable this feature at all (especially suited to public people who have hundreds of thousands of subscribers).

Save photos from "stories" automatically. You can enable this feature and the entire flow of your photos and video will be saved on your phone.

If you do not need to save all photos, you can save your favorite publication separately. On the photo on the left you see the publication I made in Stories. In the lower right corner there is a shooter - by clicking on it, you save this photo.

Left you see Cancel -clicking, you remove the photos or video. Be careful by clicking "Cancel", it is impossible to return photos / video.

We will analyze also additional features Instagram Stories. In the upper right corner you see two icons - drawing and text.

Pictureyou can also apply in the photo, and on the text. It can be created using three tools: marker, stand out and neon brushes. Choose the one that you like best and is suitable for content. There you can choose the thickness of the stroke and color. For example, see below in the photo.

Textmay contain not only letters, but also smiles. You can choose any color, including for one word - one color, for the other - the other. You can change the size of the text and turn as you want. To do this, reduce and divor the two fingers.

While there is no possibility to add multiple inscriptions. Well, in this place, and in this, and in this. But here lifehak, How can I do that. First option - add gaps so that the inscription is in several places (photo below).

You can still take advantage special applicationswhere to add as many aspirations, any fonts, colors and sizes.

Just put @ and start entering the name of the person or the page you want to mention in the photo / video. Avatars will appear, among them you choose the desired profile. After publication, the link will become active. Example - see below in the photo.

Also, together with reference to the profiles, Instagram announced that he started testing links to external sites. The first access to such a function was obtained by known personalities with verified accounts (check mark near Nick).

In addition to text and drawing, in Instagram Stories you can add effects in photo and video. To do this, spend the left or right screen - and select the filter. There are only six of them, and often they complement the content very well.

In Stories you can add photos and videos that you already have in your phone, from your gallery. In this secret of high-quality photos downloaded in "History", as well as filters and effects, which, as it were, there are no stories. For example, often users download videos made in Snapchat (you know when a person appears a dog face and he licks the screen? God, even write funny)).

So you have the opportunity to handle photos and videos in any application - and ship already in Storsith.

Spend your finger from top to bottom, a window will pop up with a list of photos and videos made in the last 24 hours and saved in the phone. Note: only in the last day! Select the content you want to download, and it is in Stories.

Lifehak. If the photo has been done not in the last day, a week / month / a year ago, process it in one of the applications (VSCO or SNAPSEED type) and download it to the phone. It will appear as new. You can not even process, but simply download to the application - and unload back to the phone.

With boomerang and video a little more difficult. Reception with which I use: I send from the phone video in Google Disc Or on the "mail" and from there I again download. If you know better wayShare 🙂

You can also calmly delete photo or video From Stories. To do this, click on the Troetch in the lower right corner.

Even if you do not delete the photo, it will still disappear from the tape after 24 hours, do not forget about it.

What is the photo format?

Many immediately after the appearance of a new function began to complain about the specific format of photography. True, it is not clear why the photo in Instagram Stories as if enlarged.

The fact is that Instagram customizes a photo under Stories, because of what part of the snapshot can be cropped. And without the possibility to choose what exactly cut.

For example, I have a photo that I removed on the phone in a square format. That's what it does with her Stories.

What in this case to do? There are several options. The first is to shoot immediately in Instagram Stories (but then you can't edit the photo). The second - to shoot on the phone vertically, while still the edges will be cut, but slightly.

Third option - add a frame. I'm doing it simple way: Opening a photo in the gallery on the phone and make a screen. That's what happens.

I think it is worth experimenting with applications where you can add a framework. Remember how it was before Instagram allowed to load not only square photos? Here these applications will again come as if by the way. True, I do not bother on this.

How to post comments in Stories?

In no way. In the "stories" there is no comments and there are no likes. But there is an opportunity to answer the publication by sending a personal message to a person to Direct. For example, as I sent a polynet compliment.

How to put "stories" by pause?

Yes, you can stop the "story" to read the text in the picture, for example. To do this, simply click on the screen and keep your finger - photos and videos will not move.

How to glue photos and videos into one "story"?

Your publications are collected in one story on their own. You just download one photo after another, video, boomerang - and the app does everything for you. As a result, a selection of events in 24 hours is obtained. How many publishing was done, you can see at the very top - you see a tape from the drops?

Whose "stories" do I see?

You see Stories people you are signed. Their "stories" appear one after another in the upper part of the news feed. New "stories" - circled with colored halo.

By clicking on the person's avatar, you will see His "story". The transition between "stories" occurs automatically, but you can speed up the process by pressing the screen with your finger. Well, if you click on the screen to the right and left, you will move between the "stories" of different users.

Also see the "history" of a person in his profile: His avatar is applied bright color.

Is it possible to turn off someone "stories"?

If you are signed on a person, but do not want to see his "stories", you can hide them.

To do this, go to the news feed, find the "story" of the person you want to hide - press your finger and hold for a couple of seconds. A screen will appear with the "Hide Stories @ user" button. Press - and exhale. You will no longer see the "stories" of this person.

You can see "stories" again. To do this, scroll through the Stories tape to the end - there you will see profiles of those who hid. Click on the avatar, hold down a couple of seconds and the same field appears in front of you with the ability to return the profile in the tape.

A person will see that I watched His "story"?

Yes, remember this if you are watching someone's story, a person learns about it. The photo appears the number of views, and if you pull the up screen - there will be a list of all users who have seen your "story". You can do it only, that is, other users do not know how many people see your story.

By the way, it is not seen in the list how many times the person looked through your story. So fans will calculate difficult 😉

Who is the first visible in the list of my "stories"?

When you open a list of those who watched your stories, at the top you, as a rule, see those users with which you are active in all. Their "stories" you most likely see among the first in the ribbon.

Why I say "most likely" and "as a rule," because Instagram does not disclose its algorithms, and then it is certainly difficult to say. These are my personal observations.

Is it possible to secretly watch someone's "story"?

No, Instagram does not give this opportunity. Yes, and applications that are able to make you "invisible" I have not yet found.

True, under the previous review, I received a lot of comments that the "invisible" in Stories has already appeared. For example, one girl told that he sees one number of views on his "history", and opening a list - they are less than several people. I did not observe such a phenomenon in my accounts, but I think that the case is rather in the "Storsith" glitch than in the appearance of "invisible". Time will tell.

Who sees my "story"?

It all depends on the confidential confidentiality of your account. You closed profile ? Then your "story" see only the subscribers approved by you, those who have friends with you. Unnecessary to see your stories cannot.

Google Search Engine (www.google.com) provides many search options. All these features are an invaluable search tool for the user for the first time in the Internet and at the same time even more powerful weapons of invasion and destruction in the hands of people with evil intentions, including not only hackers, but also non-computers and even terrorists.
(9475 views for 1 week)

Denis Bartankov
Denisnospamixi.ru.

Attention:This article is not a guide to action. This article is written for you, administrators of Web servers so that you have false feeling that you are safe, and you finally understood the cunningness of this method of obtaining information and took up the protection of your site.

Introduction

For example, in 0.14 seconds found 1670 pages!

2. We introduce another string, for example:

inurl: "auth_user_file.txt"

a little less, but this is already enough to free download and to select passwords (with the same John the Ripper). Below I will give a number of examples.

So, you need to realize that the Google search engine visited most of the Internet sites and kept the information in the cache contained on them. This cached information allows you to get information about the site and the content of the site without direct connection to the site, only digging in the information that is stored inside Google. Moreover, if the information on the site is no longer available, then the information in the cache may still be preserved. All you need for this method: know some keywords Google. This technician is called Google Hacking.

