This is the most tired release I've ever been through. I wonder if user who
get this will appreciate how hard I really went through for this. It seems
Lee is being too messy right now so I won't hold back any longer. This
release has overall improvements for features compared to previous versions
and has a lot of user interface refinements for ease of use with end-user.
You will find this program is amazingly easier comparing to all other shell
packs. Let's see the changelog of this release.
*Changes in Version 7.0*
-Added default system font option for recovery
-Added Docking support for preview and taskbar replacement
-Added DPI
-Added hiding menubar option for Vista (Styler) toolbar
-Added information about KB925902 hotfix issues and solution on startup
-Added memory requirements checking for 3rd-party applications
-Added resetting DPI options and some extra information in Machine
Configuration
-Added screen resolution auto-detection
-Added setting cleartype font automatically after the transformation
-Added Vista transformation "Express mode" (Make an appropriate setup
configuration in single page!)
-Added ViStart (Vista Start Menu port for Windows XP/2003 with glass UI and
search function)
-Added uninstalling existing components before updating
-Added WindowBlinds detection warning message (for user who is mistaken
about glass border skin)
-Added Windows Server 2003 Service Pack 2 uxtheme patching support
-Fixed backing up system files bug on repair mode
-Fixed checking for Styler incompatibility with x64 edition OS
-Fixed fileversion checking bug that cause backup
system
being overwritten by modified system files when update
-Fixed operating system checking bug (that allow user to install in Windows
2000 and below)
-Fixed Start Orb positioning bug
-Fixed Styler to execute Styler.exe only when user wants to hide menu bar to
save up memory and some weird issues
-Fixed Styler to run in toolbar mode (prevent error and message popup)
-Fixed Vista (Styler) toolbar option with correction of menubar
-Fixed uninstalling bug with system drive icon
-Fixed uninstalling routines
-Fixed uxtheme.dll patching detection bugs on machine without any service
pack
-Fixed Windows Live Messenger skin uninstallation bug
-Moved extra dialogs in the main dialogs process so user can make all
decisions before transforming
-Removed customized open/save dialog due to bugs in some applications
-Replaced closeapp with pskill (some programs reported closeapp as
virus
it isn't)
-Replaced Blaero's Start Orb with ViOrb (Auto positioning and snap over the
start button upon taskbar shifting)
-Updated battery tray icons
-Updated Getting Started and Help and Support FAQ
-Updated LClock x86 to version 1.62b
-Updated Maintenance Center to be Welcome Center
-Updated minor UI graphic resources in themes
-Updated Segoe UI font
-Updated Shutdown/Logoff dialogs
-Updated Start Orb to full circle version
-Updated Thoosje's Vista sidebar
-Updated transformation to use backup system file if it has the same
fileversion during update
-Updated updating function to uninstall previous components before updating
-Updated Vista logon screen (Thanks to SoFtEcH for updating my logon)
|-Added status message (Welcome, Shutdown, etc.)
|-Fixed user account disapperance bug on lower resolution
|-Fixed user account moving around when focused
|-Moved shutdown button to right part
|-Updated password panel resources
|-Updated userpicture's frame border
-Updated Visualtooltip to version 2.1
*Download link for VTP 7*
http://rapidshare.com/files/39462735/Vista_Transformation_Pack_7.rar
*Download link for WinBlinds*
http://rapidshare.com/files/39466784/Winblinds5.50_support.for.vista_withcrack.rar
Saturday, April 26, 2008
Vista Transformation Pack 7.0 with Key
Friday, March 28, 2008
Google Search Hacking
Google Operators:
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons
Basic Operators:
+, -, ~ , ., *, “”, |,
OR
Advanced Operators:
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange
Basic Operators !!
(+) force inclusion of something common
Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I
(-) exclude a search term
Example: apple –red
(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”
Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results
Basic Operators
(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information
( . ) a single-character wildcard:
Example: m.trix
Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard
Advanced Operators: “Site:”
Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain
Advanced Operators: “Filetype:”
Filetype: extension_type
Find documents with specified extensions
The supported extensions are:
- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)
Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.
