Monthly Archives: December 2012

2012 in review – JANBEIN

The stats helper monkeys prepared a 2012 annual report for this blog.

Here’s an excerpt:

4,329 films were submitted to the 2012 Cannes Film Festival. This blog had 38,000 views in 2012. If each view were a film, this blog would power 9 Film Festivals

Click here to see the complete report.

This Is the Exact Date When Our World Ends


The world didn’t end last Friday just like the world didn’t end in the year 2000, with failing computers deleting bank accounts and crashing airplanes. That doesn’t mean the world isn’t going to end. It will. And if we keep our current operating systems, this is the exact date when all goes poof: 15:30:08 UTC on December 4th of the Year of Our Lord 292,277,026,596.

That’s when “the Unix time stamp will exceed the largest value that can be held in a signed 64-bit integer.” Unix is what powers most of the computing systems that are vital for human life on Earth, from banks to medical life support systems to electric grids to satellites to the internet. And your iPhone and Android phone too.

Of course, none of the crap today will ever reach the year 292,277,026,596. Not because you forgot to put on that stupid case on your phone but because Earth may not be around by then. The Sun would have destroyed it about 7,900,000,000 years from now. That’s when our home star will reach its maximum diameter as a Red Giant, destroying Mercury, Venus and, most probably, Earth.

However, don’t worry about that End of the World either. Theoretically, we will be long gone by then, according to the futuristic theories by theoretical physicist Michio Kaku. He says that, about 100,000 years to 1 million years from now, Humanity will be a Type III civilization on the Kardashev scale. That means that our civilization will be “capable of interstellar travel, interstellar communication, galactic engineering and galaxy-scale influence.” And in five to 50 million years humans will colonize the entire Milky Way, even if we never achieve faster-than-light interstellar travel capabilities.

At that point we will be able to harness the entire energy of the galaxy and your smartphone will still be ticking thanks to its little Unix heart.

So the Y292,277,026K will be real at one point. I’m almost certain that, by then, we would have abandoned Unix at that point—but you never know. This mother was invented 43 years ago and it’s still the best, most solid operating system ever created. Good enough to survive the entire Universe according to the Big Rip theory, which predicts everything will be over when the Universe reaches an infinite scale 20 billion years from now.

But then again, if the Chandra X-ray Observatory—powered by Unix!—is correct about the speed in which galaxy clusters are moving away from us, the universe will not end then but much, much later.

Not that you or I will be around to see any of this, anyway. So—whatevs! Back to reading random Wikipedia pages out of pure boredom. [Timeline of the Far Future]


What is Googledorks?

How to Use Google Dorks For Hacking

What is Googledorks?

The  term  “googledork” was coined by Johnny Long  ( and
originally meant “An inept or foolish person as revealed by Google.” After a great deal of
media attention,  the  term came  to describe  those  “who  troll  the  Internet  for confidential
goods.” Either  term is fine, really. What matters is  that the term googledork conveys  the
concept  that sensitive stuff  is on  the web, and Google can help you  find  it. The official
googledorks page (found at lists many different
examples  of  unbelievable  things  that  have  been  dug  up  through  Google  by  the
maintainer of  the page, Johnny Long. Each  listing shows  the Google search required  to
find  the  information along with a description of why  the data  found on each page  is so

             Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls.
you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.
intitle:”Live View / – AXIS”



intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:axis-cgi/mjpg (motion-JPEG)
intitle:”live view” intitle:axis
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1? –
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor” 

Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.
“?intitle:index.of?mp3 avril“
Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

4. Finding various stuffs for free

For Example we can find:
Credit Card Numbers
Software / MP3′s
…… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
Try a few of these searches:
intitle:”Index of” passwords modified
“access denied for user” “using password”
“A syntax error has occurred” filetype:ihtml
allinurl: admin mdb
“ORA-00921: unexpected end of SQL command”
“Index of /backup”
“Chatologica MetaSearch” “stack tracking:”
Amex Numbers: 300000000000000..399999999999999
MC Numbers: 5178000000000000..5178999999999999
“parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory “Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
“parent directory ” Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.


put this string in google search:
?intitle:index.of? mp3

You only need add the name of the song/artist/singer.

Example: ?intitle:index.of? mp3 avril lavigne


put this string in google search:
inurl:microsoft filetype:iso

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

“# -FrontPage-” inurl:service.pwd

Frontpage passwords.. very nice clean search results listing !!

“AutoCreate=TRUE password=” 

“http://:@www” domainname
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net

Another way is by just typing
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
Not all of these pages are administrator’s access databases containing usernames, passwords and other sensitive information, but many are!
DCForum’s password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)
This search brings up sites with “config.php” files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.
eggdrop filetype:user user These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.
intitle:index.of.etc This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!
filetype:bak inurl:”htaccess|passwd|shadow|htusers” This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
Let’s pretend you need a serial number for windows xp pro.
In the google search bar type in just like this – “Windows XP Professional” 94FBR
the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of ‘fake’ porn sites that trick you.
or if you want to find the serial for winzip 8.1 – “Winzip 8.1″ 94FBR
I have shown you this info to let you know that there is a real risk putting your info online. If you do want to buy stuff online make sure the site you are using is secure normally if a site is secure you will see a pop up saying you are now entering a secure part of the site or a symbal of a padlock at the bottom of your browser or just use pay pal, pay pal is very safe to use. But most of the time just use common sense if a site looks cheap it normally hasn’t got the protection to keep your info safe. 

