Thursday, March 31, 2011

Who is online for Facebook in php

Hi dudes!
One more job is done. Who is online application for facebook. Firstly I want to make it using xmpp - by getting the roaster list. But then I made it by Curl connection to server, saving the cookies and new Curl query to http://www.facebook.com/presence/popout.php - here you can see all your online friends and parse the information from here. I don`t show the sources - it is not difficul and if you need it - just comment.
https://login.facebook.com/login.php?login_attempt=1",true,null,"email=$EMAIL&pass=$PASSWORD - is the string for curl login to Facebook account.

Facebook chat bot application in Delphi

Hello! I`ve just finished my project at Scriptlance.com - Chat bot for Facebook chat. It took me two weeks to make it work and to make it work as I need. The main features are:
- using XMPP - Jabber protocol for chatting
- three files for chat bases - main answers, answers for certain topics and random answers
- bot works rather quickly
If you need the sources or want to know how to do it - write, comment - i`ll teach you.

Wednesday, March 9, 2011

Facebook chat using PHP

Start using Facebook chat in your web sites. It is easy, interesting and gives new opportunities. Read more. The XMPP-Protocol (which is the official name of the “Jabber”-Protocol) is released under open source, Jabber itself has many advantages in comparison to other instant messaging protocols:
It’s open source
It’s based on plain-text, xml-style data
Everyone can set up a own Jabber-Server
It’s decentralized: There are now “central” server

Tuesday, March 8, 2011

Google search extra.


Sometimes you need a little bit more power of your  Google search. Have in mind though that even very advanced searchers, such as the members of the search group at Google, use these features less than 5% of the time. Basic simple search is often enough. As always, we use square brackets [ ] to denote queries, so to be or not to be ] is an example of a query; to be ] or not to be ] are two examples of queries.

Facebook who of the friends are online script.

Searching how to make it - found 2 variants:
 - the first using fql request
- the second connect as jabber client to facebook chat and there find the users status.
No more variants.

Facebook chat bot.

Facebook is very popular. There are different programs, scripts people make for Facebook or using it. But not long ago I had a task to make Facebook bot application with minimum bot logic - just answer the messages. The answers were stored in a txt file and ahd format like key=answer. The bot searches for key in the received message and answers. If the key were not found then random answer from the second txt file. The bot was written in Delphi as a jabber (xmpp) client for Facebook chat. The bot works and now we add new features for the bot. It can be used not only for just an answering machine but for advertising - for example Travel Agency starts the bot, you need to know when is the airplane to England - you just send -= air England 30/03/2011 =- and the bot answers you when will be the plane. I think it is ideal for my bot.

Ten Simple Security Searches That Work

Introduction

Although we see literally hundreds of Google searches throughout this book, sometimes it’s nice to know there’s a few searches that give good results just about every time. In the context of security work, we’ll take a look at 10 searches that work fairly well during a security assessment, especially when combined with the site operator, which secures the first position in our list. As you become more and more comfortable with Google, you’ll certainly add to this list, modifying a few searches and quite possibly deleting a few, but the searches here should serve as a very nice baseline for your own top 10 list. Without further ado, let’s dig into some queries.

Protect yourself from Google hackers.

Protecting Yourself from Google Hackers

The following list provides some basic methods for protecting yourself from Google hackers:
  • Keep your sensitive data off the web! Even if you think you're only putting your data on a web site temporarily, there's a good chance that you'll either forget about it, or that a web crawler might find it. Consider more secure ways of sharing sensitive data, such as SSH/SCP or encrypted email.

Google scan.

Google Automated Scanning

Google frowns on automation: "You may not send automated queries of any sort to Google's system without express permission in advance from Google. Note that 'sending automated queries' includes, among other things:
  • using any software which sends queries to Google to determine how a web site or web page 'ranks' on Google for various queries;
  • 'meta-searching' Google; and
  • performing 'offline' searches on Google."

Google site mapping.

Google Hacking Techniques

By using the basic search techniques combined with Google's advanced operators, anyone can perform information-gathering and vulnerability-searching using Google. This technique is commonly referred to as Google hacking.

Google basic search techniques.

Using search engines such as Google, "search engine hackers" can easily find exploitable targets and sensitive data. This article outlines some of the techniques used by hackers and discusses how to prevent your site from becoming a victim of this form of information leakage.
The Google search engine found at http://www.google.comoffers many features, including language and document translation; web, image, newsgroups, catalog, and news searches; and more. These features offer obvious benefits to even the most uninitiated web surfer, but these same features offer far more nefarious possibilities to the most malicious Internet users, including hackers, computer criminals, identity thieves, and even terrorists. This article outlines the more harmful applications of the Google search engine, techniques that have collectively been termed "Google hacking." The intent of this article is to educate web administrators and the security community in the hopes of eventually stopping this form of information leakage.

Hacking with Google.

Every hacker needs to develop his abilities if he wants to maintain up to date. That's why he will use every tool he can find. From all of these possible options, Google hacks have become a new instrument for hackers. Although Google hacking isn't widespread knowledge, it should be understood by any hacker and even for the everyday computer user. 


But, if you want to become a hacker, Google is the way to go. Learn how to hack Google and you will acquire a powerful tool for your everyday work.

The first article.

Hi! I`m a web developer focused on social nets. So my work is to make different scripts for Facebook, Twitter, Blogger and Google services. Here, in this blog I want to share my experiance and find people who need such knowledge. I`ll be glad to receive your post to know what you think about my work and what you want to know. Thanks.