For the first time, information about Google Hacking appeared on the newsletter BugTruck for another 3 years ago. In 2001, this topic was raised by one French student. Here is a link to this letter http://www.cotse.com/mailing-lists/bugtraq/2001/nov/0129.html. It contains the first examples of such requests:

1) index of / admin
2) INDEX OF / PASSWORD
3) index of / mail
4) Index of / + Banques + FileType: XLS (for France ...)
5) INDEX OF / + PASSWD
6) index of / password.txt

This topic was wondered in the English-reading part of the Internet recently: after Johnny Long article released on May 7, 2004. For a more complete study of Google Hacking, I advise you to enter the site of this author http://johnny.ihackstuff.com. In this article, I just want to enter you into the case.

Who can be used:
- Journalists, spies and all those people who love to poke the nose are not in their affairs, can use it to search for a compromising.
- Hackers looking for suitable goals for hacking.

How Google works.

To continue the conversation, I remind some of the keywords used in Google queries.

Search by sign +

Google excludes from the search for unimportants, in his opinion, words. For example question words, prepositions and articles in english language: For example, Are, of, Where. In Russian, Google seems to be important to be important. If the word is excluded from the search, then Google writes about it. So that Google began to search for pages with these words before them need to add a sign + without a space before the word. For example:

ACE + of Base

Search by sign -

If Google finds a large number of centers, from which it is necessary to eliminate pages with a certain subject, then you can force Google to look for only pages on which there are no specific words. To do this, you need to specify these words, putting before each sign - without a space before the word. For example:

Fishing - stock

Search by sign ~

It is possible that you want to find not only the specified word, but also its synonyms. To do this, let's specify the symbol ~.

Search for an exact phrase with double quotes

Google is looking for on every page all the entry of the words you wrote in the query row, and it does not matter the mutual position of the words, the main thing is that all the specified words are on the page at the same time (this is the default action). To find the exact phrase - it needs to be taken in quotes. For example:

"bookend"

To have at least one of these words, you need to specify the logical operation explicitly: OR. For example:

Book Security OR Protection

In addition, a sign can be used in the search bar * to designate any word and. To denote any symbol.

Search for words with additional operators

There are search operators that are specified in the search string in format:

operator: search_term

Naps next to the colon are not needed. If you insert a gap after the colon, you will see an error message, and in front of it, then Google will use them as a regular line to search.
There are groups of additional search operators: Languages \u200b\u200b- indicate what language you want to see the result, the date - limit results for the past three, six or 12 months, entering - indicate where the document you want to search for a line: everywhere, in the header, in the URL, domains - Search on the specified site or on the contrary to exclude it from the search, secure search - block sites containing the specified information type and delete them from the search results pages.
At the same time, some operators do not need an additional parameter, such as a request " cache: www.google.com."may be called as a full-fledged string to search, and some keywords, on the contrary, require the presence of a word to search, for example" site: www.google.com HELP"In the light of our subject we'll look at the following operators:

Operator

Description

Requires additional parameter?

search only on the site specified in Search_Term

search only in documents with SEARCH_TERM type

find pages containing search_term in title

find pages containing all words search_term in title

find pages containing search_term word in your address

find pages containing all SEARCH_TERM words in your address

Operator site: limits the search only on the specified site, and you can specify not only domain name, but also the IP address. For example, enter:

Operator fileType: Limits the search in the files of a certain type. For example:

At the date of release of the article Google can search within 13 different file formats:

  • Adobe Portable Document Format (PDF)
  • Adobe PostScript (PS)
  • Lotus 1-2-3 (WK1, WK2, WK3, WK4, WK5, WKI, WKS, WKU)
  • Lotus WordPro (LWP)
  • MACWRITE (MW)
  • Microsoft Excel. (XLS)
  • Microsoft PowerPoint (PPT)
  • Microsoft Word. (DOC)
  • Microsoft Works (WKS, WPS, WDB)
  • Microsoft Write (WRI)
  • Rich Text Format (RTF)
  • Shockwave Flash. (SWF)
  • Text (ANS, TXT)

Operator link: Shows all pages that indicate the specified page.
Probably always interesting to see how many places on the Internet know about you. We try:

Operator cache: Shows the version of the site in the Google Kesche, as she looked when Google last Once attended this page. We take any, often changing site and look:

Operator intitle: Looking for the specified word in the title page. Operator allintitle: It is an extension - it is looking for all the specified few words in the title page. Compare:

Intitle: Mars Flight
Intitle: Intitle Flight: At Intitle: Mars
Allintitle: Flight to Mars

Operator inurl:forces Google Show all pages containing the specified string in the URL. Operator Allinurl: Looking for all words in the URL. For example:

Allinurl: acid_stat_alerts.php

This team is especially useful for those who have no SNORT - at least be able to see how it works on the real system.

Hacking methods with Google

So, we found out that using a combination of the above operators and keywords, anyone can take a collection of the necessary information and search for vulnerabilities. These technical techniques are often called Google Hacking.

site `s map

You can use the Site statement: To view all the links that Google found on the site. Usually pages that are dynamically created by scripts using parameters are not indexed, so some sites use ISAPI filters so that the links are not in the form /Article.asp?num\u003d10&dst\u003d5, and with slashes / ARTICLE / ABC / NUM / 10 / DST / 5. This is done so that the site is generally indexed by search engines.

Let's try:

Site: www.whitehouse.gov WhiteHouse

Google thinks that every page of the site contains the word Whitehouse. This we use to get all the pages.
There is a simplified version:

Site: Whitehouse.gov.

And what is the most pleasant one - comrades with whiteHouse.gov did not even know that we looked at the structure of their site and even looked into the cached pages that Google downloaded themselves. It can be used to study the structure of sites and view the contents, remaining unnoticed to the time before time.

View file list in directories

Web servers can show the lists of the server directory instead of the usual HTML pages. This is usually done so that users choose and download certain files. However, in many cases, administrators have no purpose to show the contents of the directory. This arises as a result incorrect configuration Server or absence main page In the directory. As a result, the hacker appears a chance to find something interesting in the directory and take advantage of this for its purposes. To find all such pages, it is enough to notice that they all contain in their title words: index of. But since the words index of contain not only such pages, then you need to clarify the request and take into account keywords on the page itself, so we will suit the requests of the form:

intitle: index.of Parent Directory
Intitle: index.of Name Size

Since mainly the directory listings are deliberately, you may find it difficult to find mistakenly removed listings from the first time. But at least you can already use listings to determine web version Servers as described below.

Getting a version of the Web server.

Knowledge of the version of the Web server is always useful before any ataction of hacker. Again, thanks to Google, you can get this information without connecting to the server. If you carefully look at the listing of the directory, you can see that the server name is displayed there and its version.

Apache1.3.29 - Proxad Server AT TRF296.FREE.FR Port 80

An experienced administrator can replace this information, but, as a rule, it corresponds to the truth. So, to get this information just to send a request:

Intitle: index.of Server.at

To obtain information for a specific server, we specify the query:

Intitle: index.of Server.at Site: ibm.com

Or, on the contrary, we are looking for a server working on a specific server version:

Intitle: index.of Apache / 2.0.40 Server AT

This technique can be used by a hacker to find the victim. If he has, for example, there is an exploit for a specific version of the Web server, then it can find it and try the existing exploit.

You can also get a version of the server by viewing the pages that are installed by default when installing the latest version of the Web server. For example, to see the test page Apache 1.2.6 is enough to dial

Intitle: test.page.for.APACHE It.Worked!