Example: Budget filetype: xls
Advanced Operators “Intitle:”
Intitle: search_term
Find search term within the title of a Webpage
Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words
These operators are specifically useful to find the directory lists
Example:
Find directory list:
Intitle: Index.of “parent directory”
Advanced Operators “Inurl:”
Inurl: search_term
Find search term in a Web address
Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address
Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password
Advanced Operators “Intext;”
Intext: search_term
Find search term in the text body of a document.
Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.
Examples:
Intext: Administrator login
Allintext: Administrator login
Advanced Operators: “Cache:”
Cache: URL
Find the old version of Website in Google cache
Sometimes, even the site has already been updated, the old information might be found in cache
Advanced Operators
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents
Examples:
Computer $500..1000
DVD player $250..350
Advanced Operators: “Daterange:”
Daterange:
Find the Web pages between start date and end date
Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122
Examples:
2004.07.10=2453196
2004.08.10=2453258
Vulnerabilities date range: 2453196-2453258
Advanced Operators “Link:”
Link: URL
Find the Web pages having a link to the specified URL
Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL
Present some information that Google has about that Web page
Define: search_term
Provide a definition of the words gathered from various online sources
Define: Network security
Advanced Operators “phonebook:”
Phonebook
Search the entire Google phonebook
rphonebook
Search residential listings only
bphonebook
Search business listings only
Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)
The phonebook is quite limited to U.S.A
Google Hacking
google hacking: Rahul Dutt Avasthy
These methods will be easily understood by the Hackers
Any help for the Novice Hackers Please drop in your Comments : Rahul
u can also drop in ur E - Mail Id's to be mailed a detailed Presentation on Google HACKING
Click Here to Drop Comments, Requests n Suggestions
Using Google, and some finely crafted searches we can find a lot of interesting information.
For Example we can find:
Credit Card Numbers
Passwords
Software / MP3's
...... (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
Try a few of these searches:
More searches which Mother Nature never intended! Most of these are handy for finding security exploits on your own site; simply add a string from your own domain’s URL to check. But really, why limit ourselves? If it has an evil purpose, I’m including it. By the way, there is nothing illegal about typing in a search string; it is up to the website to secure this data. It’s what you DO with this information that you find which makes all of the difference. signin filetype:url - OK, class, this is how we do NOT use Javascript to manage our passwords. Any questions? Javascript password block “index of /” ( upload.cfm | upload.asp | upload.php | upload.cgi | upload.jsp | upload.pl ) - A great way to find file upload pages on websites. Most of these will be password protected; every now and then you find one that isn’t! Like this German Spanish site… image upload I guess some civic-minded folk want to provide you with free file storage… (intitle:”WordPress › Setup Configuration File”)|(inurl:”setup-config.php?step=1″) - WordPress has become one of the leading blog systems out there. So you should be aware that if you run WordPress, there are black-hat hackers out there working around the clock to find a vulnerability on your site. Some of the hits returned from this search will be people who never configured it after they installed it, so it’s waiting for anyone to find it and take over. Now that we’re done plowing through all of the boring security research stuff, here’s a couple of cute tricks. In these last two cases, these may not be security violations at all; they might be intentionally giving the stuff away and the worst you’re doing is bypassing an ad or two. DSC00001.JPG - This was in a lot of bookmark sites lately. What you do is search Google images for this string… and if nobody else is looking, turn “safe search” off! What this is is the default naming scheme for image files taken on Sony digital cameras. People post the picture without renaming it. And don’t forget DSC00002.JPG, DSC00003.JPG, and so on. Judging by my browsing so far, the first thing most people photograph is their girlfriend. intitle:”index of” ”last modified” ”parent directory” (wmv|mp3) - At last the one everybody was waiting for: finding free media! Now, this example gives you directories with movie files in either MWV (Windows Media Viewer) or MP3. To find files on a particular subject, just enter the name of that subject. I’ll not speculate on what kind of movies you might be looking for - but I’m sure you’ll think of something! To change that to some other media file, you can try replacing wmv with jpg for images, wav for sounds, etc. The trouble is, this hack is so old that a number of adult porn sites have deliberately set up their web pages to mimic this result, where, of course, you end up with a pop-up demanding credit card data or getting link-jacked to a malware site. Have fun, and remember that I gave you all this handy info in the good faith that you’ll only use it responsibly.
