Pedantic inurl zakazat. Search query language

This article will be primarily useful for novice optimizers, because more advanced and so should know everything about them. In order to use this article with maximum efficiency, it is advisable to know exactly which words need to be raised to the right positions. If you're not exactly sure about the word list yet, or use the keyword suggestion service, it's a little confusing, but you can figure it out.

Important! Rest assured, Google understands perfectly well that ordinary users will not use them and only promotion specialists resort to their help. Therefore, Google may slightly distort the information provided.

Intitle operator:

Usage: intitle: word
Example: intitle: website promotion
Description: When using this operator, you will receive a list of pages, the title of which contains the word you are interested in, in our case it is the whole phrase "site promotion". Note that there must be no space after the colon. The title of the page is important for ranking, so be responsible for writing your titles. Using this variable, you will be able to estimate the approximate number of competitors who also want to be in the leading positions for this word.

Inurl operator:

Usage: inurl: phrase
Example: inurl: calculating the cost of search engine optimization
Description: This command shows sites or pages that have the original keyword in their URL. Note that there must be no space after the colon.

Inanchor operator:

Usage: inanchor: phrase
Example: inanchor: seo books
Description: Using this operator will help you see pages that are linked with the keyword you are using. This is a very important team, but unfortunately search engines are reluctant to share this information with SEOs for obvious reasons. There are services, Linkscape and Majestic SEO, that are willing to provide you with this information for a fee, but rest assured, the information is worth it.

Also, it is worth remembering that now Google pays more and more attention to the "trust" of the site and less and less link mass. Of course, links are still one of the most important factors, but trust plays an increasingly important role.

Good results are obtained by a combination of two variables, for example intitle: promotion inanchor: site promotion. And what we see, the search engine will show us the main competitors, the title of the page of which contains the word "promotion" and incoming links with the anchor "site promotion".

Unfortunately, this combination does not allow you to find out the "trust" of the domain, which, as we have already said, is very important factor... For example, a lot of old corporate sites don't have as many links as their younger competitors, but they do have a lot of old links that pull these sites to the top of the SERPs.

Site operator:

Usage: site: site address
Example: site: www.aweb.com.ua
Description: With this command, you can see a list of pages that are indexed by the search engine and which it knows about. It is mainly used to find out about competitors' pages and analyze them.

Cache operator:

Usage: cache: page address
Example: cache: www.aweb.com.ua
Description: This command shows a "snapshot" of the page from the moment when the robot visited the site the last time and, in general, how it sees the content of the page. By checking the page cache date, you can determine how often the robots visit the site. The more authoritative the site, the more often robots visit it and, accordingly, the less authoritative (according to Google) site, the less often the robots take pictures of the page.

The cache is very important when buying links. The closer the page's caching date is to the link purchase date, the faster your link will be indexed by the Google search engine. Sometimes it was possible to find pages with a cache age of 3 months. By purchasing a link on such a site, you will only waste your funds, because it is quite possible that the link will never be indexed.

Link operator:

Usage: link: url
Example: link: www.aweb.com.ua
Description: Link operator: searches and displays pages that link to specified address url. This can be both the home page of the site and the internal one.

Related operator:

Usage: related: url
Example: related: www.aweb.com.ua
Description: The related: statement displays pages that the search engine thinks are similar to the specified page. For a person, all the resulting pages may not have anything similar, but for a search engine it is.

Info statement:

Usage: info: url
Example: info: www.aweb.com.ua
Description: By using this operator, we will be able to obtain information about the page that is known to the search engine. This could be the author, publication date, and more. Additionally, on the search page, Google offers several actions at once that it can do with this page. Or, more simply, he will suggest using some of the operators that we described above.

Allintitle operator:

Usage: allintitle: phrase
Example: allintitle: aweb promotion
Description: If we start our search query with this word, we get a list of pages that have the entire phrase in the title. For example, if we try to search for the word allintitle: aweb promotion, we will get a list of pages, in the title of which both of these words are mentioned. And they do not have to follow each other at all, they can be located in different places in the header.

Allintext operator:

Usage: allintext: word
Example: allintext: optimization
Description: This operator searches for all pages that contain the specified word in the body of their text. If we try to use allintext: aweb optimization, we will see a list of pages in the text of which these words are found. That is, not the whole phrase is "optimization aweb", but both words and "optimization" and "aweb".

Any search for vulnerabilities on web resources begins with intelligence and information gathering.
Intelligence can be either active - brute-force files and directories of the site, launching vulnerability scanners, manual browsing of the site, and passive - searching for information in different search engines. Sometimes it happens that a vulnerability becomes known even before the first page of the site opens.

How is this possible?
Search robots, non-stop wandering the Internet, in addition to information useful to an ordinary user, often record what can be used by cybercriminals in an attack on a web resource. For example, script errors and files with sensitive information (from configuration files and logs to files with authentication data and database backups).
From the point of view of a search robot, an error message about an sql query execution is plain text, inseparable, for example, from the description of products on the page. If suddenly a search robot came across a file with the .sql extension, which for some reason ended up in working folder site, then it will be perceived as part of the content of the site and will also be indexed (including, possibly, the passwords specified in it).

Such information can be found by knowing stable, often unique, keywords that help separate “vulnerable pages” from pages that do not contain vulnerabilities.
A huge database of special queries using keywords (so-called dorks) exists on exploit-db.com and is known as the Google Hack Database.

Why google?
Doors are targeted primarily at google for two reasons:
- the most flexible syntax for keywords (shown in Table 1) and special characters (shown in Table 2);
- the google index is still more complete than that of other search engines;