Moreover, some oS When installing immediately put and run a WEB server. At the same time, some users do not even suspect about it. Naturally, if you see that someone did not delete the default page, it is logical to assume that the computer did not undergo any configuration at all and probably vulnerable to attacks.

Try Find IIS 5.0 Pages

allintitle: Welcome to Windows 2000 Internet Services

In the case of IIS, you can define not only the version of the server, but also windows version and Service Pack.

Another way to determine the version of the Web server is to search for manuals (tip pages) and examples that can be installed on the default website. Hackers found quite a lot of ways to use these components to get privileged access to the site. That is why you need to remove these components on the battle site. Not to mention the fact that by the presence of these components you can get information about the type of server and its version. For example, we will find a guide to Apache:

INURL: MANUAL APACHE DIRECTIVES MODULES

Use Google as CGI scanner.

CGI Scanner or Web Scanner - utility to search for vulnerable scripts and programs on the sacrifice server. These utilities should know what to seek, for this they have a whole list of vulnerable files, for example:

/cgi-bin/cgiemail/uargg.txt
/random_banner/index.cgi.
/random_banner/index.cgi.
/cgi-bin/mailview.cgi.
/cgi-bin/maillist.cgi.
/cgi-bin/userreg.cgi.

/iissamples/issamples/sqlqhit.asp.
/SiteServer/Admin/findvServer.asp.
/sscripts/cphost.dll
/cgi-bin/finger.cgi.

We can find each of these files using Google using an additional file name in the search string of the word index of or inurl: We can find sites with vulnerable scripts, for example:

Allinurl: /random_banner/index.cgi.

Taking advantage of additional knowledge, the hacker can use the script vulnerability and with this vulnerability to force the script to output any file stored on the server. For example, the password file.

How to protect yourself from hacking through Google.

1. Do not post important data on the Web server.

Even if you posted the data temporarily, then you can forget about it or someone will have time to find and pick up this data while you do not erase them. Do not do so. There are many other ways to transfer data that protect them from theft.

2. Check your website.

Use the methods described to study your site. Check your site periodically with new methods that appear on the site http://johnny.ihackstuff.com. Remember that if you want to automate your actions, you need to get a special resolution from Google. If you carefully read http://www.google.com/terms_of_service.html. You will see the phrase: You may not send auto-coming queries of any sort to google "S System without Express Permission in Advance From Google.

3. You may not need Google to index your website or part of it.

Google allows you to delete a link to your site or part of its base, as well as delete the cache pages. In addition, you can prohibit image search on your site, it is described to shown short fragments of pages in the search results http://www.google.com/remove.html. . To do this, you must confirm that you really owner this site or insert the tags or

4. Use robots.txt

It is known that search engines look into the Robots.txt file lying in the root of the site and do not index those parts that are marked with a word Disallow.. You can take advantage of this in order for part of the site not indexed. For example, so that the entire site is not indexed, create a Robots.txt file containing two lines:

User-Agent: *
Disallow: /

What else happens

To help you with honey, I will not seem to say, I will say that there are sites that follow the people who, using the above methods, are looking for holes in scripts and Web servers. An example of such a page is

Application.

A little sweet. Try something from the following list:

1. #mysql Dump FileType: SQL - Search Database Dumps MySQL
2. Host Vulnerability Summary Report - will show you what vulnerabilities found other people
3. PHPMYADMIN RUNNING ON INURL: Main.php - It will make control through the PHPMYAdmin panel
4. NOT FOR DISTRIBUTION Confidential
5. Request Details Control Tree Server Variables
6. Running in Child Mode
7. This Report Was Generated by Weblog
8. INTITLE: index.of cgiirc.config
9. FileType: CONF INURL: Firewall -intitle: CVS - who can need a firewall configuration files? :)
10. Intitle: index.of Finances.xls - mda ....
11. INTITLE: INDEX OF DBCONVERT.EXE CHATS - Chat ICQ logs
12. INTEXT: Tobias Oetiker Traffic Analysis
13. Intitle: usage statistics for generated by Webalizer
14. Intitle: Statistics of Advanced Web Statistics
15. Intitle: index.of WS_FTP.INI - WS FTP config
16. INURL: IPSEC.SECRETS HOLDS SHARED SECRETS - Secret key - good find
17. Inurl: main.php Welcome to phpMyadmin
18. INURL: SERVER-INFO Apache Server Information
19. Site: Edu Admin Grades
20. ORA-00921: UNEXPECTED END OF SQL COMMAND - Get the way
21. Intitle: index.of trillian.ini
22. INTITLE: INDEX OF PWD.DB
23. INTITLE: index.of people.lst
24. Intitle: index.of master.passwd
25. INURL: PassList.txt
26. Intitle: index of .mysql_history
27. INTITLE: INDEX OF INTEXT: GLOBALS.INC
28. Intitle: index.of administrators.pwd
29. Intitle: index.of etc shadow
30. Intitle: index.of secring.pgp
31. INURL: config.php dbuname dbpass
32. Inurl: Perform FileType: Ini

  • "Hacking Mit Google"
  • The educational center "Informzashchita" http://www.itsecurity.ru is a leading specialized center in the field of information security training (License of the Moscow Committee of Education No. 015470, State Accreditation No. 004251). The only authorized training center of companies Internet Security Systems and Clearswift in Russia and CIS countries. Authorized Training Center Microsoft (Specialization Security). Training programs are agreed with the State Staff of Russia, FSB (FAPSI). Training certificates and state documents On advanced training.

    SoftKey is a unique service for buyers, developers, dealers and affiliate partners. In addition, it is one of the best online stores in Russia, Ukraine, Kazakhstan, who offers buyers a wide range, many payment methods, operational (frequent instantaneous) order processing, tracking the process of execution of the order in a personal section, various discounts from the store and manufacturers BY.

    USSCLTD May 10, 2016 at 12:38

    We are looking for vulnerabilities S. use Google

    • Information Security

    Any search for vulnerabilities on web resources begins with intelligence and collecting information.
    Intelligence can be both active - brutfors files and site directors, launch of vulnerabilities, manual viewing of the site, and passive - search for information in different search engines. Sometimes it happens that the vulnerability becomes known even before the opening of the first page of the site.

    How is this possible?
    Search robots, non-stop wandering over the Internet, in addition to the information, a useful normal user, often record what can be used by attackers when attacking the web resource. For example, scripting errors and sensitive information files (starting from configuration files and logs, ending with files with authentication data and database backups).
    From the point of view of the search robot, the SQL request error message is the usual text, inseparable, for example, from the description of the goods on the page. If suddenly search robot stumbled upon a file with extension.sql, which for some reason turned out to be in working folder Site, it will be perceived as part of the contents of the site and will also be indexed (including the passwords specified in it).

    Such information can be found, knowing stable, often unique, keywords that help separate "vulnerable pages" from vulnerability pages.
    A huge base of special requests using keywords (so-called Dorkov) exists on exploit-db.com and is known called Google Hack Database.

    Why google?
    Dorki are oriented primarily on Google for two reasons:
    - the most flexible keyword syntax (given in Table 1) and special characters (given in Table 2);
    - Google index is still more complete than other search engines;

    Table 1 - Main keywords Google

    Keyword
    Meaning
    Example
    site.
    Search only on the specified site. Givens only URL
    site: SomeSite.ru - will find all pages on this domain and subdomains
    inurl
    Search according to the words present in the URI. Unlike CL. Words "Site", looking for coincidence after the site name
    inurl: News - will find all the pages where this word will meet in the URI
    intext.
    Page Search
    intext: "Tubes" - fully similar to the usual query "Tubes"
    intitle
    Search in the title page. Text enclosed between tags <br></td> <td width="214">intitle: "index of" - will find all pages with a listing of the directory <br></td> </tr><tr><td width="214">eXT. <br></td> <td width="214">Search pages with specified extension <br></td> <td width="214">ext: PDF - will find all PDF files <br></td> </tr><tr><td width="214">filetype <br></td> <td width="214">Currently, it is completely similar to CL. Word "EXT" <br></td> <td width="214">fileType: PDF - similar <br></td> </tr><tr><td width="214">related <br></td> <td width="214">Search sites with similar subjects <br></td> <td width="214">related: Google.ru - will show his analogs <br></td> </tr><tr><td width="214">lINK. <br></td> <td width="214">Search sites that refer to this <br></td> <td width="214">link: SomeSite.ru - will find all the sites that have a link to this <br></td> </tr><tr><td width="214">define <br></td> <td width="214">Show definition words <br></td> <td width="214">define: 0Day - Definition of the term <br></td> </tr><tr><td width="214">cache. <br></td> <td width="214">Show the contents of the page in the cache (if available) <br></td> <td width="214">cache: Google.com - Will Open Cache Page <br></td> </tr></tbody></table><p>Table 2 - <a href="https://totrdlo.ru/en/ekranirovanie-simvolov-kakie-specialnye-simvoly-dolzhny-byt-ekranirovany-v-regulyarnyh-vyrazheniyah.html">Special symbols</a> Google requests <br></p><table><tbody><tr><td width="214"><b>Symbol</b><br></td> <td width="214"><b>Meaning</b><br></td> <td width="214"><b>Example</b><br></td> </tr><tr><td width="214">“<br></td> <td width="214">Accurate phrase <br></td> <td width="214">intitle: "Routeros Router Configuration Page" - Search for routers <br></td> </tr><tr><td width="214">*<br></td> <td width="214">Any text <br></td> <td width="214">iNURL: "Bitrix * Mcart" - search sites on Bitrix with a vulnerable mcart module <br></td> </tr><tr><td width="214">.<br></td> <td width="214">Any symbol <br></td> <td width="214">Index.of - Similar to InDex of <br></td> </tr><tr><td width="214">-<br></td> <td width="214">Eliminate word <br></td> <td width="214">error -Warning - Show all Pages where Error is, but no warning <br></td> </tr><tr><td width="214">..<br></td> <td width="214">Range <br></td> <td width="214">cVE 2006..2016 - Show vulnerabilities by year since 2006 <br></td> </tr><tr><td width="214">|<br></td> <td width="214">Logical "or" <br></td> <td width="214">linux | Windows - Show pages where either the first or second word is found. <br></td> </tr></tbody></table><br> It is worth understanding that any request for the search engine is the search only according to. <br> It is useless to search on the page Meta-symbols (quotes, brackets, punctuation signs, etc.). Even the search on the exact phrase specified in quotes is the search according to the words, followed by the search for the exact coincidence already in the results. <p>All Dorki Google Hack Database is divided logically to 14 categories and are presented in Table 3. <br> Table 3 - Google Hack Database categories <br></p><table><tbody><tr><td width="168"><b>Category</b><br></td> <td width="190"><b>What allows you to find</b><br></td> <td width="284"><b>Example</b><br></td> </tr><tr><td width="168">Footholds. <br></td> <td width="190">Web Shells, Public File Managers <br></td> <td width="284">Find all hacked sites where the listed web cheals are filled: <br> (intitle: "phpshell" or intitle: "c99shell" or intitle: "r57shell" or intitle: "php shell" or intitle: "phpremoteview") `RWX`" Uname " <br></td> </tr><tr><td width="168">Files Containing Usernames. <br></td> <td width="190">Registry files <a href="https://totrdlo.ru/en/oshibki-konfiguracii-programm-oshibki-konfiguracii-programm-oshibka-chteniya.html">configuration files</a>, logs, files containing the history of the commands <br></td> <td width="284">Find all registry files containing account information: <br><i>fileType: REG Reg + Intext: "Internet Account Manager"</i><br></td> </tr><tr><td width="168">Sensitive Directories. <br></td> <td width="190">Catalogs with different information (personal documents, configs VPN, hidden repositories, etc.) <br></td> <td width="284">Find all the listings directory containing files related to VPN: <br><i>"Config" intitle: "index of" intext: VPN</i><br> Sites containing git repositories: <br><i>(Intext: "index of /.git") ("Parent Directory")</i><br></td> </tr><tr><td width="168">Web Server Detection. <br></td> <td width="190">Version and other information about the web server <br></td> <td width="284">Find administrative consoles JBOSS Server: <br><i>iNURL: "/ Web-Console /" Intitle: "Administration Console"</i><br></td> </tr><tr><td width="168">Vulnerable Files. <br></td> <td width="190">Scripts containing known vulnerabilities <br></td> <td width="284">Find sites using a script that allows you to unload an arbitrary file from the server: <br><i>allinurl: forcedownload.php? File \u003d</i><br></td> </tr><tr><td width="168">Vulnerable Servers. <br></td> <td width="190">Installation scripts, web shells, open administrative consoles, etc. <br></td> <td width="284">Find open phpMyadmin consoles running from root: <br><i>intitle: phpmyAdmin "Welcome to phpMyadmin ***" "Running on * as root @ *"</i><br></td> </tr><tr><td width="168">Error Messages. <br></td> <td width="190">Various errors and warnings often revealing <a href="https://totrdlo.ru/en/telefon-ldzhi-s-izognutym-ekranom-obzor-lg-g-flex-vot-tak.html">important information</a> - Starting from CMS version to passwords <br></td> <td width="284">Sites that have errors in performing SQL queries to the database: <br><i>"Warning: MySQL_Query ()" "Invalid Query"</i><br></td> </tr><tr><td width="168">Files Containing Juicy Info <br></td> <td width="190">Certificates, backups, emails, logs, SQL scripts, etc. <br></td> <td width="284">Find initialization SQL scripts: <br><i>fileType: SQL and "Insert Into" -Site: github.com</i><br></td> </tr><tr><td width="168">Files Containing Passwords. <br></td> <td width="190">All that can contain passwords - logs, sql scripts, etc. <br></td> <td width="284">Logs mentioning passwords: <br><i>fileType:</i><i>log.</i><i>intext:</i><i>password |</i><i>pass |</i><i>pw.</i><br> SQL scripts containing passwords: <br><i>eXT:</i><i>sQL</i><i>intext:</i><i>userName.</i><i>intext:</i><i>password.</i><br></td> </tr><tr><td width="168">Sensitive Online Shopping Info <br></td> <td width="190">Information related to online shopping <br></td> <td width="284">Find pinkods: <br><i>dCID \u003d.</i><i>bN \u003d.</i><i>pIN.</i><i>code \u003d.</i><br></td> </tr><tr><td width="168">Network or Vulnerability Data <br></td> <td width="190">Information that is not directly related to the web resource, but affecting the network or other non-web services <br></td> <td width="284">Find scripts <a href="https://totrdlo.ru/en/kak-v-vindovs-10-ustanovit-obnovleniya-nastroika-avtomaticheskogo.html">automatic setting</a> Proxy containing information about the internal network: <br><i>inurl: proxy | INURL: WPAD EXT: PAC | EXT: Dat FindProxyForull</i><br></td> </tr><tr><td width="168">Pages Containing Login Portals <br></td> <td width="190">Pages containing login forms <br></td> <td width="284">Saplogon web pages: <br><i>intext: "2016 SAP AG. All Rights Reserved. " Intitle: "Logon"</i><br></td> </tr><tr><td width="168">Various Online Devices. <br></td> <td width="190">Printers, routers, monitoring systems, etc. <br></td> <td width="284">Find the printer configuration panel: <br><i>intitle: "</i><i>hP.</i><i>laserJet "</i><i>inurl:</i><i>SSI /</i><i>AUTH /</i><i>sET_</i><i>config_</i><i>deviceInfo.</i><i>htm.</i><br></td> </tr><tr><td width="168">Advisories and vulnerabilities <br></td> <td width="190">Sites on Vulnerable Versions CMS <br></td> <td width="284">Find vulnerable plugins through which you can download an arbitrary file to the server: <br><i>iNURL: FCKEDITOR -INTEXT: "ConfigiseNabled \u003d false" Intext: configiseneabled</i><br></td> </tr></tbody></table><br> Dorkie more often focused on the search for all Internet sites. But nothing prevents to limit the search area on any site or sites. <br> Each request to Google can be focused on a specific site by adding the keyword "Site: SomeSite.com" to the request. This keyword can be addressed to any deck. <p><b>Automation of searching for vulnerabilities</b><br> So the idea was born to write a simple utility that automates the search for vulnerabilities using a search engine (Google) and based on Google Hack Database.</p><p>The utility is a script written on Nodejs using Phantomjs. To be accurate, the script is interpreted by the PhantomJS itself. <br> Phantomjs is a full-fledged web browser without a graphical interface, controlled by the JS code and has a convenient API. <br> The utility received a completely understandable name - Dorks. By running it on the command line (without options), we get a short help with several examples of use: <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/edd/6fb/ccc/edd6fbccc5ec340abe750f3073c1b427.jpg' width="100%" loading=lazy loading=lazy><br> Figure 1 - List of main options DORKS</p><p>Total utility syntax: DORK "command" "List of options". <br> A detailed description of all options is presented in Table 4.</p><p>Table 4 - DORKS Syntax <br></p><table border="1"><tbody><tr><td width="214"><b>Team</b><br></td> <td width="214"><b>Option</b><br></td> <td width="214"><b>Description</b><br></td> </tr><tr><td rowspan="4" width="214">gHDB. <br></td> <td width="214">-L. <br></td> <td width="214">Display a numbered list of categories Dorkov Google Hack Database <br></td> </tr><tr><td width="214">-C "Number or name of category" <br></td> <td width="214">Download Dorki specified by number or name <br></td> </tr><tr><td width="214">-Q "phrase" <br></td> <td width="214">Download Dorki, found on request <br></td> </tr><tr><td width="214">-o "File" <br></td> <td width="214">Save the result to the file (only with options -c | -q) <br></td> </tr><tr><td rowspan="8" width="214">google <br></td> <td width="214">-d "Dork" <br></td> <td width="214">Set an arbitrary Dork (option can be used many times, a combination with the -D option is allowed) <br></td> </tr><tr><td width="214">-D "File" <br></td> <td width="214">Use Dorki from file <br></td> </tr><tr><td width="214">-s "Site" <br></td> <td width="214">Set the site (option can be used many times, a combination with the -S option is allowed) <br></td> </tr><tr><td width="214">-S "File" <br></td> <td width="214">Use sites from the file (the bust of the dokov will be executed for each site independently) <br></td> </tr><tr><td width="214">-F "Filter" <br></td> <td width="214">Set additional keywords (will be added to each Dorka) <br></td> </tr><tr><td width="214">-t "Number of MS" <br></td> <td width="214">Interval between requests to Google <br></td> </tr><tr><td width="214">-T "Number of MS" <br></td> <td width="214">Taimaut, if the captcha met <br></td> </tr><tr><td width="214">-o "File" <br></td> <td width="214">Save the result to the file (only those decks will be stored for which something has been found) <br></td> </tr></tbody></table><br> Using the GHDB command, you can get all the doors with Exploit-DB on an arbitrary query, or specify the entire category entirely. If you specify a category 0 - the entire base will be unloaded (about 4.5 thousand Dorkov). <p>The list of categories available at the moment is shown in Figure 2. <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/b8f/b11/ffe/b8fb11ffeaced5066fd2fd9e43be67fb.jpg' width="100%" loading=lazy loading=lazy></p><p>Figure 2 - list of available Categories of Dorkov GHDB</p><p>The Google team will be a substitution of each Dorka in Google search engine and the result is analyzed for coincidences. Dorki for which something they will be saved to the file. <br> The utility supports different search modes: <br> 1 Dork and 1 site; <br> 1 Dork and many sites; <br> 1 site and many dokov; <br> many sites and a lot of dokov; <br> The list of dokov and sites can be set both through the argument and through the file.</p><p><b>Demonstration of work</b><br> Let's try to search for any vulnerabilities on the example of searching for error messages. On the command: DORKS GHDB -C 7 -O errors.dorks All known expensive categories "Error Messages" as shown in Figure 3 will be downloaded. <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/28c/386/641/28c386641d1528652f7f8e8b8089097a.jpg' width="100%" loading=lazy loading=lazy><br> Figure 3 - Loading all known doors category "Error Messages"</p><p>Dorki are loaded and saved to the file. Now it remains to "instill" them on some site (see Figure 4). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/8e0/a8a/3af/8e0a8a3af4f26544da1faa584813dbff.jpg' width="100%" loading=lazy loading=lazy><br> Figure 4 - Search for vulnerabilities of the site of interest in Google Cache</p><p>After some time on the site under study, several pages containing errors are found (see Figure 5).</p><p><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/10b/e83/ba3/10be83ba38f172213ba06b3f9ad05a58.jpg' width="100%" loading=lazy loading=lazy><br> Figure 5 - Error messages found</p><p>Outcome, in the file result.txt we get <a href="https://totrdlo.ru/en/komandnaya-stroka-windows-10-polnyi-spisok-komand-zapusk-komandnoi-stroki-v-windows.html">full list</a> Dorkov, leading to the appearance of an error. <br> Figure 6 shows the result of the search for site errors. <br><br> Figure 6 - error search result</p><p>In the cache on this expensive, the full backtray discloses the absolute paths of the scripts, the site content management system and the database type (see Figure 7). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/0a9/455/588/0a9455588496d6609f5e13d598cb5a48.jpg' width="100%" loading=lazy loading=lazy><br> Figure 7 - Disclosure of information about the site device</p><p>However, it is worth considering that not all Dorki from GHDB give a true result. Also, Google may not find the exact coincidence and show a similar result.</p><p>In this case, it is wiser to use your personal list of Dorkov. For example, it is always worth searching files with "unusual" extensions, the examples of which are shown in Figure 8. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/d7f/865/693/d7f865693f7fcf13137598eeed0ecb58.jpg' width="100%" loading=lazy loading=lazy><br> Figure 8 - List of file extensions not typical for a regular web resource</p><p>As a result, on the command DORKS Google -D Extensions.txt -f Bank, from the very first request, Google starts to give sites with "unusual" file extensions (see Figure 9). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/107/e1f/a2f/107e1fa2f41c4169bcc254cba2f2f4b6.jpg' width="100%" loading=lazy loading=lazy><br> Figure 9 - Search for "bad" types of files on bank topics sites</p><p>It is worth keeping in mind that Google does not perceive requests longer than 32 words.</p><p>Using the DORKS command Google -D Intext: "Error | Warning | Notice | Syntax" -f University <br> You can search for PHP interpreter errors on the sites of the educational themes (see Figure 10). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/717/74f/e36/71774fe3656bfc058c42d43262fdec4a.jpg' width="100%" loading=lazy loading=lazy><br> Figure 10 - Search for PHP errors</p><p>Sometimes it is not convenient to use any one or two categories of Dorkov. <br> For example, if it is known that the site works on the WordPress engine, then you need Dorki according to WordPress. In this case, it is convenient to use the search for Google Hack Database. The DORKS GHDB -Q WordPress -o WordPress_Dorks.txt command will load all the Dorkie via WordPress, as shown in Figure 11: <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/dcb/ac9/a4e/dcbac9a4eb12f6ec775d9cccc2fdee87.jpg' width="100%" loading=lazy loading=lazy><br> Figure 11 - Search for WordPress Relatives</p><p>Repeat back to banks and the DORKS command Google -D WordPress_Dords.txt -f Bank Let's try to find anything interesting related to WordPress (see Figure 12). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/042/0c2/c43/0420c2c435931704288b171f725ccc6a.jpg' width="100%" loading=lazy loading=lazy><br> Figure 12 - WordPress Vulnerabilities Search</p><p>It is worth noting that the search for Google Hack Database does not perceive words shorter than 4 characters. For example, if the CMS site is not known, but is known language - PHP. In this case, you can filter the desired manually using Piypa and the DORKS -C -C System System System Utility | findstr / i php\u003e php_dorks.txt (see Figure 13): <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/4c1/2f8/6e1/4c12f86e111074293c14d6a939c6ebab.jpg' width="100%" loading=lazy loading=lazy><br> Figure 13 - Search for all Dorka, where there is a mention of PHP</p><p>Search for vulnerabilities or some kind of sensitive information in the search engine should be seen only if there is a significant index on this site. For example, if the site has been indexed 10-15 pages, then it is stupid to look for anything like that. Check the size of the index is simple - just enter into the string <a href="https://totrdlo.ru/en/google-zapustil-poisk-po-blogam-hotya-i-s-opozdaniem-vyskochki.html">google search</a> "Site: SomeSite.com". An example of a site with an insufficient index is shown in Figure 14. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/78e/1db/b4f/78e1dbb4fc78cd422cec311fc2ca9d33.jpg' width="100%" loading=lazy loading=lazy><br> Figure 14 - Checking the size of the site index</p><p>Now about the unpleasant ... periodically, Google can request a capping - here it will not do anything - it will have to introduce it. For example, I have, with a passage of the "Error Messages" category (90 Dorov), the capping fell out only once.</p><p>It is worth adding that Phantomjs supports the work just through a proxy, both through HTTP and through the SOCKS interface. To enable the proxy mode, it is necessary to revaluate the corresponding string in Dorks.Bat or Dorks.sh.</p><p>The tool is available in the form of the source code.</p> <p>Facebook sometimes resembles a dark forest. Functions created specifically for the convenience of users installed in <a href="https://totrdlo.ru/en/socialnaya-set-odnoklassniki-socialnaya-set-odnoklassniki.html">social network</a>like trees in more often - there are many of them, but among them it is easy to get lost.</p> <p>Do you know, for example, how can I manage privacy settings on Facebook? We invite you to get acquainted with some network social capabilities and understand whether you missed something important.</p> <h3><span><b>To whom the posts are visible</b> </span>? <br></h3> <p>You can specify who will be visible to your Facebook posts in the future. Consider when you set the setting, it applies to all subsequent publications. Therefore, if you want this post to be visible only to friends, and the following is available to all users without exception, do not forget to change the confidentiality settings in the second case.</p> <p><b>How to install:</b> </span> Go to Privacy Settings -\u003e Privacy -\u003e Who can see my materials?</p> <h3><br></h3> <h3><span><b>Whose notifications about the marks I want to see?</b> </span></h3> <p>After the chronicle appears to view posts and photos on which you noted, it became much easier. Going to "Journal of Action", you can configure notifications that come to you when you celebrate friends, friends of friends or any Facebook users.</p> <p><b>How to install:</b> </span> Go to the actions log -\u003e Publications in which you are marked</p> <p><img src='https://i1.wp.com/likeni.ru/upload/2012/New%20Folder/fb-2.jpg' align="middle" width="100%" loading=lazy loading=lazy></p> <p>Note: When you specify someone in publication and install privacy (for example, only to friends), this message can see other users (in this case, the friends of the person marked). If you do not want the post to see certain people, set the limitations by selecting the User Settings item.</p> <p><img src='https://i2.wp.com/likeni.ru/upload/2012/New%20Folder/fb-3.jpg' align="middle" width="100%" loading=lazy loading=lazy></p> <h3><br></h3> <h3><span><b>Who can find me?</b> </span></h3> <p>It is almost impossible to hide in Facebook. However, in your power to set up everything so that the "strangers" could not find you on the social network at your email address or the phone number specified in Facebook. In addition, you can allow or prohibit search engines to show your profile in extradition.</p> <p><b>How to install:</b> </span> Go to Privacy Settings -\u003e Privacy -\u003e Who can find me?</p> <p><img src='https://i0.wp.com/likeni.ru/upload/2012/New%20Folder/fb-4.jpg' align="middle" width="100%" loading=lazy loading=lazy></p> <h3><br></h3> <h3><b><span>Did you lose your phone? In order not to increase the account ...</span> <br></b></h3> <p>In case of loss of the phone, you must immediately: Delete your <a href="https://totrdlo.ru/en/kak-zablokirovat-telefonnyi-nomer-zvonyashchego-kak-zablokirovat-zvonok-s.html">telephone number</a> of <a href="https://totrdlo.ru/en/farmit-akkaunty-kak-farmit-akkaunty-v-facebook-primer.html">account Facebook.</a> And click "Exit the system on the phone." This will prevent the use of your account with other people.</p> <p><b>What to do:</b> Go to Privacy Settings -\u003e <a href="https://totrdlo.ru/en/skachat-v-kontakte-4-2-vkontakte-mobilnaya-versiya-kak-ustanovit.html">mobile version</a> -\u003e Did you lose your phone?</p> <p><img src='https://i1.wp.com/likeni.ru/upload/2012/New%20Folder/fb-5.jpg' align="middle" width="100%" loading=lazy loading=lazy></p> <h3><br></h3> <h3><span>Notifications from group</span></h3> <p>You can set the settings to receive or not receive notifications from the groups in which you are. In addition, you can configure notifications to see only posts of friends published in the group.</p> <p><b>How to install:</b> </span> Go to Privacy Settings -\u003e Notifications -\u003e What notifications you get -\u003e Group News</p> <p><img src='https://i1.wp.com/likeni.ru/upload/2012/fb-6.jpg' align="middle" width="100%" loading=lazy loading=lazy></p> <p>There are other types of notifications that are worth setting up to simplify life and not be distracted by unnecessary spam.