intitle:"Index of" passwords modified
allinurl:auth_user_file.txt
"access denied for user" "using password"
"A syntax error has occurred" filetype:ihtml
allinurl: admin mdb
"ORA-00921: unexpected end of SQL command"
inurl:passlist.txt
"Index of /backup"
"Chatologica MetaSearch" "stack tracking:"
Amex Numbers: 300000000000000..399999999999999
MC Numbers: 5178000000000000..5178999999999999
visa 4356000000000000..4356999999999999
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory "MP3-xxx -html -htm -php -shtml -opendivx -md5 -md5sums
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.
METHOD 2
put this string in google search:
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
METHOD 3
put this string in google search:
inurl:microsoft filetype:iso
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
"# -FrontPage-" inurl:service.pwd
Frontpage passwords.. very nice clean search results listing !!
"AutoCreate=TRUE password=*"
This searches the password for "Website Access Analyzer"
, a Japanese software that creates webstatistics. For those who can read Japanese, check out the author's site at: http://www.coara.or.jp/~passy/
"http://*:*@www" domainname
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net
"http://*:*@www" bangbus or "http://*:*@www"bangbus
Another way is by just typing
"http://bob:bob@www"
"sets mode: +k"
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
allinurl: admin mdb
Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are!
allinurl:auth_user_file.txt
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)
intitle:"Index of" config.php
This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.
eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.
intitle:index.of.etc
This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!
filetype:bak inurl:"htaccess|passwd|shadow|htusers"
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
Let's pretend you need a serial number for windows xp pro.
In the google search bar type in just like this - "Windows XP Professional" 94FBR
the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.
or if you want to
find the serial for winzip 8.1 - "Winzip 8.1"
clever google tips
Use Gmail Generate Unlimited E-mail Addresses
Gmail has an interesting quirk where you can add a plus sign (+) after your Gmail address, and it'll still get to your inbox. It's called plus-addressing, and it essentially gives you an unlimited number of e-mail addresses to play with. Here's how it works: say your address is pinkyrocks@gmail.com, and you want to automatically label all work e-mails. Add a plus sign and a phrase to make it pinkyrocks+work@gmail.com and set up a filter to label it work (to access your filters go to Settings->Filters and create a filter for messages addressed to pinkyrocks+work@gmail.com. Then add the label work).
More real world examples:
Find out who is spamming you: Be sure to use plus-addressing for every form you fill out online and give each site a different plus address.
Example: You could use
pinkyrocks+nytimes@gmail.com for nytimes.com
pinkyrocks+freestuff@gmail.com for freestuff.com
Then you can tell which site has given your e-mail address to spammers, and automatically send them to the trash.
Automatically label your incoming mail: I've talked about that above.
Archive your mail: If you receive periodic updates about your bank account balance or are subscribed to a lot of mailing lists that you don't check often, then you can send that sort of mail to the archives and bypass your Inbox.
Example: For the mailing list, you could give pinkyrocks+mailinglist1@gmail.com as your address, and assign a filter that will archive mail to that address automatically. Then you can just check in once in a while on the archive if you want to catch up.
Update (9/7): Several commentors have indicated that this is not a Gmail specific trick. kl says Fastmail has enabled this feature as well. caliban10 reports that a lot of sites reject addresses with a plus sign. You might use other services like Mailinator for disposable addresses instead. pbinder recommends using services like SpamGourmet, which redirects mail to your real address.
Windows uses 20% of your bandwidth Here's how to Get it back
Windows uses 20% of your bandwidth Here's how to Get it back
A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)
Here's how to get it back:
Click Start-->Run-->type "gpedit.msc" without the "
This opens the group policy editor. Then go to:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :
"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO.