Table 1 - Main google keywords

Keyword
Meaning
Example
site
Search only on the specified site. Only takes into account url
site: somesite.ru - will find all pages by this domain and subdomains
inurl
Search by words present in uri. Unlike cl. the words "site", searches for matches after the site name
inurl: news - find all pages where the given word is found in uri
intext
Search in the body of the page
intext: "plugs" - completely similar to the usual query "plugs"
intitle
Search in the title of the page. Text enclosed between tags <br></td> <td width="214">intitle: ”index of” - will find all pages with directory listing <br></td> </tr><tr><td width="214">ext <br></td> <td width="214">Search for pages with the specified extension <br></td> <td width="214">ext: pdf - Finds all pdfs <br></td> </tr><tr><td width="214">filetype <br></td> <td width="214">Currently, it is completely analogous to cl. the word "ext" <br></td> <td width="214">filetype: pdf - similar <br></td> </tr><tr><td width="214">related <br></td> <td width="214">Search for sites with similar topics <br></td> <td width="214">related: google.ru - will show its analogs <br></td> </tr><tr><td width="214">link <br></td> <td width="214">Search for sites that link to this <br></td> <td width="214">link: somesite.ru - will find all sites that have a link to this <br></td> </tr><tr><td width="214">define <br></td> <td width="214">Show word definition <br></td> <td width="214">define: 0day - term definition <br></td> </tr><tr><td width="214">cache <br></td> <td width="214">Show page content in cache (if available) <br></td> <td width="214">cache: google.com - will open the page from the cache <br></td> </tr></tbody></table><p>Table 2 - Special characters for google queries <br></p><table><tbody><tr><td width="214"><b>Symbol</b><br></td> <td width="214"><b>Meaning</b><br></td> <td width="214"><b>Example</b><br></td> </tr><tr><td width="214">“<br></td> <td width="214">Exact phrase <br></td> <td width="214">intitle: "RouterOS router configuration page" - search for routers <br></td> </tr><tr><td width="214">*<br></td> <td width="214">Any text <br></td> <td width="214">inurl: "bitrix * mcart" - search for sites on bitrix with a vulnerable mcart module <br></td> </tr><tr><td width="214">.<br></td> <td width="214">Any character <br></td> <td width="214">Index.of - similar to request index of <br></td> </tr><tr><td width="214">-<br></td> <td width="214">Exclude word <br></td> <td width="214">error -warning - show all pages with error but no warning <br></td> </tr><tr><td width="214">..<br></td> <td width="214">Range <br></td> <td width="214">cve 2006..2016 - show vulnerabilities by year since 2006 <br></td> </tr><tr><td width="214">|<br></td> <td width="214">Boolean "or" <br></td> <td width="214">linux | windows - show pages where either the first or second word occurs <br></td> </tr></tbody></table><br>It should be understood that any request to a search engine is a search only by words. <br>It is useless to search the page for meta-characters (quotes, brackets, punctuation marks, etc.). Even a search for an exact phrase indicated in quotes is a word search, followed by a search for an exact match already in the results. <p>All Google Hack Database dorks are logically divided into 14 categories and are presented in Table 3. <br>Table 3 - Google Hack Database Categories <br></p><table><tbody><tr><td width="168"><b>Category</b><br></td> <td width="190"><b>What allows you to find</b><br></td> <td width="284"><b>Example</b><br></td> </tr><tr><td width="168">Footholds <br></td> <td width="190">Web shells, public file managers <br></td> <td width="284">Find all hacked sites where the listed webshells are uploaded: <br>(intitle: "phpshell" OR intitle: "c99shell" OR intitle: "r57shell" OR intitle: "PHP Shell" OR intitle: "phpRemoteView") `rwx`" uname " <br></td> </tr><tr><td width="168">Files containing usernames <br></td> <td width="190">Registry files, configuration files, logs, files containing the history of commands entered <br></td> <td width="284">Find all registry files containing account information: <br><i>filetype: reg reg + intext: "internet account manager"</i><br></td> </tr><tr><td width="168">Sensitive Directories <br></td> <td width="190">Directories with various information (personal documents, vpn configs, hidden repositories, etc.) <br></td> <td width="284">Find all listings of directories containing files related to vpn: <br><i>"Config" intitle: "Index of" intext: vpn</i><br>Sites containing git repositories: <br><i>(intext: "index of /.git") ("parent directory")</i><br></td> </tr><tr><td width="168">Web Server Detection <br></td> <td width="190">Version and other information about the web server <br></td> <td width="284">Find the JBoss server administrative consoles: <br><i>inurl: "/ web-console /" intitle: "Administration Console"</i><br></td> </tr><tr><td width="168">Vulnerable Files <br></td> <td width="190">Scripts containing known vulnerabilities <br></td> <td width="284">Find sites that use a script that allows you to download an arbitrary file from the server: <br><i>allinurl: forcedownload.php? file =</i><br></td> </tr><tr><td width="168">Vulnerable Servers <br></td> <td width="190">Installation scripts, web shells, open administrative consoles, etc. <br></td> <td width="284">Find open PHPMyAdmin consoles running as root: <br><i>intitle: phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root @ *"</i><br></td> </tr><tr><td width="168">Error Messages <br></td> <td width="190">Various errors and warnings often reveal <a href="https://obanracer.ru/en/lenovo-6010-instrukciya-po-ekspluatacii-zavodskoi-sbros-lenovo-a6010.html">important information</a>- from CMS version to passwords <br></td> <td width="284">Sites that have errors in executing sql queries to the database: <br><i>"Warning: mysql_query ()" "invalid query"</i><br></td> </tr><tr><td width="168">Files containing juicy info <br></td> <td width="190">Certificates, backups, emails, logs, sql scripts, etc. <br></td> <td width="284">Find initialization sql scripts: <br><i>filetype: sql and "insert into" -site: github.com</i><br></td> </tr><tr><td width="168">Files containing passwords <br></td> <td width="190">Everything that can contain passwords - logs, sql scripts, etc. <br></td> <td width="284">Logs mentioning passwords: <br><i>filetype:</i><i>log</i><i>intext:</i><i>password |</i><i>pass |</i><i>pw</i><br>sql scripts containing passwords: <br><i>ext:</i><i>sql</i><i>intext:</i><i>username</i><i>intext:</i><i>password</i><br></td> </tr><tr><td width="168">Sensitive Online Shopping Info <br></td> <td width="190">Information related to online shopping <br></td> <td width="284">Find pincodes: <br><i>dcid =</i><i>bn =</i><i>pin</i><i>code =</i><br></td> </tr><tr><td width="168">Network or vulnerability data <br></td> <td width="190">Information not directly related to the web resource, but affecting the network or other non-web services <br></td> <td width="284">Find scripts <a href="https://obanracer.ru/en/kakoi-parol-nastroek-konfiguracii-mts-kak-poluchit-avtomaticheskie.html">automatic tuning</a> proxies containing information about the internal network: <br><i>inurl: proxy | inurl: wpad ext: pac | ext: dat findproxyforurl</i><br></td> </tr><tr><td width="168">Pages containing login portals <br></td> <td width="190">Pages containing login forms <br></td> <td width="284">Saplogon webpages: <br><i>intext: "2016 SAP AG. All rights reserved. " intitle: "Logon"</i><br></td> </tr><tr><td width="168">Various Online Devices <br></td> <td width="190">Printers, routers, monitoring systems, etc. <br></td> <td width="284">Find the printer configuration panel: <br><i>intitle: "</i><i>hp</i><i>laserjet "</i><i>inurl:</i><i>SSI /</i><i>Auth /</i><i>set_</i><i>config_</i><i>deviceinfo.</i><i>htm</i><br></td> </tr><tr><td width="168">Advisories and Vulnerabilities <br></td> <td width="190">Websites on vulnerable CMS versions <br></td> <td width="284">Find vulnerable plugins through which you can upload an arbitrary file to the server: <br><i>inurl: fckeditor -intext: "ConfigIsEnabled = False" intext: ConfigIsEnabled</i><br></td> </tr></tbody></table><br>Doors are more often focused on searching all sites on the Internet. But nothing prevents you from limiting the search area on any site or sites. <br>Each google request can be focused on a specific site by adding the keyword "site: somesite.com" to the request. This keyword can be added to any dork. <p><b>Vulnerability search automation</b><br>So the idea was born to write a simple utility that automates the search for vulnerabilities using the search engine (google) and relies on the Google Hack Database.</p><p>The utility is a script written in nodejs using phantomjs. To be precise, the script is interpreted by phantomjs itself. <br>Phantomjs is a complete web browser without <a href="https://obanracer.ru/en/chto-delat-esli-udalil-graficheskii-interfeis-androida-ustanovka-programm-na.html">graphical interface</a>, managed with js-code and has a convenient API. <br>The utility has received a quite understandable name - dorks. By running it in <a href="https://obanracer.ru/en/kak-razdat-wifi-s-podmenoi-ip-pochemu-noutbuk-ne-razdaet-vai-fai-mozhet-li.html">command line</a>(without options) we get a short help with several examples of use: <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/edd/6fb/ccc/edd6fbccc5ec340abe750f3073c1b427.jpg' width="100%" loading=lazy loading=lazy><br>Figure 1 - List of basic dorks options</p><p>The general syntax of the utility is dork "command" "list of options". <br>A detailed description of all options is presented in table 4.</p><p>Table 4 - dorks syntax <br></p><table border="1"><tbody><tr><td width="214"><b>Command</b><br></td> <td width="214"><b>Option</b><br></td> <td width="214"><b>Description</b><br></td> </tr><tr><td rowspan="4" width="214">ghdb <br></td> <td width="214">-l <br></td> <td width="214">Display a numbered list of Google Hack Database dork categories <br></td> </tr><tr><td width="214">-c "category number or name" <br></td> <td width="214">Load tracks of the specified category by number or name <br></td> </tr><tr><td width="214">-q "phrase" <br></td> <td width="214">Download dorks found on request <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save result to file (only with -c | -q options) <br></td> </tr><tr><td rowspan="8" width="214">google <br></td> <td width="214">-d dork <br></td> <td width="214">Set an arbitrary dork (this option can be used many times, can be combined with the -D option) <br></td> </tr><tr><td width="214">-D "file" <br></td> <td width="214">Use dorks from file <br></td> </tr><tr><td width="214">-s "site" <br></td> <td width="214">Set site (this option can be used many times, it can be combined with the -S option) <br></td> </tr><tr><td width="214">-S "file" <br></td> <td width="214">Use sites from a file (brute-force dorks will be performed for each site independently) <br></td> </tr><tr><td width="214">-f "filter" <br></td> <td width="214">Set additional keywords (will be added to each dork) <br></td> </tr><tr><td width="214">-t "number of ms" <br></td> <td width="214">The interval between requests to google <br></td> </tr><tr><td width="214">-T "number of ms" <br></td> <td width="214">Timeout if a captcha is encountered <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save the result to a file (only those tracks for which something was found will be saved) <br></td> </tr></tbody></table><br>Using the ghdb command, you can get all the dorks from exploit-db to <a href="https://obanracer.ru/en/rabota-postroitelya-otcheta-i-postroitelya-zaprosa-s-proizvolnym-istochnikom.html">arbitrary request</a>, or indicate the entire category. If you specify category 0, the entire database will be unloaded (about 4.5 thousand dorks). <p>List of categories available on <a href="https://obanracer.ru/en/nevozmozhno-vypolnit-zapros-v-dannyi-moment-apple-podvodnye-kamni-pri-pervoi.html">this moment</a> is shown in Figure 2. <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/b8f/b11/ffe/b8fb11ffeaced5066fd2fd9e43be67fb.jpg' width="100%" loading=lazy loading=lazy></p><p>Figure 2 - List <a href="https://obanracer.ru/en/mi-band-2-fail-proshivki-proshivka-dlya-mi-band---gde-skachat-i-kak.html">available categories</a> Dork GHDB</p><p>The google command will substitute each dork in the google search engine and analyze the result for matches. The roads along which something was found will be saved to a file. <br>The utility supports different search modes: <br>1 dork and 1 site; <br>1 dork and many sites; <br>1 site and many dorks; <br>many sites and many dorks; <br>The list of dorks and sites can be specified either through an argument or through a file.</p><p><b>Demonstration of work</b><br>Let's try to search for any vulnerabilities using the example of searching for error messages. By command: dorks ghdb –c 7 –o errors.dorks all known dorks of the “Error Messages” category will be loaded as shown in Figure 3. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/28c/386/641/28c386641d1528652f7f8e8b8089097a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 3 - Loading all known dorks of the "Error Messages" category</p><p>The tracks are loaded and saved to a file. Now it remains to "incite" them to some site (see Figure 4). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/8e0/a8a/3af/8e0a8a3af4f26544da1faa584813dbff.jpg' width="100%" loading=lazy loading=lazy><br>Figure 4 - Searching for vulnerabilities of the site of interest in the google cache</p><p>After some time, several pages containing errors are found on the studied site (see Figure 5).</p><p><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/10b/e83/ba3/10be83ba38f172213ba06b3f9ad05a58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 5 - Found error messages</p><p>As a result, in the file result.txt we get a complete list of dorks that lead to the error. <br>Figure 6 shows the result of searching for site errors. <br><br>Figure 6 - Error search result</p><p>In the cache for this dork, a full backtrace is displayed, revealing the absolute paths of the scripts, the site's content management system and the type of database (see Figure 7). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/0a9/455/588/0a9455588496d6609f5e13d598cb5a48.jpg' width="100%" loading=lazy loading=lazy><br>Figure 7 - Disclosure of information about the site device</p><p>However, it should be borne in mind that not all Dorks from GHDB give a true result. Also, google may not find an exact match and show a similar result.</p><p>In this case, it is wiser to use your personal dork list. For example, you should always look for files with "unusual" extensions, examples of which are shown in Figure 8. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/d7f/865/693/d7f865693f7fcf13137598eeed0ecb58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 8 - List of file extensions not typical for a regular web resource</p><p>As a result, by the command dorks google –D extensions.txt –f bank, from the very first request google starts giving sites with “unusual” file extensions (see Figure 9). <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/107/e1f/a2f/107e1fa2f41c4169bcc254cba2f2f4b6.jpg' width="100%" loading=lazy loading=lazy><br>Figure 9 - Searching for "bad" file types on banking sites</p><p>It should be borne in mind that google does not accept requests longer than 32 words.</p><p>With dorks google –d intext: ”error | warning | notice | syntax” –f university <br>you can look for PHP interpreter errors on educational sites (see Figure 10). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/717/74f/e36/71774fe3656bfc058c42d43262fdec4a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 10 - Search for PHP runtime errors</p><p>Sometimes it is not convenient to use one or two categories of dorks. <br>For example, if you know that the site is running on the wordpress engine, then you need dorks for wordpress. In this case, it is convenient to use the Google Hack Database search. The dorks ghdb –q wordpress –o wordpress_dorks.txt command will download all Wordpress dorks, as shown in Figure 11: <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/dcb/ac9/a4e/dcbac9a4eb12f6ec775d9cccc2fdee87.jpg' width="100%" loading=lazy loading=lazy><br>Figure 11 - Searching for Wordpress related dorks</p><p>Let's go back to the banks again and use the dorks google –D wordpress_dords.txt –f bank command to try to find something interesting related to wordpress (see Figure 12). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/042/0c2/c43/0420c2c435931704288b171f725ccc6a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 12 - Searching for Wordpress Vulnerabilities</p><p>It is worth noting that a search on Google Hack Database does not accept words shorter than 4 characters. For example, if the CMS of the site is not known, but the language is known - PHP. In this case, you can filter what you need manually using the pipe and the system search utility dorks –c all | findstr / I php> php_dorks.txt (see figure 13): <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/4c1/2f8/6e1/4c12f86e111074293c14d6a939c6ebab.jpg' width="100%" loading=lazy loading=lazy><br>Figure 13 - Searching all dorks where PHP is mentioned</p><p>Search for vulnerabilities or some sensitive information in a search engine should be searched only if there is a significant index on this site. For example, if a site has 10-15 pages indexed, then it is silly to search for something in this way. It's easy to check the size of the index - just enter it into the string <a href="https://obanracer.ru/en/ne-udaetsya-podklyuchitsya-k-gugl-golosovoi-ustanovka.html">google search</a>"Site: somesite.com". An example of an under-indexed site is shown in Figure 14. <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/78e/1db/b4f/78e1dbb4fc78cd422cec311fc2ca9d33.jpg' width="100%" loading=lazy loading=lazy><br>Figure 14 - Checking the size of the site index</p><p>Now about the unpleasant ... From time to time google may request a captcha - there is nothing to be done - it will have to be entered. For example, when I went through the “Error Messages” category (90 dorks), the captcha fell out only once.</p><p>It is worth adding that phantomjs also supports work through a proxy, both through the http and socks interface. To enable proxy mode, you need to uncomment the corresponding line in dorks.bat or dorks.sh.</p><p>The tool is available as source code</p> <p>Even the best content will be of little use if you do not convey information about its existence to your target audience. This is why seeding content is one of the key tasks of a marketer.</p> <p>Yes, such a task is not easy at all. However, if everything works out, the result can exceed even very daring expectations - there are many examples of how just one high-quality article can generate thousands of conversions to a site from a variety of sources.</p> <p>Today I will tell you how to look for sowing sites, by what criteria to select them, and I will share a number of interesting sources, the existence of which, I am sure, many of my readers did not even know.</p> <h3>Main seeding channels</h3> <p>Any sources that can attract the attention of your target audience and provide additional transitions to the site will do.</p> <p>Pay attention to channels such as:</p> <ul><li>popular thematic resources in your niche;</li> <li>blogging platforms and communities;</li> <li>forums;</li> <li>e-mailing;</li> <li>social networks;</li> <li>YouTube.</li> </ul><p>A good study of even one of these areas can provide you with a decent number of visitors per article. All together, they can help in creating a real flow of referral traffic to the site, which can be converted into sales, leads, or provide the resource owner with a significant increase in influence and the formation of an expert's image.</p> <h3>What is the principle for selecting sites?</h3> <p>There are only two of them - the correspondence to the subject of the article, the seeding of which is planned, and, the presence of the target audience in a large number.</p> <p>WITH <a href="https://obanracer.ru/en/o-fonde-roskongress-social-ip-adress-mezhdunarodnaya-socialnaya-platforma.html">social platforms</a> everything is clear, the audience of participants here usually numbers millions of users. But if we talk about sites and forums, pay attention to traffic, as it would be silly to expect a large number of transitions from a resource that is visited by 1000 people per month.</p> <p>In one of the previous articles, I already wrote how you can find out. In the context of our goals, this will definitely come in handy.</p> <p>Now let's take a closer look at the examples of the selection of sites for sowing, for each of the listed channels.</p> <h3>1. Thematic sites</h3> <p>The essence of the work: we are looking for a site suitable for the topic with good traffic, and post material on it with a link to our resource or an article published on it. To make it look as natural as possible, you can, for example, make a digest of something, and just include a link to yourself as one of the list items.</p> <p>For example, let's write an article titled "The 5 Best Translator Apps for iPhone", in which we include an application developed by our client, and leave a link like " <a href="https://obanracer.ru/en/podrobnyi-obzor-magic-trackpad-apple-magic-trackpad-ubirat-li-myshku-v-yashchik-prednaznachenie.html">detailed review</a> read the appendices here. "</p> <p>The easiest way to find sites for placement is the directory of sites in the Miralinks article exchange. The downside is that the number of sites themselves there is limited, and the credibility of many is in doubt, due to the fact that their owners post paid articles in batches.</p> <p>The second way is to analyze the top resources in your niche and competitors for referral traffic. You can do this using Similarweb.com. Just drive in the address of the site you want and look at the "Referrals" tab:</p> <p><img src='https://i0.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/referrals.jpeg' width="100%" loading=lazy loading=lazy></p> <p>And the third, the most difficult and time-consuming, but at the same time, the most effective method is search results for information requests in your topic. Thus, you can agree to place your link in an article that is already in the Top of Search Engines:</p> <p><img src='https://i0.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/how-choise.jpg' width="100%" loading=lazy loading=lazy></p> <h3>2. Blogging platforms and communities</h3> <p>Platforms such as LiveInternet.ru and LiveJournal.com are actively used by many users for personal blogs on a variety of topics. For a small fee (however, not always), you can agree to place a mention of your article in a thematic note, which will allow you to get referrals from interested readers.</p> <p>You can also find various communities for a specific niche, for example, HabraHabr.ru for IT-products and services, and Babyblog.ru - for promotion in the "Home and Family" topic. This also includes <a href="https://obanracer.ru/en/setei-i-razlichnyh-setevyh-servisov-internet-provaider-sovremennyi.html">various services</a> questions and answers.</p> <h3>3. Forums</h3> <p>Here it is best to act with the method of crowd marketing, because a link to a high-quality informational article can be easily left in the topic thread on the forum, and at the same time, it will look completely organic in the context of the discussion. But the link to the product in the online store or the service page, the moderators would clean up quickly, there is no doubt about it.</p> <p>A more cunning move is to agree on the placement of the link you need by one of the authoritative users of the forum, then there will definitely not be anything to dig into. Well, in some cases, paid placement will also be justified - the administration of many forums allows you to create the topic you need, for a separate topic.</p> <p>To collect a database of sites, we analyze search results using a query of the form <span><b>inurl: forum "keyword"</b> </span>, for example, like this:</p> <p><img src='https://i1.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/forums.jpg' width="100%" loading=lazy loading=lazy></p> <p>Additionally, you can set the filtering of the search results by time.</p> <h3>4. Email newsletter</h3> <h3>5. Social networks</h3> <p>My favorite way of seeding content that works great for just about any topic. In general, it is difficult to imagine modern content marketing without active work with social networks.</p> <p>V <a href="https://obanracer.ru/en/v-kakih-sluchayah-personalnye-dannye-stali-obshchedostupnymi-zakon-o.html">this case</a> several methods can be used:</p> <p>The result can be just great:</p> <p><img src='https://i2.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/fb-promo.jpeg' width="100%" loading=lazy loading=lazy>It is quite simple to search for communities for posting on VKontakte - we drive the desired keyword into the search, click "All results" and mark the item "Communities" in the sidebar on the right. In the search parameters, you can also specify the type of community and how the results are sorted:</p> <p><img src='https://i2.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/vk-searching.jpeg' width="100%" loading=lazy loading=lazy>Then we just select the ones we need and write our proposal to the administrators.</p> <p>Also, you can use the official exchange, for this, after logging into your VKontakte profile, in the left menu at the bottom, click the item "Advertising", and switch to the "Advertising in communities" tab. After creating an advertising post, you will have access to a huge selection of sites for placement:</p> <p><img src='https://i0.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/social-promo.jpeg' width="100%" loading=lazy loading=lazy>With Facebook, things are much more complicated. Normal search for communities within itself <a href="https://obanracer.ru/en/kak-naiti-cheloveka-bez-socialnyh-setei-kak-ispolzovat-servis.html">social network</a> no, so you need to search for them by special ratings / tops, for example, the Facebook community rating, with the ability to sort by different countries.</p> <p>It's easier with pages - almost every promoted site has <a href="https://obanracer.ru/en/zakrytye-gruppy-i-publichnye-stranicy-vkontakte-uchimsya-sozdavat-nastraivat-i.html">Official page</a> on Facebook, and you can unsubscribe directly to its owner, with a proposal to post your publication, or repost.</p> <h3>6. YouTube</h3> <p>Of all the sowing methods listed in this article, this option is used the least often. Not because it is ineffective, but simply because many do not even know about it. A great way to beat the competition and skim the cream off.</p> <p>The essence is simple: we are looking for thematic channels or ready-made videos in the search, and we agree to place the link we need in the description. In the case of a channel, if the budget allows, you can even agree on a video review exclusively for your product.</p> <p>For example, we have an interesting and useful article on rose care published on the blog of an online store that sells seeds and seedlings. We drive the corresponding request into the YouTube search:</p> <p><img src='https://i1.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/youtube-searching.jpeg' width="100%" loading=lazy loading=lazy>If necessary, set up a filter by time. We are looking for a video from <a href="https://obanracer.ru/en/luchshe-partnerskie-cpa-seti-s-bolshim-kolichestvom-offerov-na-lyubuyu-temu.html">big amount</a> viewing or one that is growing in popularity. And, we agree with the owners of the channel for placing a link to your article in the video description, with a recommendation:</p> <p><img src='https://i0.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/rolik.jpeg' width="100%" loading=lazy loading=lazy>To find out the contacts of the owner of the YouTube channel, click on its name:</p> <p><img src='https://i1.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/channel-name.jpeg' width="100%" loading=lazy loading=lazy></p> <p>Then, click on the "About channel" tab:</p> <p><img src='https://i0.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/you-about.jpeg' width="100%" loading=lazy loading=lazy>And there is already everything you need:</p> <p><img src='https://i1.wp.com/webexpert.com.ua/wp-content/uploads/2016/10/you-contacts.jpeg' width="100%" loading=lazy loading=lazy></p> <h3>Let's summarize</h3> <p>The content seeding technique I described in this article can seem very complicated and costly in terms of time / money. But, believe me, it's worth it, and the effect will be an order of magnitude better than that of spam by the hands of schoolchildren who, under the guise of “crowd marketing,” try to sell streaming SEO cents to their clients.</p> <p>Regular work in this area helps to build a brand! And over time, it promotes organic growth of backlinks and mentions of the company, without additional effort on the part of a specialist.</p> <p>But the main thing is that over time, you can break away from competitors to an almost unattainable level. At the very least, you will be separated by a barrier in the form of dozens of publications, thousands of clicks, and hundreds of backlinks. And even a competitor with a very large budget will not be able to overcome it quickly.</p> <p>And do not forget that quality content must be at the heart of everything. If you try to distribute boring, low-quality and second-rate articles, no one will pay attention to them anyway. Even if your promotion budgets will be with a few zeros.</p> <ul><li>Part 1.</li> <li>Part 2.</li> <li>Part 3.</li> <li>Part 4.</li> <li>Part 5. Start sowing</li> <li>Part 6..</li> </ul> <p><i><a href="https://obanracer.ru/en/pozdravleniya-s-dnem-rozhdeniya-den-rozhdeniya-poiskovoi-sistemy-google.html">Search system</a> Google (www.google.com) provides many search options. All these capabilities are an invaluable search tool for a first-time Internet user and at the same time an even more powerful weapon of invasion and destruction in the hands of people with evil intentions, including not only hackers, but also non-computer criminals and even terrorists. <br><b>(9475 views in 1 week)</b> </i></p> <p>Denis Batrankov <br>denisNOSPAMixi.ru</p> <p><b>Attention:</b><i>This article is not a guide to action. This article was written for you, administrators of WEB servers, so that you lose the false feeling that you are safe, and you finally understand the insidiousness of this method of obtaining information and take up the protection of your site.</i></p> <h2>Introduction</h2> <p>For example, I found 1670 pages in 0.14 seconds!</p> <p><b>2. </b> Let's introduce another line, for example:</p> <b> <a target="_blank" href="http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=inurl:%22auth_user_file.txt%22">inurl: "auth_user_file.txt"</a> </b> <p>a little less, but this is already enough for free download and for brute-force attacks (using the same John The Ripper). Below I will give some more examples.</p> <p>So, you need to realize that the Google search engine has visited most of the sites on the Internet and stored in the cache the information they contain. This cached information allows you to get information about the site and the content of the site without a direct connection to the site, just digging into the information that is stored inside Google. Moreover, if the information on the site is no longer available, then the information in the cache may still be preserved. All it takes for this method is to know some of the key <a href="https://obanracer.ru/en/planirovshchik-zaprosov-google-planirovshchik-klyuchevyh-slov-google-adwords-prakticheskoe-rukovodstvo-soh.html">Google words</a>... This technique is called Google Hacking.</p> <p>For the first time, information about Google Hacking appeared on the Bugtruck mailing list 3 years ago. In 2001, this topic was brought up by a French student. Here is a link to this letter http://www.cotse.com/mailing-lists/bugtraq/2001/Nov/0129.html. It provides the first examples of such requests:</p> <p><b>1) Index of / admin <br>2) Index of / password <br>3) Index of / mail <br>4) Index of / + banques + filetype: xls (for france ...) <br>5) Index of / + passwd <br>6) Index of / password.txt</b></p> <p>This topic made a splash in the English-reading part of the Internet quite recently: after Johnny Long's article published on May 7, 2004. For a more complete study of Google Hacking, I advise you to visit this author's site at http://johnny.ihackstuff.com. In this article, I just want to bring you up to date.</p> <p>Who can use it: <br>- Journalists, spies and all those people who like to poke their nose into other matters can use this to search for compromising evidence. <br>- Hackers looking for suitable targets for hacking.</p> <h2>How Google works.</h2> <p>To continue the conversation, let me remind you of some of the keywords used in Google queries.</p> <p><b>Search using the + sign</b></p> <p>Google excludes words that are unimportant in its opinion from the search. For example, question words, prepositions and articles in English: for example are, of, where. In Russian <a href="https://obanracer.ru/en/skachat-plei-market-vindovs-lyumiya-mozhno-li-ispolzovat-google-play.html">Google language</a> seems to consider all words important. If the word is excluded from the search, then Google writes about it. In order for Google to start searching for pages with these words in front of them, you need to add a + sign without a space in front of the word. For example:</p> <p><b>ace + of base</b></p> <p><b>Search using a sign -</b></p> <p>If Google finds <a href="https://obanracer.ru/en/teamo-vhod-teamo-podobral-bolshoe-kolichestvo-anket-dlya-sereznyh.html">a large number of</a> pages from which it is necessary to exclude pages with a specific topic, then you can force Google to search only for pages that do not have specific words. To do this, you need to indicate these words, putting in front of each sign - without a space in front of the word. For example:</p> <p><b>fishing vodka</b></p> <p><b>Search using ~</b></p> <p>You may want to find not only the specified word, but also its synonyms. To do this, precede the word with the ~ symbol.</p> <p><b>Finding the exact phrase using double quotes</b></p> <p>Google searches on each page for all occurrences of the words that you wrote in the query string, and it does not care about the relative position of words, the main thing is that all the specified words are on the page at the same time (this is the default action). To find the exact phrase, you need to put it in quotes. For example:</p> <p><b>"bookend"</b></p> <p>To have at least one of the specified words, you must specify <a href="https://obanracer.ru/en/logicheskii-element-isklyuchayushchee-ili-logicheskie-operatory-vba.html">logical operation</a> explicitly: OR. For example:</p> <p><b>book safety OR protection</b></p> <p>In addition, in the search bar, you can use the * sign to denote any word and. to denote any character.</p> <p><b>Finding words using additional operators</b></p> <p>Exists <a href="https://obanracer.ru/en/inurl-privat-bild-php-name-burnyi-operatory-poiskovyh-sistem-google-i.html">search operators</a>, which are indicated in the search string in the format:</p> <p><b>operator: search_term</b></p> <p>Spaces next to the colon are not needed. If you insert a space after the colon, you will see an error message, and before it, then Google will use them as a normal search string. <br>There are groups of additional search operators: languages ​​- indicate in what language you want to see the result, date - limit results for the past three, six or 12 months, occurrences - indicate where in the document you need to search for a string: everywhere, in the title, in the URL, domains - search the specified site or, on the contrary, exclude it from the search, safe search - block sites containing the specified type of information and remove them from the search results pages. <br>At the same time, some operators do not need an additional parameter, for example, the query " <b>cache: www.google.com</b>"can be called as a full-fledged search string, and some keywords, on the contrary, require a search word, for example" <b>site: www.google.com help</b>". In light of our topic, let's look at the following operators:</p> <table border="1" cellpadding="0" cellspacing="0"><tr><td valign="top"><p><b>Operator</b></p> </td> <td valign="top"><p><b>Description</b></p> </td> <td valign="top"><p><b>Requires an additional parameter?</b></p> </td> </tr><tr><td valign="top"> </td> <td valign="top"><p>search only on the site specified in search_term</p> </td> <td valign="top"> </td> </tr><tr><td valign="top"> </td> <td valign="top"><p>search only in documents with the search_term type</p> </td> <td valign="top"> </td> </tr><tr><td valign="top"> </td> <td valign="top"> </td> <td valign="top"> </td> </tr><tr><td valign="top"> </td> <td valign="top"> </td> <td valign="top"> </td> </tr><tr><td valign="top"> </td> <td valign="top"><p>find pages containing search_term in title</p> </td> <td valign="top"> </td> </tr><tr><td valign="top"> </td> <td valign="top"><p>find pages containing all the words search_term in the title</p> </td> <td valign="top"> </td> </tr><tr><td valign="top"> </td> <td valign="top"><p>find pages containing the word search_term in their url</p> </td> <td valign="top"> </td> </tr><tr><td valign="top"> </td> <td valign="top"><p>find pages containing all the words search_term in their url</p> </td> <td valign="top"> </td> </tr></table><p>Operator <b>site:</b> restricts the search only to the specified site, and you can specify not only the domain name, but also the IP address. For example, enter:</p> <p>Operator <b>filetype:</b> restricts searches to files of a specific type. For example:</p> <p>As of the article's release date, Google can search within 13 different file formats:</p> <ul><li>Adobe Portable Document Format (pdf)</li> <li>Adobe PostScript (ps)</li> <li>Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku)</li> <li>Lotus WordPro (lwp)</li> <li>MacWrite (mw)</li> <li><a href="https://obanracer.ru/en/gde-nahoditsya-stroka-sostoyaniya-v-word-kak-otobrazhat-ili-skryvat-stroku.html">Microsoft Excel</a>(xls)</li> <li>Microsoft PowerPoint (ppt)</li> <li><a href="https://obanracer.ru/en/nevidimye-znaki-formatirovaniya-v-microsoft-word-polnaya-enciklopediya-simvolov-uznat-chto-za-simvol.html">Microsoft Word</a>(doc)</li> <li>Microsoft Works (wks, wps, wdb)</li> <li>Microsoft Write (wri)</li> <li>Rich Text Format (rtf)</li> <li><a href="https://obanracer.ru/en/kak-obnovit-plagin-v-yandeks-brauzere-vklyuchaem-flash-player-v-yandeks-brauzere.html">Shockwave Flash</a>(swf)</li> <li>Text (ans, txt)</li> </ul><p>Operator <b>link:</b> shows all pages that point to the specified page. <br>It's probably always interesting to see how many places on the Internet know about you. Trying:</p> <p>Operator <b>cache:</b> shows the version of the site in Google's cache as it looked when Google last visited this page. We take any site that changes frequently and look at:</p> <p>Operator <b>intitle:</b> searches for the specified word in the page title. Operator <b>allintitle:</b> is an extension - it looks for all specified multiple words in the page title. Compare:</p> <p><b>intitle: flight to mars <br>intitle: flight intitle: to intitle: mars <br>allintitle: flight to mars</b></p> <p>Operator <b>inurl:</b> makes Google show all pages containing the specified string in the URL. Operator allinurl: Searches for all words in a URL. For example:</p> <p><b>allinurl: acid acid_stat_alerts.php</b></p> <p>This command is especially useful for those who do not have SNORT - at least they can see how it works on a real system.</p> <h2>Hacking Methods Using Google</h2> <p>So, we found out that using a combination of the above operators and keywords, anyone can collect <a href="https://obanracer.ru/en/kopiya-obraza-cd-na-fleshku-kak-skinut-nuzhnuyu-informaciyu-s-diska-cd-ili-dvd-na.html">the information you need</a> and search for vulnerabilities. These techniques are often referred to as Google Hacking.</p> <h3>map of site</h3> <p>You can use the site: operator to see all the links that Google finds on the site. Usually, pages that are dynamically created by scripts are not indexed using parameters, so some sites use ISAPI filters so that links are not in the form <b>/article.asp?num=10&dst=5</b>, and with slashes <b>/ article / abc / num / 10 / dst / 5</b>... This is done so that the site is generally indexed by search engines.</p> <p>Let's try:</p> <p><b>site: www.whitehouse.gov whitehouse</b></p> <p>Google thinks every page on the site contains the word whitehouse. This is what we use to get all the pages. <br>There is also a simplified version:</p> <p><b>site: whitehouse.gov</b></p> <p>And the best part is that the comrades from whitehouse.gov did not even know that we looked at the structure of their site and even looked into the cached pages that Google downloaded for itself. This can be used to study the structure of sites and view content without being noticed for the time being.</p> <h3>Viewing a list of files in directories</h3> <p>WEB servers can show lists of server directories instead of usual <a href="https://obanracer.ru/en/chto-takoe-html-dlya-chego-ispolzuetsya-chto-takoe-html-kod-stranicy.html">HTML pages</a>... This is usually done to get users to select and download specific files. However, in many cases, it is not for administrators to show the contents of a directory. This is due to incorrect server configuration or lack of <a href="https://obanracer.ru/en/adminka-modx-dostup-k-glavnoi-stranice-adminka-modx---rukovodstvo-polzovaniya.html">home page</a> in the directory. As a result, the hacker has a chance to find something interesting in the directory and use it for his own purposes. To find all such pages, just notice that they all contain the words: index of in their title. But since the words index of contain not only such pages, we need to clarify the query and take into account the keywords on the page itself, so queries of the form are suitable for us:</p> <p><b>intitle: index.of parent directory <br>intitle: index.of name size</b></p> <p>Since most of the directory listings are intentional, you may find it difficult to find erroneously displayed listings the first time. But at least you can already use the listings to determine the version of the WEB server, as described below.</p> <h3>Getting the version of the WEB server.</h3> <p>Knowing the version of the WEB server is always useful before starting any hacker attack. Again thanks to Google it is possible to get this information without connecting to the server. If you look closely at the listing of the directory, you can see that the name of the WEB server and its version are displayed there.</p> <p><b>Apache1.3.29 - ProXad Server at trf296.free.fr Port 80</b></p> <p>An experienced administrator can change this information, but, as a rule, it is true. Thus, to get this information, it is enough to send a request:</p> <p><b>intitle: index.of server.at</b></p> <p>To get information for a specific server, we clarify the request:</p> <p><b>intitle: index.of server.at site: ibm.com</b></p> <p>Or vice versa, we are looking for servers running on a specific server version:</p> <p><b>intitle: index.of Apache / 2.0.40 Server at</b></p> <p>This technique can be used by a hacker to find a victim. If, for example, he has an exploit for a specific version of the WEB server, then he can find it and try the existing exploit.</p> <p>You can also get the server version by looking at the pages that are installed by default when installing a fresh version of the WEB server. For example, to see the Apache 1.2.6 test page, just type</p> <p><b>intitle: Test.Page.for.Apache it.worked!</b></p> <p>Moreover, some <a href="https://obanracer.ru/en/release-versii-operacionnoi-sistemy-kakie-sushchestvuyut-versii-operacionnoi.html">OS</a> during installation, they immediately install and start the WEB server. At the same time, some users are not even aware of this. Naturally, if you see that someone has not deleted the default page, then it is logical to assume that the computer has not been subjected to any configuration at all and is probably vulnerable to attacks.</p> <p>Try to find IIS 5.0 pages</p> <p><b>allintitle: Welcome to Windows 2000 Internet Services</b></p> <p>In the case of IIS, you can determine not only the server version, but also <a href="https://obanracer.ru/en/chto-postavit-windows-8-1-ili-10-luchshaya-versiya-windows-tak-chto-zhe.html">Windows version</a> and Service Pack.</p> <p>Another way to determine the version of the WEB server is to search for manuals (help pages) and examples that can be installed on the site by default. Hackers have found many ways to use these components to gain privileged access to the site. That is why you need to remove these components on the production site. Not to mention the fact that by the presence of these components you can get information about the type of server and its version. For example, let's find the apache manual:</p> <p><b>inurl: manual apache directives modules</b></p> <h3>Using Google as a CGI scanner.</h3> <p>CGI scanner or WEB scanner is a utility for finding vulnerable scripts and programs on the victim's server. These utilities should know what to look for, for this they have a whole list of vulnerable files, for example:</p> <p><b>/cgi-bin/cgiemail/uargg.txt <br>/random_banner/index.cgi <br>/random_banner/index.cgi <br>/cgi-bin/mailview.cgi <br>/cgi-bin/maillist.cgi <br>/cgi-bin/userreg.cgi <br><br>/iissamples/ISSamples/SQLQHit.asp <br>/SiteServer/admin/findvserver.asp <br>/scripts/cphost.dll <br>/cgi-bin/finger.cgi</b></p> <p>We can find each of these files using Google, using the words index of or inurl in addition to the file name in the search bar: we can find sites with vulnerable scripts, for example:</p> <p><b>allinurl: /random_banner/index.cgi</b></p> <p>Using additional knowledge, a hacker can exploit a script vulnerability and use this vulnerability to force the script to return any file stored on the server. For example a password file.</p> <h2>How to protect yourself from Google hacking.</h2> <h4>1. Do not post important data to the WEB server.</h4> <p>Even if you posted the data temporarily, then you can forget about it, or someone will have time to find and pick up this data before you erase it. Don't do that. There are many other ways to transfer data to protect it from theft.</p> <h4>2. Check your site.</h4> <p>Use the methods described to research your site. Check your site periodically with new methods that appear on the site http://johnny.ihackstuff.com. Remember that if you want to automate your actions, you need to get special permission from Google. If you read carefully <a target="_blank" href="http://www.google.com/terms_of_service.html">http://www.google.com/terms_of_service.html</a> then you will see the phrase: You may not send automated queries of any sort to Google "s system without express permission in advance from Google.</p> <h4>3. You may not need Google to index your site or part of it.</h4> <p>Google allows you to remove a link to your site or part of it from its database, as well as remove pages from the cache. In addition, you can prohibit the search for images on your site, prohibit showing short fragments of pages in search results. All options for deleting a site are described on the page <a target="_blank" href="http://www.google.com/remove.html">http://www.google.com/remove.html</a>... To do this, you must confirm that you are really the owner of this site or insert tags into the page or</p> <h4>4. Use robots.txt</h4> <p>It is known that search engines look into the robots.txt file located at the root of the site and do not index those parts that are marked with the word <b>Disallow</b>... You can take advantage of this to prevent part of the site from being indexed. For example, to avoid indexing the entire site, create a robots.txt file containing two lines:</p> <p><b>User-agent: * <br>Disallow: /</b></p> <h2>What else happens</h2> <p>So that life does not seem like honey to you, I will say in the end that there are sites that follow those people who, using the above methods, are looking for holes in scripts and WEB servers. An example of such a page is</p> <h2>Application.</h2> <p>A little bit sweet. Try something from the following list yourself:</p> <p>1. #mysql dump filetype: sql - find dumps of mySQL databases <br>2. Host Vulnerability Summary Report - will show you what vulnerabilities other people have found <br>3.phpMyAdmin running on inurl: main.php - this will force close control via phpmyadmin panel <br>4.not for distribution confidential <br>5. Request Details Control Tree Server Variables <br>6. Running in Child mode <br>7. This report was generated by WebLog <br>8.intitle: index.of cgiirc.config <br>9.filetype: conf inurl: firewall -intitle: cvs - can anyone need firewall configuration files? :) <br>10. intitle: index.of finances.xls - hmm .... <br>11.intitle: Index of dbconvert.exe chats - icq chat logs <br>12.intext: Tobias Oetiker traffic analysis <br>13.intitle: Usage Statistics for Generated by Webalizer <br>14.intitle: statistics of advanced web statistics <br>15.intitle: index.of ws_ftp.ini - ws ftp config <br>16.inurl: ipsec.secrets holds shared secrets - the secret key is a good find <br>17.inurl: main.php Welcome to phpMyAdmin <br>18.inurl: server-info Apache Server Information <br>19.site: edu admin grades <br>20. ORA-00921: unexpected end of SQL command - getting paths <br>21. intitle: index.of trillian.ini <br>22. intitle: Index of pwd.db <br>23. intitle: index.of people.lst <br>24. intitle: index.of master.passwd <br>25. inurl: passlist.txt <br>26. intitle: Index of .mysql_history <br>27. intitle: index of intext: globals.inc <br>28. intitle: index.of administrators.pwd <br>29. intitle: Index.of etc shadow <br>30. intitle: index.of secring.pgp <br>31.inurl: config.php dbuname dbpass <br>32. inurl: perform filetype: ini</p><li>"Hacking mit Google"</li> <span> <p>Training center "Informzashita" http://www.itsecurity.ru - a leading specialized center in the field of training <a href="https://obanracer.ru/en/informacionnaya-bezopasnost-sistema-obespecheniya-informacionnoi-bezopasnosti.html">information security</a>(License of the Moscow Education Committee No. 015470, State accreditation No. 004251). The only authorized training center for companies <a href="https://obanracer.ru/en/avg-antivirus-klyuch-aktivacii-skachat-licenzionnyi-avg-internet-security--.html">Internet Security</a> Systems and Clearswift in Russia and the CIS countries. Microsoft Authorized Training Center (Security specialization). The training programs are coordinated with the State Technical Commission of Russia, the FSB (FAPSI). Certificates of training and state documents on professional development.</p><p>SoftKey is a unique service for buyers, developers, dealers and affiliate partners. In addition, it is one of <a href="https://obanracer.ru/en/kakaya-cms-luchshe-kakaya-cms-luchshe-dlya-internet-magazina.html">best online stores</a> Software in Russia, Ukraine, Kazakhstan, which offers customers a wide assortment, many payment methods, prompt (often instant) order processing, tracking the order fulfillment process in the personal section, various discounts from the store and software manufacturers.</p> </span> <p>Getting private data doesn't always mean hacking - sometimes it's published in <a href="https://obanracer.ru/en/chto-takoe-onenote-chto-sluchilos-so-vkladkoi-obshchii-dostup-sozdanie-spiska-del-s.html">public access</a>... Knowing the Google settings and a little bit of ingenuity will allow you to find a lot of interesting things - from credit card numbers to FBI documents.</p> <h2>WARNING</h2>All information is provided for informational purposes only. Neither the editorial board nor the author is responsible for any possible harm caused by the materials of this article. <p>Today they connect everything to the Internet, caring little about restricting access. Therefore, a lot of private data becomes the prey of search engines. Spider robots are no longer limited to web pages, but index all the content available on the Web and constantly add undisclosed information to their databases. Finding out these secrets is easy - you just need to know exactly how to ask about them.</p><h2>Looking for files</h2> <p>In the right hands, Google will quickly find everything that is bad on the Web - for example, personal information and files for official use. They are often hidden like a key under a rug: there are no real access restrictions, the data just lies on the backyard of the site, where links do not lead. Google's standard web interface only provides <a href="https://obanracer.ru/en/versii-vmware-ustanovka-i-bazovaya-nastroika-besplatnogo-vmware-vsphere-hypervisor-chto.html">basic settings</a> advanced search, but even those will suffice.</p> <p>You can use two operators to limit your search to specific file types on Google using filetype and ext. The first specifies the format that the search engine determined by the file title, the second - the file extension, regardless of its internal content. When searching in both cases, you only need to specify the extension. Initially, the ext operator was convenient to use in cases where the file did not have specific format features (for example, to search for ini and cfg configuration files, inside which there could be anything). Now Google's algorithms have changed, and there is no visible difference between operators - the results in most cases come out the same.</p> <br><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359798_b3e1_filetype_ext.png' width="100%" loading=lazy loading=lazy><h2>Filtering the issue</h2> <p>By default, Google searches for words and, in general, any entered characters in all files on indexed pages. You can limit the search scope by domain <a href="https://obanracer.ru/en/kakih-vidov-byvayut-domeny-pervogo-urovnya-kakie-byvayut-domeny-vidy.html">top level</a>, a specific site or by the location of the desired sequence in the files themselves. For the first two options, the operator site is used, followed by the name of the domain or the selected site. In the third case, a whole set of operators allows you to search for information in service fields and metadata. For example, allinurl will find the specified in the body of the links themselves, allinanchor - in the text with the tag <a name>, allintitle - in the page titles, allintext - in the body of the pages.</p> <p>For each operator there is a light version with a shorter name (without the all prefix). The difference is that allinurl will find links with all words, while inurl will only find links with the first one. The second and subsequent words from the query can appear anywhere on web pages. The inurl operator also differs from another, similar in meaning - site. The former also allows you to find any sequence of characters in a link to the searched document (for example, / cgi-bin /), which is widely used to find components with known vulnerabilities.</p> <p>Let's try it in practice. We take the allintext filter and make the request return a list of credit card numbers and verification codes, which will expire only after two years (or when their owners get tired of feeding everyone in a row).</p><p>Allintext: card number expiration date / 2017 cvv <br><img src='https://i1.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359828_0660_cc_2017.png' width="100%" loading=lazy loading=lazy></p><p>When you read in the news that a young hacker "hacked into the servers" of the Pentagon or NASA, stealing classified information, then in most cases we are talking about just such an elementary technique of using Google. Suppose we are interested in a list of NASA employees and their contact details. Surely there is such a list in electronic form. For convenience or by oversight, it can also be found on the organization's website itself. It is logical that in this case there will be no links to it, since it is intended for internal use. What words can be in such a file? At least - the "address" field. Testing all these assumptions is easy.</p> <br><img src='https://i1.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359852_9681_google_inurl.png' width="100%" loading=lazy loading=lazy><p>Inurl: nasa.gov filetype: xlsx "address"</p> <br><img src='https://i1.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359864_215b_nasa_address.png' width="100%" loading=lazy loading=lazy><h2>We use bureaucracy</h2> <p>Finds like these are a nice little thing. A really solid catch provides a more detailed knowledge of Google operators for webmasters, the Web itself, and the structure of what they are looking for. Knowing the details, you can easily filter the results and clarify the properties of the files you need in order to get really valuable data in the rest. It's funny that bureaucracy comes to the rescue here. It produces typical formulations that make it convenient to search for secret information accidentally leaked into the Web.</p> <p>For example, the Distribution statement stamp, which is mandatory in the office of the US Department of Defense, means standardized restrictions on the distribution of a document. Letter A denotes public releases in which there is nothing secret; B - for internal use only, C - strictly confidential, and so on up to F. Separately, there is the letter X, which marks especially valuable information representing a state secret of the highest level. Let such documents be searched for by those who are supposed to do it on duty, and we will restrict ourselves to files with the letter C. According to the DoDI directive 5230.24, such marking is assigned to documents containing a description of critical technologies falling under export control. Such highly guarded information can be found on sites in the .mil top-level domain dedicated to the US Army.</p><p>"DISTRIBUTION STATEMENT C" inurl: navy.mil <br><img src='https://i1.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359886_8f3e_distribution_c.jpg' width="100%" loading=lazy loading=lazy></p><p>It is very convenient that the .mil domain contains only sites from the US Department of Defense and its contract organizations. Domain-restricted search results are exceptionally clean, and the headlines are self-explanatory. It is practically useless to search for Russian secrets in this way: chaos reigns in the .ru and.rf domains, and the names of many weapons systems sound botanical (PP "Cypress", ACS "Akatsiya") or completely fabulous (TOS "Buratino").</p> <br><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359901_5076_th-57c.jpg' width="100%" loading=lazy loading=lazy><p>By carefully examining any document from a site in the .mil domain, you can see other markers to refine your search. For example, a reference to export restrictions "Sec 2751", which is also convenient to search for interesting technical information. From time to time, it is withdrawn from the official sites, where it was once lit up, so if you cannot follow an interesting link in the search results, use Google's cache (operator cache) or the Internet Archive site.</p> <h2>Climbing into the clouds</h2> <p>In addition to accidentally declassified government documents, Google's cache occasionally pops up links to personal files from Dropbox and other storage services that create "private" links to publicly released data. It's even worse with alternative and homemade services. For example, the following request finds data from all Verizon clients who have an FTP server installed and actively used on their router.</p><p>Allinurl: ftp: // verizon.net</p><p>There are now more than forty thousand such smart people, and in the spring of 2015 there were an order of magnitude more. Instead of Verizon.net, you can substitute the name of any well-known provider, and the more famous it is, the bigger the catch can be. Through the built-in FTP server, you can see the files on the external storage connected to the router. Usually this is a NAS for remote work, a personal cloud or some kind of peer-to-peer file download. All the contents of such media are indexed by Google and other search engines, so you can access files stored on external drives using a direct link.</p> <p><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359919_7cea_allinurl_verizon_ftp.png' width="100%" loading=lazy loading=lazy></p> <h2>Peeping configs</h2> <p>Before the widespread migration to the clouds, simple FTP servers, which also had enough vulnerabilities, ruled as remote storages. Many of them are still relevant today. For example, the popular WS_FTP Professional program stores configuration data, user accounts, and passwords in the ws_ftp.ini file. It is easy to find and read as all records are stored in plain text and passwords are encrypted with Triple DES after minimal obfuscation. In most versions, simply discarding the first byte is sufficient.</p> <p><img src='https://i1.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359934_1d8d_ws_ftp-pwd.png' width="100%" loading=lazy loading=lazy></p> <p>It is easy to decrypt such passwords using the WS_FTP Password Decryptor utility or a free web service.</p> <p><img src='https://i2.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359947_3060_ws_ftp-pwd_found.png' width="100%" loading=lazy loading=lazy></p> <p>When talking about hacking an arbitrary site, they usually mean getting a password from logs and backups of CMS configuration files or e-commerce applications. If you know their typical structure, you can easily specify keywords. Lines like those found in ws_ftp.ini are extremely common. For example, Drupal and PrestaShop have a user ID (UID) and a corresponding password (pwd), and all information is stored in files with the .inc extension. You can search for them as follows:</p><p>"pwd =" "UID =" ext: inc</p><h2>Revealing passwords from DBMS</h2> <p>In the configuration files of SQL servers, names and addresses <a href="https://obanracer.ru/en/pochta-odnodnevka-odnorazovyi-vremennyi-pochtovyi-yashchik-e-mail.html">Email</a> users are stored in clear text, and their MD5 hashes are written instead of passwords. Strictly speaking, it is impossible to decrypt them, but you can find a match among the known hash-password pairs.</p> <p><img src='https://i1.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359963_9e67_sql_code.png' width="100%" loading=lazy loading=lazy></p> <p>Until now, there are DBMSs that do not even use password hashing. The configuration files of any of them can be simply viewed in the browser.</p><p>Intext: DB_PASSWORD filetype: env</p><p><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359975_d137_env.png' width="100%" loading=lazy loading=lazy></p> <p>With the advent of <a href="https://obanracer.ru/en/klientskie-programmy-irc-dlya-windows-klientskie-programmy-irc-dlya-windows-soedinenie.html">Windows servers</a> the place of configuration files was partly taken by the registry. You can search through its branches in exactly the same way, using reg as the file type. For example, like this:</p><p>Filetype: reg HKEY_CURRENT_USER "Password" =</p><p><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436359995_2ecf_reg.png' width="100%" loading=lazy loading=lazy></p> <h2>Don't forget the obvious</h2> <p>Sometimes it is possible to get to classified information with the help of accidentally opened and caught in the field of view <a href="https://obanracer.ru/en/kak-google-hranit-sobrannye-dannye-kakie-servisy-it-korporacii.html">Google data</a>... Ideally, find a list of passwords in some common format. Store account information in <a href="https://obanracer.ru/en/gibkie-magnitnye-diski-neobhodimo-oberegat-ot-v-celyah-sohraneniya.html">text file</a>, Word document or electronic <a href="https://obanracer.ru/en/kak-sohranit-tablicu-programma-excel-sposoby-sohraneniya-i-ego-parametry.html">Excel spreadsheet</a> only desperate people can, but there are always enough of them.</p><p>Filetype: xls inurl: password</p><p><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436360015_16e4_xls.png' width="100%" loading=lazy loading=lazy></p> <p>On the one hand, there are many ways to prevent such incidents. It is necessary to specify adequate access rights in htaccess, patch CMS, do not use left-hand scripts and close other holes. There is also a robots.txt file that prevents search engines from indexing files and directories specified in it. On the other hand, if the robots.txt structure on some server differs from the standard one, then it becomes immediately clear what they are trying to hide on it.</p> <p><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436360029_5da8_robots.png' width="100%" loading=lazy loading=lazy></p> <p>The list of directories and files on any site is preceded by the standard index of. Since for service purposes it must appear in the header, it makes sense to limit its search to the intitle operator. Interesting things are in the / admin /, / personal /, / etc / and even / secret / directories.</p> <p><img src='https://i0.wp.com/xakep.ru/wp-content/uploads/2015/07/1436360054_2a7b_indexof.png' width="100%" loading=lazy loading=lazy></p> <h2>Follow the updates</h2> <p>The relevance here is extremely important: old vulnerabilities are being closed very slowly, but Google and its search results are constantly changing. There is even a difference between the “last second” filter (& tbs = qdr: s at the end of the request url) and “real time” (& tbs = qdr: 1).</p> <p>Date time interval <a href="https://obanracer.ru/en/pochemu-na-brauzere-mazila-soedinenie-ne-zashchishcheno-chto-delat.html">last update</a> file from Google is also implicitly indicated. Through the graphical web interface, you can select one of the typical periods (hour, day, week, and so on) or set a date range, but this method is not suitable for automation.</p> <p>From the look of the address bar, you can only guess about a way to limit the output of results using the construction & tbs = qdr:. The letter y after it sets the limit of one year (& tbs = qdr: y), m shows the results for the last month, w for the week, d for the past day, h for the last hour, n for the minute, and s for give me a sec. The most recent results just reported to Google are found using the & tbs = qdr: 1 filter.</p> <p>If you need to write a tricky script, it will be useful to know that the date range is set in Google in Julian format using the daterange operator. For example, this is how you can find the list <a href="https://obanracer.ru/en/kak-peredelat-fail-v-pdf-kak-perevesti-vordovskie-dokumenty-v-pdf.html">PDF documents</a> with the word confidential, uploaded from 1st January to 1st July 2015.</p><p>Confidential filetype: pdf daterange: 2457024-2457205</p><p>The range is specified in Julian date format, excluding the fractional part. Translating them manually from the Gregorian calendar is inconvenient. It's easier to use a date converter.</p> <h2>Targeting and filtering again</h2> <p>In addition to specifying additional operators in the search query, they can be sent directly in the body of the link. For example, the qualification filetype: pdf corresponds to the construction as_filetype = pdf. Thus, it is convenient to specify any clarifications. Suppose that results are returned only from the Republic of Honduras by adding the cr = countryHN construction to the search URL, and only from the city of Bobruisk - gcs = Bobruisk. See the developer section for a complete list.</p> <p>Google's automation tools are meant to make life easier, but they often add challenges. For example, the user's city is determined by the user's IP through WHOIS. Based on this information, Google not only balances the load between servers, but also changes the search results. Depending on the region, for the same request, the first page will get different results, and some of them may be completely hidden. To feel like a cosmopolitan and to search for information from any country, its two-letter code after the gl = country directive will help. For example, the Netherlands code is NL, but the Vatican and North Korea do not have their own code on Google.</p> <p>Often, search results are cluttered even after using a few advanced filters. In this case, it is easy to refine the query by adding several exclusion words to it (each of them is preceded by a minus sign). For example, banking, names and tutorial are often used with the word Personal. Therefore, cleaner search results will be shown not by a textbook example of a query, but by a refined one:</p><p>Intitle: "Index of / Personal /" -names -tutorial -banking</p><h2>Last example</h2> <p>A sophisticated hacker is distinguished by the fact that he provides himself with everything he needs on his own. For example, a VPN is convenient, but either expensive or temporary and limited. It's too expensive to subscribe for yourself alone. It's good that there are group subscriptions, and with the help of Google it is easy to become part of a group. To do this, just find the Cisco VPN configuration file, which has a rather non-standard PCF extension and a recognizable path: Program Files \ Cisco Systems \ VPN Client \ Profiles. One request, and you join, for example, the friendly staff of the University of Bonn.</p><p>Filetype: pcf vpn OR Group</p><p><img src='https://i2.wp.com/xakep.ru/wp-content/uploads/2015/07/1436360077_d28b_vpn.png' width="100%" loading=lazy loading=lazy></p> <h2>INFO</h2>Google finds configuration files with passwords, but many of them are encrypted or replaced with hashes. If you see strings of fixed length, then immediately look for a decryption service. <br><p>Passwords are stored encrypted, but Maurice Massard has already written a program to decrypt them and provides it free of charge through thecampusgeeks.com.</p> <p>At <a href="https://obanracer.ru/en/nastroika-rss-lenty-na-pochtu-ispolzuem-gmail-dlya-chteniya-rss-lenty.html">Google help</a> hundreds of different types of attacks and penetration tests are performed. There are many options, affecting popular programs, major database formats, multiple vulnerabilities in PHP, clouds, and so on. If you have an accurate idea of ​​what you are looking for, this will greatly simplify obtaining the information you need (especially the one that was not planned to be made public). Shodan is not a single source of interesting ideas, but every database of indexed network resources! <br></p> <script>document.write("<img style='display:none;' src='//counter.yadro.ru/hit;artfast_after?t44.1;r"+ escape(document.referrer)+((typeof(screen)=="undefined")?"": ";s"+screen.width+"*"+screen.height+"*"+(screen.colorDepth? screen.colorDepth:screen.pixelDepth))+";u"+escape(document.URL)+";h"+escape(document.title.substring(0,150))+ ";"+Math.random()+ "border='0' width='1' height='1' loading=lazy loading=lazy>");</script> <div style="font-size:0px;height:0px;line-height:0px;margin:0;padding:0;clear:both"></div> </div> <footer> <div class="td-block-row td-post-next-prev"> <div class="td-block-span6 td-post-prev-post"> <div class="td-post-next-prev-content"><span>Previous article</span><a href="https://obanracer.ru/en/zvukovaya-shema-ukazatelei-povorotov-avtomobilya-na.html">Sound doubler of turns - do it yourself</a></div> </div> <!-- /next_post --> <div class="td-next-prev-separator"></div> <div class="td-block-span6 td-post-next-post"> <div class="td-post-next-prev-content"><span>Next article</span><a href="https://obanracer.ru/en/svetodiody-h4-novogo-pokoleniya-dlya-avto-svetodiodnye-lampy-starled.html">Starled LED Bulbs Near-Far H4 Kit</a></div> <!-- /next_post --> </div> </div> <div class="td-author-name vcard author" style="display: none"><span class="fn"><a href="https://obanracer.ru/en/author/iulia">Yuliya</a></span></div> <span style="display: none;" itemprop="author" itemscope itemtype="https://schema.org/Person"><meta itemprop="name" content="Юлия"></span> <meta itemprop="datePublished" content="2016-05-16T15:47:37+00:00"> <meta itemprop="dateModified" content="2016-10-25T16:54:41+00:00"> <meta itemscope itemprop="mainEntityOfPage" itemType="https://schema.org/WebPage" itemid="/other/kak-zavyazat-galstuk-foto-poshagovo.html" /><span style="display: none;" itemprop="publisher" itemscope itemtype="https://schema.org/Organization"><span style="display: none;" itemprop="logo" itemscope itemtype="https://schema.org/ImageObject"><meta itemprop="url" content="//obanracer.ru/wp-content/uploads/2017/01/logo-300x100.png"></span> <meta itemprop="name" content="Мой секрет"> </span> <meta itemprop="headline " content="Как завязать галстук пошагово фото"><span style="display: none;" itemprop="image" itemscope itemtype="https://schema.org/ImageObject"><meta itemprop="url" content="/wp-content/uploads/2016/05/1-19.jpg"><meta itemprop="width" content="640"><meta itemprop="height" content="450"></span> </footer> </article> <div class="td_block_wrap td_block_related_posts td_uid_3_5a236fb03c961_rand td_with_ajax_pagination td-pb-border-top td_block_template_1" data-td-block-uid="td_uid_3_5a236fb03c961" ><script>var block_td_uid_3_5a236fb03c961 = new tdBlock(); block_td_uid_3_5a236fb03c961.id = "td_uid_3_5a236fb03c961"; block_td_uid_3_5a236fb03c961.atts = '{ "limit":9,"sort":"","post_ids":"","tag_slug":"","autors_id":"","installed_post_types":"","category_id":"","category_ids":"","custom_title":"","custom_url":"","show_child_cat":"","sub_cat_ajax":"","ajax_pagination":"next_prev","header_color":"","header_text_color":"","ajax_pagination_infinite_stop":"","td_column_number":3,"td_ajax_preloading":"","td_ajax_filter_type":"td_custom_related","td_ajax_filter_ids":"","td_filter_default_txt":"\u0412\u0441\u0435","color_preset":"","border_top":"","class":"td_uid_3_5a236fb03c961_rand","el_class":"","offset":"","css":"","tdc_css":"","tdc_css_class":"td_uid_3_5a236fb03c961_rand","live_filter":"cur_post_same_categories","live_filter_cur_post_id":10046,"live_filter_cur_post_author":"694350","block_template_id":""} '; block_td_uid_3_5a236fb03c961.td_column_number = "3"; block_td_uid_3_5a236fb03c961.block_type = "td_block_related_posts"; block_td_uid_3_5a236fb03c961.post_count = "9"; block_td_uid_3_5a236fb03c961.found_posts = "26"; block_td_uid_3_5a236fb03c961.header_color = ""; block_td_uid_3_5a236fb03c961.ajax_pagination_infinite_stop = ""; block_td_uid_3_5a236fb03c961.max_num_pages = "3"; tdBlocksArray.push(block_td_uid_3_5a236fb03c961); </script><h4 class="td-related-title td-block-title"><a id="td_uid_4_5a236fb03e35d" class="td-related-left td-cur-simple-item" data-td_filter_value="" data-td_block_id="td_uid_3_5a236fb03c961" href="#">SIMILAR ARTICLES</a></h4><div id=td_uid_3_5a236fb03c961 class="td_block_inner"> <div class="td-related-row"> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/chto-takoe-abris-v-magneto-zazhiganie-ot-magneto-puskovoi-uskoritel.html" rel="bookmark" title="What is outline in magneto"><img width="218" height="150" class="entry-thumb" src="/uploads/3ea8eb836c4079800e5daa3e29c0929d.jpg" alt="What is outline in magneto" title="What is outline in magneto"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/the-winchesters/" class="td-post-category">Winchesters</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/chto-takoe-abris-v-magneto-zazhiganie-ot-magneto-puskovoi-uskoritel.html" rel="bookmark" title="What is outline in magneto">What is outline in magneto</a></h3> </div> </div> </div> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/svetodiodnye-lampy-led-cokol-h4-yarkii-svet-muchene-svet-nestandartnye-lampy.html" rel="bookmark" title="Torment - light: non-standard H4 bulbs in the standard headlight"><img width="218" height="150" class="entry-thumb" src="/uploads/f3fe978beacd5701ba6df63ea8385c1b.jpg" alt="Torment - light: non-standard H4 bulbs in the standard headlight" title="Torment - light: non-standard H4 bulbs in the standard headlight"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/motherboard/" class="td-post-category">motherboards</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/svetodiodnye-lampy-led-cokol-h4-yarkii-svet-muchene-svet-nestandartnye-lampy.html" rel="bookmark" title="Torment - light: non-standard H4 bulbs in the standard headlight">Torment - light: non-standard H4 bulbs in the standard headlight</a></h3> </div> </div> </div> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/sho-me-combo-smart-signature-moi-chestnyi-otzyv-videoregistratory-s.html" rel="bookmark" title="SHO-ME COMBO SMART Signature"><img width="218" height="150" class="entry-thumb" src="/uploads/384240f85f452b8e4f275c2e57986ab3.jpg" alt="SHO-ME COMBO SMART Signature" title="SHO-ME COMBO SMART Signature"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/graphics-card/" class="td-post-category">Video cards</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/sho-me-combo-smart-signature-moi-chestnyi-otzyv-videoregistratory-s.html" rel="bookmark" title="SHO-ME COMBO SMART Signature">SHO-ME COMBO SMART Signature</a></h3> </div> </div> </div> </div> <div class="td-related-row"> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/sho-me-ne-podklyuchaetsya-k-kompyuteru-chto-delat-esli-kompyuter-ne-vidit.html" rel="bookmark" title="What to do if the computer does not see the USB device?"><img width="218" height="150" class="entry-thumb" src="/uploads/c4eceac60413bd44e360b9ddb06c9587.jpg" alt="What to do if the computer does not see the USB device?" title="What to do if the computer does not see the USB device?"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/monitors/" class="td-post-category">Monitors</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/sho-me-ne-podklyuchaetsya-k-kompyuteru-chto-delat-esli-kompyuter-ne-vidit.html" rel="bookmark" title="What to do if the computer does not see the USB device?">What to do if the computer does not see the USB device?</a></h3> </div> </div> </div> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/shema-podklyucheniya-generatora-kamaz-54115-generator-na-dvigatele-kamaz.html" rel="bookmark" title="Generator on a kamaz engine"><img width="218" height="150" class="entry-thumb" src="/uploads/07a12f3168203ffc00211b70420fa06d.jpg" alt="Generator on a kamaz engine" title="Generator on a kamaz engine"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/processors/" class="td-post-category">Processors</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/shema-podklyucheniya-generatora-kamaz-54115-generator-na-dvigatele-kamaz.html" rel="bookmark" title="Generator on a kamaz engine">Generator on a kamaz engine</a></h3> </div> </div> </div> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/generator-kamaz-6520-3142-shema-vklyucheniya-elektricheskaya-shema-i-rabota.html" rel="bookmark" title="Electrical diagram and operation of the G273 generator of the KamAZ car"><img width="218" height="150" class="entry-thumb" src="/uploads/c594d98fd4d252ea5ef694266e816715.jpg" alt="Electrical diagram and operation of the G273 generator of the KamAZ car" title="Electrical diagram and operation of the G273 generator of the KamAZ car"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/processors/" class="td-post-category">Processors</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/generator-kamaz-6520-3142-shema-vklyucheniya-elektricheskaya-shema-i-rabota.html" rel="bookmark" title="Electrical diagram and operation of the G273 generator of the KamAZ car">Electrical diagram and operation of the G273 generator of the KamAZ car</a></h3> </div> </div> </div> </div> <div class="td-related-row"> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/evro-shteker-magnitoly-podklyuchenie-magnitoly-razemy-iso-kak-osnova.html" rel="bookmark" title="Euro plug of the radio. Connecting a radio tape recorder. ISO connectors as the basis for connecting most radio tape recorders"><img width="218" height="150" class="entry-thumb" src="/uploads/38fe063839bcc7f6757a97b1feea140f.jpg" alt="Euro plug of the radio. Connecting a radio tape recorder. ISO connectors as the basis for connecting most radio tape recorders" title="Euro plug of the radio. Connecting a radio tape recorder. ISO connectors as the basis for connecting most radio tape recorders"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/more/" class="td-post-category">Other</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/evro-shteker-magnitoly-podklyuchenie-magnitoly-razemy-iso-kak-osnova.html" rel="bookmark" title="Euro plug of the radio. Connecting a radio tape recorder. ISO connectors as the basis for connecting most radio tape recorders">Euro plug of the radio. Connecting a radio tape recorder. ISO connectors as the basis for connecting most radio tape recorders</a></h3> </div> </div> </div> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/tehpodderzhka-radar-detektory-avtomobilnye-cobra-antiradary-radar-detektory.html" rel="bookmark" title="Radar detectors (radar detectors) Cobra"><img width="218" height="150" class="entry-thumb" src="/uploads/24cdea5dfb2e1a47d5d5dce284726ec6.jpg" alt="Radar detectors (radar detectors) Cobra" title="Radar detectors (radar detectors) Cobra"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/power-supply/" class="td-post-category">Power