7.Crash a Computer using Flash and Google

Open up a new flash document. Open up the Actions panel for the stage of the first frame. If it’s in Actionscript 2, write the following:
onEnterFrame = function () {
getURL(“”, “_blank”);
Or if it’s actionscript 3 write the following:
function openGoogle(e:Event):void {
navigateToURL(“”, “_blank”);
stage.addEventListener(Event.ENTER_FRAME, openGoogle);

Press Control-Enter when you’re ready to crash your computer. What this does is repeatedly open up new tabs of Google. But it opens so many Google tabs every second that after maybe 20-30 seconds your computer will barely be able to respond to you mouse clicks or even mouse movements. Usually, any attempt to stop it will result in processing overload and cause the computer to freeze. The only real way to stop this is to force-quit BOTH flash.exe andiexplorer.exe. Some teachers may know enough to do this, but might accidentally closeexplorer.exe        credit goes to Johnny Long…thnx to Mr. Long


The world does NOT end in December of 2012


Carlos Barrios, Mayan elder and Ajq’ij (is a ceremonial priest and spiritual guide) of the Eagle Clan. Carlos initiated an investigation into the different Mayan calendars circulating. Carlos along with his brother Gerardo studied with many teachers and interviewed nearly 600 traditional Mayan elders to widen their scope of knowledge.

Carlos found out quickly there were several conflicting interpretations of Mayan hieroglyphs, petroglyphs, Sacred Books of ‘Chilam Balam’ and various ancient text. Carlos found some strong words for those who may have contributed to the confusion:

Carlos Barrios:

“Anthropologists visit the temple sites and read the inscriptions and make up stories about the Maya, but they do not read the signs correctly. It’s just their imagination. Other people write about prophecy in the name of the Maya. They say that the world will end in December 2012. The Mayan elders are angry with this. The world will not end. It will be transformed.”

“We are no longer in the World of the Fourth Sun, but we are not yet in the World of the Fifth Sun. This is the time in-between, the time of transition. As we pass through transition there is a colossal, global convergence of environmental destruction, social chaos, war, and ongoing Earth Changes.”

He continues:

“Humanity will continue, but in a different way. Material structures will change. From this we will have the opportunity to be more human. We are living in the most important era of the Mayan calendars and prophecies. All the prophecies of the world, all the traditions are converging now. There is no time for games. The spiritual ideal of this era is action.”

Carlos tells us:

“The indigenous have the calendars and know how to accurately interpret it — not others. The Mayan Calendars comprehension of time, seasons, and cycles has proven itself to be vast and sophisticated. The Maya understand 17 different calendars such as the Tzolk’in or Cholq’ij, some of them charting time accurately over a span of more than ten million years.

“All was predicted by the mathematical cycles of the Mayan calendars. — It will change –everything will change. Mayan Day-keepers view the Dec. 21, 2012 date as a rebirth, the start of the World of the Fifth Sun. It will be the start of a new era resulting from and signified by the solar meridian crossing the galactic equator and the Earth aligning itself with the center of the galaxy.”

At sunrise on December 21, 2012 for the first time in 26,000 years the Sun rises to conjunct the intersection of the Milky Way and the plane of the ecliptic. This cosmic cross is considered to be an embodiment of the Sacred Tree, The Tree of Life, a tree remembered in all the world’s spiritual traditions.

Some observers say this alignment with the heart of the galaxy in 2012 will open a channel for cosmic energy to flow through the Earth, cleansing it and all that dwells upon it, raising all to a higher level of vibration. Carlos reminds us:

“This process has already begun. Change is accelerating now and it will continue to accelerate.

If the people of the Earth can get to this 2012 date in good shape without having destroyed too much of the Earth, we will rise to a new, higher level. But to get there we must transform enormously powerful forces that seek to block the way.”

The date specified in the calendar Winter Solstice in the year 2012 does not mark the end of the world. Many outside people writing about the Mayan calendar sensationalize this date, but they do not know. The ones who know are the indigenous elders who are entrusted with keeping the tradition.

Carlos tells us:

“The economy now is a fiction. The first five-year stretch of transition from August 1987 to August 1992 was the beginning of the destruction of the material world. We have progressed ten years deeper into the transition phase by now, and many of the so-called sources of financial stability are in fact hollow. The banks are weak. This is a delicate moment for them. They could crash globally, if we don’t pay attention. Now, people are paying attention.”

The North and South Poles are both breaking up. The level of the water in the oceans is going to rise. But at the same time land in the ocean, especially near Cuba, is also going to rise. Carlos tells a story about the most recent Mayan New Year ceremonies in Guatemala. He said that one respected Mam elder, who lives all year in a solitary mountain cave, journeyed to Chichicastenango to speak with the people at the ceremony. The elder delivered a simple, direct message. He called for human beings to come together in support of life and light.

“Right now each person and group is going his or her own way. The elder of the mountains said there is hope if the people of the light can come together and unite in some way. We live in a world of polarity — day and night, man and woman, positive and negative. Light and darkness need each other. They are a balance.”

“Just now the dark side is very strong, and very clear about what they want. They have their vision and their priorities clearly held, and also their hierarchy. They are working in many ways so that we will be unable to connect with the spiral Fifth World in 2012.”

“On the light side everyone thinks they are the most important, that their own understandings, or their group’s understandings, are the key. There’s a diversity of cultures and opinions, so there is competition, diffusion, and no single focus.”

Carlos believes the dark side works to block unity through denial and materialism. It also works to destroy those who are working with the light to get the Earth to a higher level. They like the energy of the old, declining Fourth World, the materialism. They do not want it to change. They do not want unity. They want to stay at this level, and are afraid of the next level.

Sources :

  1. Activist Post
  2. Picture
%d bloggers like this: