Download now Free registration required
Google Hacking uses the Google search engine to locate sensitive information or to find vulnerabilities that may be exploited. This paper identifies and evaluates how much effort it takes to get Google Hacking to work and how serious the threat of Google Hacking is. The paper discusses the implementation and impact of Google Hacking to Internet security and recommends couple of probable solutions on how to avoid or resolve it.
- Format: PDF
- Size: 196.22 KB