This will allow the system to reserve nothing, rather than the default 20%.
Google Page Rank Explained
How to tell who's important
If you've ever created a web page, you've probably included links to other pages that contain valuable, reliable information. By doing so, you are affirming the importance of the pages you link to. Google's PageRank algorithm stages a monthly popularity contest among all pages on the web to decide which pages are most important. The fundamental idea put forth by PageRank's creators, Sergey Brin and Lawrence Page, is this: the importance of a page is judged by the number of pages linking to it as well as their importance. We will assign to each web page P a measure of its importance I(P), called the page's PageRank. At various sites, you may find an approximation of a page's PageRank. (For instance, the home page of The American Mathematical Society currently has a PageRank of 8 on a scale of 10. Can you find any pages with a PageRank of 10?) This reported value is only an approximation since Google declines to publish actual PageRanks in an effort to frustrate those would manipulate the rankings. Here's how the PageRank is determined. Suppose that page Pj has lj links. If one of those links is to page Pi, then Pj will pass on 1/lj of its importance to Pi. The importance ranking of Pi is then the sum of all the contributions made by pages linking to it. That is, if we denote the set of pages linking to Pi by Bi, then This may remind you of the chicken and the egg: to determine the importance of a page, we first need to know the importance of all the pages linking to it. However, we may recast the problem into one that is more mathematically familiar. Let's first create a matrix, called the hyperlink matrix, in which the entry in the ith row and jth column is Notice that H has some special properties. First, its entries are all nonnegative. Also, the sum of the entries in a column is one unless the page corresponding to that column has no links. Matrices in which all the entries are nonnegative and the sum of the entries in every column is one are called stochastic; they will play an important role in our story. We will also form a vector whose components are PageRanks--that is, the importance rankings--of all the pages. The condition above defining the PageRank may be expressed as In other words, the vector I is an eigenvector of the matrix H with eigenvalue 1. We also call this a stationary vector of H. Let's look at an example. Shown below is a representation of a small collection (eight) of web pages with links represented by arrows. The corresponding matrix iswith stationary vector |
Computing I
There are many ways to find the eigenvectors of a square matrix. However, we are in for a special challenge since the matrix H is a square matrix with one column for each web page indexed by Google. This means that H has about n = 25 billion columns and rows. However, most of the entries in H are zero; in fact, studies show that web pages have an average of about 10 links, meaning that, on average, all but 10 entries in every column are zero. We will choose a method known as the power method for finding the stationary vector I of the matrix H. How does the power method work? We begin by choosing a vector I 0 as a candidate for I and then producing a sequence of vectors I k by The method is founded on the following general principle that we will soon investigate. General principle: The sequence I k will converge to the stationary vector I. |
I 0 | I 1 | I 2 | I 3 | I 4 | ... | I 60 | I 61 |
1 | 0 | 0 | 0 | 0.0278 | ... | 0.06 | 0.06 |
0 | 0.5 | 0.25 | 0.1667 | 0.0833 | ... | 0.0675 | 0.0675 |
0 | 0.5 | 0 | 0 | 0 | ... | 0.03 | 0.03 |
0 | 0 | 0.5 | 0.25 | 0.1667 | ... | 0.0675 | 0.0675 |
0 | 0 | 0.25 | 0.1667 | 0.1111 | ... | 0.0975 | 0.0975 |
0 | 0 | 0 | 0.25 | 0.1806 | ... | 0.2025 | 0.2025 |
0 | 0 | 0 | 0.0833 | 0.0972 | ... | 0.18 | 0.18 |
0 | 0 | 0 | 0.0833 | 0.3333 | ... | 0.295 | 0.295 |
Three important questions
Three questions naturally come to mind:- Does the sequence I k always converge?
- Is the vector to which it converges independent of the initial vector I 0?
