Ok folks so this is the first link to a very useful site hosted at Exploit Database — it is the more up to date use of Google Hacking searches that was originally created by infamous security expert Johnny Long who runs the Hackers for Charity organization. This is an extremely useful technique of extracting information using Google. You will be surprised what can be extracted. This is a common tool used in the Footprinting phase of an attack on an organization. Use this tool to determine how exposed your network is to the outside world. What information are you disclosing about your databases for example?