</p> <p>If, for example, you are tired of endless invitations in TopFACE and other notifications from different users, you can prohibit them by clicking "Disable" in the notifications panel.</p> <p><img src='https://i0.wp.com/likeni.ru/upload/2012/fb-7.jpg' align="middle" height="456" width="360" loading=lazy loading=lazy></p> <p>You can also configure which notifications want to receive by email.</p> <p><img src='https://i0.wp.com/likeni.ru/upload/2012/fb-8.jpg' align="middle" width="100%" loading=lazy loading=lazy></p> <p>By the same principle, you can customize mobile notifications, choose how you want to receive notifications about the actions of friends and subscribers and whether you want at all, as well as configure the alerts for the pages you control.</p> <h3><br></h3> <h3><b><span>Privacy in applications</span> <br></b></h3> <p>You want to open the application "20 of the most beautiful girls of Brazil", but do not want all your friends and subscribers to see it on your own wall. To do this, set privacy settings for applications. You can enable or prohibit the application to send you notifications and set to whom messages will be available on your behalf.</p> <p><b>How to install:</b> </span> Go to Privacy Settings -\u003e Applications</p> <p><img src='https://i0.wp.com/likeni.ru/upload/2012/fb-9.jpg' align="middle" width="100%" loading=lazy loading=lazy></p> <h3><br></h3> <h3><span><b>From whom to receive messages?</b> </span></h3> <p>Any Facebook user can send you a message. To reduce the number of spam, you can install filters for incoming letters.</p> <p><b>How to install:</b>Fast privacy settings -\u003e Who can contact me?</p> <p><img src='https://i2.wp.com/likeni.ru/upload/2012/fb-10.jpg' align="middle" height="436" width="333" loading=lazy loading=lazy></p> <h3><br></h3> <h3><span>How to report a problem?</span></h3> <p>What to do: Go to the Help section -\u003e Report Problem-\u003e In the drop-down menu, select the desired item and write a message.</p> <script>document.write("<img style='display:none;' src='//counter.yadro.ru/hit;artfast_after?t44.1;r"+ escape(document.referrer)+((typeof(screen)=="undefined")?"": ";s"+screen.width+"*"+screen.height+"*"+(screen.colorDepth? screen.colorDepth:screen.pixelDepth))+";u"+escape(document.URL)+";h"+escape(document.title.substring(0,150))+ ";"+Math.random()+ "border='0' width='1' height='1' loading=lazy loading=lazy>");</script> </div> </article> <div class="post-bottom"> <div class="post-share"> <script src="//yastatic.net/es5-shims/0.0.2/es5-shims.min.js"></script> <script src="//yastatic.net/share2/share.js"></script> <div class="ya-share2" data-services="vkontakte,facebook,odnoklassniki,moimir" data-counter=""></div> </div> </div> <div class='yarpp-related'> <div class="related-items"> <div class="headline">Did not find an answer to your question? Look at here</div> <div class="items"> <div class="related-item"> <a class="related-item__title" href="https://totrdlo.ru/en/1s-rasshirenie-raboty-failami-chrome-rasshirenie-dlya-raboty-s-failami-v.html"><img src="/uploads/b9a1cd0ff90fe53a44f4b868cd1ab03a.jpg" width="120" height="120" alt="Extension to work with files in the web client" class="related-item__image" / loading=lazy loading=lazy>Extension to work with files in the web client</a> <div class="related-item__comments"><span></span></div> </div> <div class="related-item"> <a class="related-item__title" href="https://totrdlo.ru/en/kody-oshibok-elektronnoi-pochty-ispravlenie-oshibki-server.html"><img src="/uploads/c28f0dcb89eb151e87752da66b2f742f.jpg" width="120" height="120" alt="Error correction"Сервер отказал в доступе по протоколу POP3" при подключении почты Gmail!" class="related-item__image" / loading=lazy loading=lazy>Fixing the error "Server refused access via POP3" when connecting Gmail mail!</a> <div class="related-item__comments"><span></span></div> </div> <div class="related-item"> <a class="related-item__title" href="https://totrdlo.ru/en/1s-8-1-ne-zapuskaetsya-na-windows-10-ispravlyaem-oshibku-poryadok.html"><img src="/uploads/ac8a980357b9757325284a326b9fd268.jpg" width="120" height="120" alt="1 does not start on windows 10" class="related-item__image" / loading=lazy loading=lazy>1 does not start on windows 10</a> <div class="related-item__comments"><span></span></div> </div> </div> </div> </div> <div style="text-align: center; margin-top: 15px; margin-bottom: 15px; " id="vanna-1965575812"><div class="adsense"><script type="text/javascript">ga_1();</script></div></div> </main> <aside class="sidebar"> <div class="advices" data-theme="vannapedia_v.3"> <div class="headline"></div> <div class="advices-content"> <img src="/uploads/95c0d840f7878d6b89f8e322632280e2.jpg" width="120" height="120" alt="Adding an external printed form to the base External printed forms ZUP 3" class="advices__image" / loading=lazy loading=lazy> <div class="advices__title" data-id="3334"><a href="https://totrdlo.ru/en/dobavlenie-vneshnei-pechatnoi-formy-v-bazu-dobavlenie-vneshnei.html">Adding an external printed form to the base External printed forms ZUP 3</a></div> </div> </div> <div class="vk-widget" id="text-3"> <div class="textwidget"><script type="text/javascript" src="//vk.com/js/api/openapi.js?130"></script> <div id="vk_groups"></div> </div> </div> <div class="sidebar-questions"> <div class="headline">New</div> <ul> <li><a href="https://totrdlo.ru/en/zapret-provedeniya-dokumentov-v-1s-8-3-buhuchet-info-avtomaticheskaya.html" >Prohibition of documents in 1C 8</a></li> <li><a href="https://totrdlo.ru/en/dlya-chego-nuzhno-razgranichenie-po-polzovatelyam.html" >For what you need to distinction by users</a></li> <li><a href="https://totrdlo.ru/en/otbor-v-tablice-znachenii-1s-8-2-kakie-metody-sushchestvuyut-i-kak-iskat-odnovremenno-po-neskolkim-zna.html" >Selection in the table of 1C values \u200b\u200b8</a></li> <li><a href="https://totrdlo.ru/en/obnovlenie-buhgalterii-2-0-na-3-0-uchet-materialno-proizvodstvennyh-zapasov.html" >Accounting update 2.</a></li> <li><a href="https://totrdlo.ru/en/login-parol-dlya-obnovleniya-1s-roznica.html" >Username Password for Update 1C Retail</a></li> <li><a href="https://totrdlo.ru/en/com-ustanovlen-bezopasnyi-rezhim-vypolnenie-operacii-zapreshcheno.html" >Software opening external processing</a></li> </ul> </div> <div class="section"> </div> <div class="section"> <div class="headline">Popular articles</div> <ul class="sidebar-posts"> <li><a href="https://totrdlo.ru/en/podklyuchennyh-fiskalnyh-ustroistv-ne-naideno-ustanovka-i.html"><img src="/uploads/5df9163e05fa9245cdb80b7f64ec6186.jpg" width="80" height="80" alt="Installing and configuring a fiscal registrar" / loading=lazy loading=lazy>Installing and configuring a fiscal registrar</a></li> <li><a href="https://totrdlo.ru/en/kak-izmenit-nazvanie-organizacii-v-1s-8-3-izmenenie-sluzhebnyh-rekvizitov.html"><img src="/uploads/eb6c692f9abb4922889b5f4223818c4a.jpg" width="80" height="80" alt="How to change the name of the organization in 1C 8" / loading=lazy loading=lazy>How to change the name of the organization in 1C 8</a></li> <li><a href="https://totrdlo.ru/en/1s-8-3-kak-sdelat-pole-nedostupnym.html"><img src="/uploads/2ab15198b6dd38b0d618cbde07d80615.jpg" width="80" height="80" alt="3 How to make the field inaccessible" / loading=lazy loading=lazy>3 How to make the field inaccessible</a></li> </ul> </div> <div class="section"> <div class="headline">New on the site</div> <ul class="sidebar-posts sidebar-photo"> <li><a href="https://totrdlo.ru/en/biblioteka-standartnyh-podsistem-vnedrenie-biblioteki-standartnyh.html">Implementing the Library of Standard Subsystems Update BSP 1C</a></li> <li><a href="https://totrdlo.ru/en/posle-obnovleniya-konfiguracii-1s-8-3-trebuet-licenziyu-ne-naidena-licenziya.html">After updating the configuration 1C 8</a></li> <li><a href="https://totrdlo.ru/en/instrumenty-razrabotchika-obnovlenie-vspomogatelnyh-dannyh.html">Creating a new document with printed forms</a></li> <li><a href="https://totrdlo.ru/en/1s-obnovlenie-vspomogatelnyh-dannyh-obnovlenie-spravochnika-identifikatory.html">Refresh reference identifiers of metadata objects not monopolis</a></li> <li><a href="https://totrdlo.ru/en/periodicheskie-registry-svedenii-v-1s-8-3-poisk-i-chtenie-v-registre.html">Periodic information registers in 1C 8</a></li> </ul> </div> </aside> </div> <footer class="footer"> <nav class="footer__nav"><ul><li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-1219"><a href="https://totrdlo.ru/en/">New</a> <ul class="sub-menu"> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/tormoza-na-failovoi-baze---kak-izbezhat-iz-nedavnego-opyta-tormoza-na.html">Brakes on the file database - how to avoid (from recent experience) failed to block the Config 1C table</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/kak-otklyuchit-obnovlenie-1s-8-3.html">How to disable update 1C 8</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/skachat-shablon-1s-8-3-buhgalteriya-shablony-konfiguracii-i.html">Download template 1C 8.3 Accounting. Configuration and updates templates. Download configuration installation files</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/vybor-nastroek-dinamicheskogo-spiska-1s-8-3-sposoby-polucheniya-i.html">Select the dynamic list settings 1C 8</a></li> </ul> </li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-1230"><a href="https://totrdlo.ru/en/">Popular</a> <ul class="sub-menu"> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/vypolnenie-obrabotchikov-obnovleniya-ne-zakanchivaetsya-procedury.html">Data processing procedures</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/perenos-1s-bazovaya-na-drugoi-kompyuter-dobavlenie-bazy.html">Transfer 1C basic to another computer</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/pereustanovit-1s-na-drugoi-kompyuter-ustanovka-licenzii-na.html">Installing a license on a new computer</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/portal-predostavleniya-gosudarstvennyh-uslug-gosuslugi-lichnyi-kabinet.html">State Services Personal Account</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/gosportal-gosudarstvennyh-uslug-gosuslugi--lichnyi-kabinet--vhod.html">State Supervisory Cabinet- Entrance on SNILS and Telephone</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/edinyi-telefon-sluzhby-spaseniya-v-rossiiskoi-federacii-ekstrennye-telefony.html">Single telephone rescue service in the Russian Federation</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/departament-informacionnyh-tehnologii-svyazi-i-zashchity-informacii.html">Department of Information Technologies, Communication and Protection of Information Ministry of Informatization</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/okazanie-pervoi-pomoshchi-pri-elektricheskom-toke-deistviya-i.html">Actions and first aid with electric shock</a></li> </ul> </li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-1236"><a href="https://totrdlo.ru/en/">Recommended</a> <ul class="sub-menu"> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/ekstrennyi-vyzov-s-sotovogo-telefona-telefonnye-mobilnye-nomera.html">Telephone Mobile Emergency Services</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/upravlenie-departamenta-po-cao-go-i-chs-ministerstvo-rossiiskoi-federacii-po.html">Ministry of the Russian Federation for Civil Defense, Emergency Situations and Elimination of Disaster Concepts (EMERCOM of Russia)</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/so-optimizaciya-servernoi-infrastruktury-so-optimizaciya-servernoi.html">SO Optimization of Server Infrastructure Technical Optimization Solutions for Servers</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/tehnologiya-provedeniya-migracii-dannyh-v-krupnyh-proektah-migraciya.html">Migration database data migration methodology</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/zafiksirovany-izmeneniya-v-konfiguracii-sistemy-izmeneniya.html">Changes are recorded in the system configuration</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/pometka-na-udalenie-1s-8-3-buhuchet-info-avtomaticheskoe-udalenie-obektov-po.html">Mark for removal 1C 8</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/kak-rabotat-v-programme-gis-gmp-instrukciya-po-podklyucheniyu-uchastnikov-i-po.html">Instructions for connecting participants and checking interaction with GIS GMP sheets can not be connected to GIS GMP</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://totrdlo.ru/en/1s-8-udalenie-pomechennyh-obektov-buhuchet-info-pochemu-ne.html">1C 8 Removing marked objects</a></li> </ul> </li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-6898"><a href="https://totrdlo.ru/en/">About the site</a> <ul class="sub-menu"> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-6900"><a href="">About the site</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-6901"><a href="">Advertising on the website</a></li> <li class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-6902"><a href="">Contacts</a></li> </ul> </li> </ul></nav> <div class="footer-bottom"> <div class="footer-left"> <div class="foot__logo"> <div class="footer__logo-sitename">totrdlo.ru. <span> Ru</span></div> </div> <style> .foot__logo { min-height: 35px; margin: 0 0 11px -79px; padding: 9px 0 0 79px; text-decoration: none; } </style> <p>© 2021 All rights reserved</p> <p>Your mobile guide. Operators. Useful advice</p> <ul class="footer-bottom__nav"> <li><a href="" >Advertising on the project</a></li> </ul> </div> <div class="footer-buttons"> </div> <ul class="footer__soc"> <li><a href="http://vk.com/" target="_blank" class="vk">In contact with</a></li> <li>Odnoklassniki.</li> <li><a href="http://www.facebook.com/" target="_blank" class="fb">Facebook.</a></li> <li><a href="https://twitter.com/" target="_blank" class="twi">Twitter.</a></li> </ul> <div class="footer-right"> <div class="footer__note"></div> <div class="footer__counters" id="text-2"> <div class="textwidget"></div> </div> </div> </div> </footer> </div> </div> <link rel='stylesheet' id='wp-lightbox-bank.css-css' href='/wp-content/plugins/wp-lightbox-bank/assets/css/wp-lightbox-bank.css?ver=4.8.3' type='text/css' media='all' /> <script type='text/javascript' src='https://totrdlo.ru/wp-content/themes/vannapedia_v.3/js/scripts.js'></script> <script type='text/javascript' src='/wp-includes/js/comment-reply.min.js?ver=4.8.3'></script> <script type='text/javascript' src='/assets/scripts1.js'></script> <script type='text/javascript'> /* <![CDATA[ */ var tocplus = { "smooth_scroll":"1"} ; /* ]]> */ </script> <script type='text/javascript' src='https://totrdlo.ru/wp-content/plugins/table-of-contents-plus/front.min.js?ver=1509'></script> <script type='text/javascript'> var q2w3_sidebar_options = new Array(); q2w3_sidebar_options[0] = { "sidebar" : "sidebar-fixed", "margin_top" : 10, "margin_bottom" : 0, "stop_id" : "respond", "screen_max_width" : 0, "screen_max_height" : 0, "width_inherit" : false, "refresh_interval" : 1500, "window_load_hook" : false, "disable_mo_api" : false, "widgets" : ['text-4'] } ; </script> <script type='text/javascript' src='https://totrdlo.ru/wp-content/plugins/q2w3-fixed-widget/js/q2w3-fixed-widget.min.js?ver=5.0.4'></script> <script type='text/javascript' src='/wp-includes/js/wp-embed.min.js?ver=4.8.3'></script> <script type='text/javascript' src='https://totrdlo.ru/wp-content/plugins/wp-lightbox-bank/assets/js/wp-lightbox-bank.js?ver=4.8.3'></script> <script type='text/javascript' src='https://totrdlo.ru/wp-content/plugins/akismet/_inc/form.js?ver=4.0'></script> </body> </html>