- Do the importance rankings contain the information that we want?
with matrix |
I 0 | I 1 | I 2 | I 3=I |
1 | 0 | 0 | 0 |
0 | 1 | 0 | 0 |
A probabilitistic interpretation of H
Imagine that we surf the web at random; that is, when we find ourselves on a web page, we randomly follow one of its links to another page after one second. For instance, if we are on page Pj with lj links, one of which takes us to page Pi, the probability that we next end up on Pi page is then . As we surf randomly, we will denote by the fraction of time that we spend on page Pj. Then the fraction of the time that we end up on page Pi page coming from Pj is . If we end up on Pi, we must have come from a page linking to it. This means that where the sum is over all the pages Pj linking to Pi. Notice that this is the same equation defining the PageRank rankings and so . This allows us to interpret a web page's PageRank as the fraction of time that a random surfer spends on that web page. This may make sense if you have ever surfed around for information about a topic you were unfamiliar with: if you follow links for a while, you find yourself coming back to some pages more often than others. Just as "All roads lead to Rome," these are typically more important pages. Notice that, given this interpretation, it is natural to require that the sum of the entries in the PageRank vector I be one. Of course, there is a complication in this description: If we surf randomly, at some point we will surely get stuck at a dangling node, a page with no links. To keep going, we will choose the next page at random; that is, we pretend that a dangling node has a link to every other page. This has the effect of modifying the hyperlink matrix H by replacing the column of zeroes corresponding to a dangling node with a column in which each entry is 1/n. We call this new matrix S. In our previous example, we now havewith matrix | and eigenvector |
How does the power method work?
In general, the power method is a technique for finding an eigenvector of a square matrix corresponding to the eigenvalue with the largest magnitude. In our case, we are looking for an eigenvector of S corresponding to the eigenvalue 1. Under the best of circumstances, to be described soon, the other eigenvalues of S will have a magnitude smaller than one; that is, S are S are and that |\lambda_2| \geq |\lambda_3| \geq \ldots \geq |\lambda_n| \] " src="http://www.ams.org/featurecolumn/images/december2006/index_15.gif" title="\[ 1 = \lambda_1 > |\lambda_2| \geq |\lambda_3| \geq \ldots \geq |\lambda_n| \] " align="absmiddle"> We will also assume that there is a basis vj of eigenvectors for S with corresponding eigenvalues . This assumption is not necessarily true, but with it we may more easily illustrate how the power method works. We may write our initial vector I 0 as Then Since the eigenvalues with have magnitude smaller than one, it follows that if and therefore , an eigenvector corresponding to the eigenvalue 1. It is important to note here that the rate at which is determined by . When is relatively close to 0, then relatively quickly. For instance, consider the matrix The eigenvalues of this matrix are and . In the figure below, we see the vectors I k, shown in red, converging to the stationary vector I shown in green. Now consider the matrix Here the eigenvalues are and . Notice how the vectors I k converge more slowly to the stationary vector I in this example in which the second eigenvalue has a larger magnitude.When things go wrong
In our discussion above, we assumed that the matrix S had the property that and S is S is Then we seeI 0 | I 1 | I 2 | I 3 | I 4 | I 5 |
1 | 0 | 0 | 0 | 0 | 1 |
0 | 1 | 0 | 0 | 0 | 0 |
0 | 0 | 1 | 0 | 0 | 0 |
0 | 0 | 0 | 1 | 0 | 0 |
0 | 0 | 0 | 0 | 1 | 0 |
with stationary vector |
Computing I
What we've described so far looks like a good theory, but remember that we need to apply it to matrices where n is about 25 billion! In fact, the power method is especially well-suited to this situation. Remember that the stochastic matrix S may be written as and therefore the Google matrix has the form Therefore, Now recall that most of the entries in H are zero; on average, only ten entries per column are nonzero. Therefore, evaluating HI k requires only ten nonzero terms for each entry in the resulting vector. Also, the rows of A are all identical as are the rows of 1. Therefore, evaluating AI k and 1I k amounts to adding the current importance rankings of the dangling nodes or of all web pages. This only needs to be done once. With the value of chosen to be near 0.85, Brin and Page report that 50 - 100 iterations are required to obtain a sufficiently good approximation to I. The calculation is reported to take a few days to complete. Of course, the web is continually changing. First, the content of web pages, especially for news organizations, may change frequently. In addition, the underlying hyperlink structure of the web changes as pages are added or removed and links are added or removed. It is rumored that Google recomputes the PageRank vector I roughly every month. Since the PageRank of pages can be observed to fluctuate considerably during this time, it is known to some as the Google Dance. (In 2002, Google held a Google Dance!)Summary
Brin and Page introduced Google in 1998, a time when the pace at which the web was growing began to outstrip the ability of current search engines to yield useable results. At that time, most search engines had been developed by businesses who were not interested in publishing the details of how their products worked. In developing Google, Brin and Page wanted to "push more development and understanding into the academic realm." That is, they hoped, first of all, to improve the design of search engines by moving it into a more open, academic environment. In addition, they felt that the usage statistics for their search engine would provide an interesting data set for research. It appears that the federal government, which recently tried to gain some of Google's statistics, feels the same way. There are other algorithms that use the hyperlink structure of the web to rank the importance of web pages. One notable example is the HITS algorithm, produced by Jon Kleinberg, which forms the basis of the Teoma search engine. In fact, it is interesting to compare the results of searches sent to different search engines as a way to understand why some complain of a Googleopoly.Better Search engine
Search Engine name http://www.gahooyoogle.com/ *** http://www.jux2.com/ ***** http://www.dogpile.com/ ***** http://www.sputtr.com/ ***** http://www.spacetime.com/ http://mindset.research.yahoo.com/ http://www.mooter.com/ http://qunu.com/ http://www.webcrawler.com/info.wbcrwl/ http://www.scirus.com/srsapp/ http://www.randomwebsearch.com/ http://www.soople.com/soople_int.php | URL | Category |
Accoona | www.accoona.com | A.I. Search (HM) |
AfterVote (SEM) | www.aftervote.com | Social Search |
Agent 55 | www.agent55.com | MetaSearch |
AllTha.at | www.allth.at | Continuous Search |
AnswerBus | www.answerbus.com | Semantic Search |
Blabline | www.blabline.com | Podcast Search |
Blinkx* | www.blinkx.com | Video Search |
Blogdigger | www.blogdigger.com | Blog Search |
Bookmach.com* | www.bookmach.com | Bookmark Search |
ChaCha* (#1 2006) | www.chacha.com | Guided Search |
ClipBlast!* | www.clipblast.com | Video Search |
Clusty* | www.clusty.com | Clustering Search |
CogHog | www.infactsolutions.com/projects/coghog/demo.htm | Semantic Search |
Collarity* | www.collarity.com | Social Search (HM) |
Congoo* | www.congoo.com | Premium Content Search |
CrossEngine (Mr. Sapo)* | www.crossengine.com | MetaSearch |
Cydral | http://en.cydral.com | Image Search (French) |
Decipho* | www.decipho.com | Filtered Search |
Deepy | www.deepy.com | RIA Search |
Ditto* | www.ditto.com | Visual Search |
Dogpile | www.dogpile.com | MetaSearch |
Exalead* | www.exalead.com/search | Visual Search |
Factbites* | www.factbites.com | Filtered Search |
FeedMiner | www.feedminer.com | RSS Feeds Search |
Feedster | www.feedster.com | RSS Feeds Search |
Filangy | www.filangy.com | Social Search |
Find Forward | www.findforward.com | Meta Feature Search |
FindSounds* | www.findsounds.com | Audio Search |
Fisssh! | www.fisssh.com | Filtered Search (HM) |
FyberSearch | www.fybersearch.com | Meta Feature Search |
Gigablast* | www.gigablast.com | Blog Search |
Girafa* | www.girafa.com | Visual Display |
Gnosh | www.gnosh.org | Meta Search |
GoLexa | www.golexa.com | Meta Feature Search |
GoshMe* (SEM) | www.goshme.com | Meta Meta Search |
GoYams* | www.goyams.com | Meta Search |
Grokker* | www.grokker.com | Meta Search |
Gruuve | www.gruuve.com | Recommendation Search |
Hakia | www.hakia.com | Meaning Based Search |
Hyper Search | http://hypersearch.webhop.org.90.seekdotnet.com | Filtered Search |
iBoogie | www.iboogie.com | Clustering Search |
IceRocket* | www.icerocket.com | Blog Search |
Info.com | www.info.com | MetaSearch |
Ixquick* | www.ixquick.com | Meta Search |
KartOO* | www.kartoo.com | Clustering Search |
KoolTorch (SEM) | www.kooltorch.com | Clustering Search |
Lexxe* | www.lexxe.com | Natural Language Processing (NLP) |
Lijit | www.lijit.com | Search People |
Like* | www.like.com | Visual Search |
LivePlasma* | www.liveplasma.com | Recommendation Search (HM) |
Local.com* | www.local.com | Local Search |
Mamma | www.mamma.com | MetaSearch |
Mnemomap | www.mnemo.org | Clustering Search |
Mojeek* | www.mojeek.com | Custom Search Engines (CSE) |
Mooter* | www.mooter.com | Clustering Search |
Mp3Realm | http://mp3realm.org | MP3 Search |
Mrquery | www.mrquery.com | Clustering Search |
Ms. Dewey* | www.msdewey.com | Unique Interface (HM) |
Nutshell | www.gonutshell.com | MetaSearch |
Omgili | www.omgili.com | Social Search |
Pagebull* | www.pagebull.com | Visual Display |
PeekYou | www.peekyou.com | People Search |
Pipl | http://pipl.com | People Search |
PlanetSearch* | www.planetsearch.com | MetaSearch |
PodZinger | www.podzinger.com | Podcast Search |
PolyMeta | www.polymeta.com | MetaSearch |
Prase | www.prase.us | MetaSearch |
PureVideo | www.purevideo.com | Video Search (HM) |
Qksearch | www.qksearch.com | Clustering Search |
Querycat | http://querycat.com | F.A.Q. Search (HM) |
Quintura* | www.quintura.com | Clustering Search |
RedZee | www.redzee.com | Visual Display |
Retrievr | http://labs.systemone.at/retrievr/ | Visual Search |
Searchbots | www.searchbots.net | Continuous Search |
SearchKindly | www.searchkindly.org | Charity Search |
Searchles* (DumbFind) | www.searchles.com | Social Search |
SearchTheWeb2* | www.searchtheweb2.com | Long Tail Search |
SeeIt | www.seeit.com | Image Search |
Sidekiq* | www.sidekiq.com | MetaSearch |
Slideshow* | http://slideshow.zmpgroup.com/ | Visual Display |
Slifter* | www.slifter.com | Mobile Shopping Search (HM) |
Sphere | www.sphere.com | Blog Search |
Sproose | www.sproose.com | Social Search |
Srchr* | www.srchr.com | MetaSearch |
SurfWax* | www.surfwax.com | Meaning Based Search |
Swamii | www.swamii.com | Continuous Search (HM) |
TheFind.com* | www.thefind.com | Shopping Search |
Trexy* | www.trexy.com | Search Trails |
Turboscout* | www.turboscout.com | MetaSearch |
Twerq | www.twerq.com | Tabbed Results |
Url.com* | www.url.com | Social Search |
WasaLive! | http://en.wasalive.com | RSS Search |
Web 2.0* | www.web20searchengine.com | Web 2.0 Search |
Webbrain* | www.webbrain.com | Clustering Search |
Whonu?* | www.whonu.com | MetaSearch |
Wikio* | www.wikio.com | Web 2.0 Search |
WiseNut* | www.wisenut.com | Clustering Search |
Yoono* | www.yoono.com | Social Search |
ZabaSearch* | www.zabasearch.com | People Search |
Zuula* | www.zuula.com | Tabbed Search (HM) |