supplies</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/tehpodderzhka-radar-detektory-avtomobilnye-cobra-antiradary-radar-detektory.html" rel="bookmark" title="Radar detectors (radar detectors) Cobra">Radar detectors (radar detectors) Cobra</a></h3> </div> </div> </div> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td-meta-info-hide td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/raspinovka-iso-razema-avtomagnitoly-vse-pro-evrorazemy-ili.html" rel="bookmark" title="What is ISO connector for radio Iso connector for radio"><img width="218" height="150" class="entry-thumb" src="/uploads/1e088287e09b81ed67ccd98275c6ba0f.jpg" alt="What is ISO connector for radio Iso connector for radio" title="What is ISO connector for radio Iso connector for radio"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/the-winchesters/" class="td-post-category">Winchesters</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/raspinovka-iso-razema-avtomagnitoly-vse-pro-evrorazemy-ili.html" rel="bookmark" title="What is ISO connector for radio Iso connector for radio">What is ISO connector for radio Iso connector for radio</a></h3> </div> </div> </div> </div></div></div> </div> </div> <div class="td-pb-span4 td-main-sidebar"> <div class="td-ss-main-sidebar"> <aside class="widget �lambda_169101"> <div style="margin:10px 0"> </div> </aside> <div class="td_block_wrap td_block_1 td_block_widget td_uid_2_5a23c04f0cdc0_rand td-pb-border-top td_block_template_1 td-column-1" data-td-block-uid="td_uid_2_5a23c04f0cdc0"> <div class="td-block-title-wrap"> <h4 class="block-title"><span class="td-pulldown-size">Recommended</span></h4> </div> <div id=td_uid_2_5a23c04f0cdc0 class="td_block_inner"> <div class="td-block-span12"> <div class="td_module_4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/chto-takoe-iso-razem-dlya-magnitoly-osobennosti-podklyucheniya-perehodnika-iso.html" rel="bookmark" title="Features of connecting an iso adapter for a radio tape recorder Iso connector for a radio tape recorder"><img width="324" height="235" class="entry-thumb" src="/uploads/1bba70db15aacbf89f7a1ce78f592457.jpg" alt="Features of connecting an iso adapter for a radio tape recorder Iso connector for a radio tape recorder" title="Features of connecting an iso adapter for a radio tape recorder Iso connector for a radio tape recorder"/ loading=lazy loading=lazy></a></div> <a href="https://obanracer.ru/en/category/ram/" class="td-post-category">RAM</a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/chto-takoe-iso-razem-dlya-magnitoly-osobennosti-podklyucheniya-perehodnika-iso.html" rel="bookmark" title="Features of connecting an iso adapter for a radio tape recorder Iso connector for a radio tape recorder">Features of connecting an iso adapter for a radio tape recorder Iso connector for a radio tape recorder</a></h3> <div class="td-module-meta-info"> </div> <div class="td-excerpt">We do not really think about the device of the car player until the moment when it regularly performs its functional duties, that is ...</div> </div> <!-- /next_post --> </div> <div> <div class="td-block-span12"> <div class="td_module_6 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/mozhno-li-doveryat-kitaiskim-radar-detektoram-serii-v7-v8-i-v9.html" rel="bookmark" title="Cons of radio detector V7 equipment"><img width="100" height="70" class="entry-thumb" src="/uploads/ca0fe26a5def3d46a1f89d209eff4bf8.jpg" alt="Cons of radio detector V7 equipment" title="Cons of radio detector V7 equipment"/ loading=lazy loading=lazy></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/mozhno-li-doveryat-kitaiskim-radar-detektoram-serii-v7-v8-i-v9.html" rel="bookmark" title="Cons of radio detector V7 equipment">Cons of radio detector V7 equipment</a></h3> <div class="td-module-meta-info"> <a href="https://obanracer.ru/en/category/case/" class="td-post-category">Housings</a> </div> </div> </div> </div> <div class="td-block-span12"> <div class="td_module_6 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/mozhno-li-doveryat-kitaiskim-radar-detektoram-serii-v7-v8-i-v9-innovacionnoe.html" rel="bookmark" title="An innovative device belonging to a new generation of radar detectors"><img width="100" height="70" class="entry-thumb" src="/uploads/7257439cc57d4905d797aedc9db72bfa.jpg" alt="An innovative device belonging to a new generation of radar detectors" title="An innovative device belonging to a new generation of radar detectors"/ loading=lazy loading=lazy></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/mozhno-li-doveryat-kitaiskim-radar-detektoram-serii-v7-v8-i-v9-innovacionnoe.html" rel="bookmark" title="An innovative device belonging to a new generation of radar detectors">An innovative device belonging to a new generation of radar detectors</a></h3> <div class="td-module-meta-info"> <a href="https://obanracer.ru/en/category/the-winchesters/" class="td-post-category">Winchesters</a> </div> </div> </div> </div> <div class="td-block-span12"> <div class="td_module_6 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/mozhno-li-doveryat-kitaiskim-radar-detektoram-serii-v7-v8-i-v9-plyusy-i-minusy.html" rel="bookmark" title="Can you trust Chinese V7, V8 and V9 series radar detectors?"><img width="100" height="70" class="entry-thumb" src="/uploads/c42d8cf8721f5ec0290ff6668de32f73.jpg" alt="Can you trust Chinese V7, V8 and V9 series radar detectors?" title="Can you trust Chinese V7, V8 and V9 series radar detectors?"/ loading=lazy loading=lazy></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/mozhno-li-doveryat-kitaiskim-radar-detektoram-serii-v7-v8-i-v9-plyusy-i-minusy.html" rel="bookmark" title="Can you trust Chinese V7, V8 and V9 series radar detectors?">Can you trust Chinese V7, V8 and V9 series radar detectors?</a></h3> <div class="td-module-meta-info"> <a href="https://obanracer.ru/en/category/case/" class="td-post-category">Housings</a> </div> </div> </div> </div> <div class="td-block-span12"> <div class="td_module_6 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/nastroika-dvuhkanalnogo-usilitelya-pod-sabvufer-nastroika.html" rel="bookmark" title="Setting up the subwoofer in your car"><img width="100" height="70" class="entry-thumb" src="/uploads/6ac5159049778efba39e903b155f63d8.jpg" alt="Setting up the subwoofer in your car" title="Setting up the subwoofer in your car"/ loading=lazy loading=lazy></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/nastroika-dvuhkanalnogo-usilitelya-pod-sabvufer-nastroika.html" rel="bookmark" title="Setting up the subwoofer in your car">Setting up the subwoofer in your car</a></h3> <div class="td-module-meta-info"> <a href="https://obanracer.ru/en/category/graphics-card/" class="td-post-category">Video cards</a> </div> </div> </div> </div> <div class="td-block-span12"> <div class="td_module_6 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/pyatyi-kanal-opublikoval-dannye-shariya-anatolii-sharii-uvolil-ministra.html" rel="bookmark" title="Anatoly Shariy fired the Minister of Information of Ukraine"><img width="100" height="70" class="entry-thumb" src="/uploads/a88ccdff555550c5f4aa570c9ccdd21c.jpg" alt="Anatoly Shariy fired the Minister of Information of Ukraine" title="Anatoly Shariy fired the Minister of Information of Ukraine"/ loading=lazy loading=lazy></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/pyatyi-kanal-opublikoval-dannye-shariya-anatolii-sharii-uvolil-ministra.html" rel="bookmark" title="Anatoly Shariy fired the Minister of Information of Ukraine">Anatoly Shariy fired the Minister of Information of Ukraine</a></h3> <div class="td-module-meta-info"> <a href="https://obanracer.ru/en/category/graphics-card/" class="td-post-category">Video cards</a> </div> </div> </div> </div> <div class="td-block-span12"> <div class="td_module_6 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/radiolokacionnye-stancii-na-zemle-franca-iosifa-radiolokacionnye.html" rel="bookmark" title="Radar stations on franz-joseph land 5n84a defense 14 radar station"><img width="100" height="70" class="entry-thumb" src="/uploads/bc24d3ffa53ee9875ace4cccd5f4bdf5.jpg" alt="Radar stations on franz-joseph land 5n84a defense 14 radar station" title="Radar stations on franz-joseph land 5n84a defense 14 radar station"/ loading=lazy loading=lazy></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/radiolokacionnye-stancii-na-zemle-franca-iosifa-radiolokacionnye.html" rel="bookmark" title="Radar stations on franz-joseph land 5n84a defense 14 radar station">Radar stations on franz-joseph land 5n84a defense 14 radar station</a></h3> <div class="td-module-meta-info"> <a href="https://obanracer.ru/en/category/windows-7/" class="td-post-category">Windows 7</a> </div> </div> </div> </div> </div> </div> </div> <aside class="widget_text td_block_template_1 widget widget_custom_html"> <div class="textwidget custom-html-widget"> </div> </aside> </div> </div> </div> </div> </div> <div class="td-footer-wrapper td-container-wrap "> <div class="td-container"> <div class="td-pb-row"> <div class="td-pb-span12"> </div> </div> <div class="td-pb-row"> <div class="td-pb-span4"> <div class="td_block_wrap td_block_15 td_block_widget td_uid_11_5a23980e76adb_rand td-pb-border-top td_block_template_1 td-column-1 td_block_padding" data-td-block-uid="td_uid_11_5a23980e76adb" > <div class="td-block-title-wrap"></div><div id=td_uid_11_5a23980e76adb class="td_block_inner td-column-1"><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/kriptopro-veb-plagin-nastroika-doverennyh-uzlov-dlya-kriptopro-ecp-browser.html" rel="bookmark" title="Configuring trusted nodes for CryptoPro EDS Browser plug-in"><img width="218" height="150" class="entry-thumb" src="/uploads/488dbd55bcdf2c46101ab8176a3776eb.jpg" alt="Configuring trusted nodes for CryptoPro EDS Browser plug-in" title="Configuring trusted nodes for CryptoPro EDS Browser plug-in"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/kriptopro-veb-plagin-nastroika-doverennyh-uzlov-dlya-kriptopro-ecp-browser.html" rel="bookmark" title="Configuring trusted nodes for CryptoPro EDS Browser plug-in">Configuring trusted nodes for CryptoPro EDS Browser plug-in</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/instrukciya-po-planovoi-smene-elektronnoi-podpisi-instrukciya.html" rel="bookmark" title="Instructions for the planned change of the Vipnet csp electronic signature forgotten key container password"><img width="218" height="150" class="entry-thumb" src="/uploads/1c9b2b24a780a9ba633c4a46f5966e8a.jpg" alt="Instructions for the planned change of the Vipnet csp electronic signature forgotten key container password" title="Instructions for the planned change of the Vipnet csp electronic signature forgotten key container password"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/instrukciya-po-planovoi-smene-elektronnoi-podpisi-instrukciya.html" rel="bookmark" title="Instructions for the planned change of the Vipnet csp electronic signature forgotten key container password">Instructions for the planned change of the Vipnet csp electronic signature forgotten key container password</a></h3> </div> </div> </div><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/oshibka-kernel-data-inpage-error-chto-delat-kernel-data-in-page-error-sposoby.html" rel="bookmark" title="Kernel data in page error: solutions and step-by-step recommendations"><img width="218" height="150" class="entry-thumb" src="/uploads/f613eb4b038694e58fe7e9ed8a07ba4b.jpg" alt="Kernel data in page error: solutions and step-by-step recommendations" title="Kernel data in page error: solutions and step-by-step recommendations"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/oshibka-kernel-data-inpage-error-chto-delat-kernel-data-in-page-error-sposoby.html" rel="bookmark" title="Kernel data in page error: solutions and step-by-step recommendations">Kernel data in page error: solutions and step-by-step recommendations</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/kak-provodit-tendery-i-zakupki-na-torgovoi-ploshchadke-sberbank-ast-i-s.html" rel="bookmark" title="Sberbank AS plug-in is unavailable, possible reasons for Sberbank AS failure plug-in timed out"><img width="218" height="150" class="entry-thumb" src="/uploads/b094c6f731650cd6307a9337171f2600.jpg" alt="Sberbank AS plug-in is unavailable, possible reasons for Sberbank AS failure plug-in timed out" title="Sberbank AS plug-in is unavailable, possible reasons for Sberbank AS failure plug-in timed out"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/kak-provodit-tendery-i-zakupki-na-torgovoi-ploshchadke-sberbank-ast-i-s.html" rel="bookmark" title="Sberbank AS plug-in is unavailable, possible reasons for Sberbank AS failure plug-in timed out">Sberbank AS plug-in is unavailable, possible reasons for Sberbank AS failure plug-in timed out</a></h3> </div> </div> </div><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/sozdaem-virtualnuyu-fleshku-v-kompyutere-sozdaem-virtualnuyu-fleshku-v.html" rel="bookmark" title="Create a virtual USB flash drive on your computer Create an emulator for a usb device under windows"><img width="218" height="150" class="entry-thumb" src="/uploads/8c784466e9ac263f4bce884216cf3ed5.jpg" alt="Create a virtual USB flash drive on your computer Create an emulator for a usb device under windows" title="Create a virtual USB flash drive on your computer Create an emulator for a usb device under windows"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/sozdaem-virtualnuyu-fleshku-v-kompyutere-sozdaem-virtualnuyu-fleshku-v.html" rel="bookmark" title="Create a virtual USB flash drive on your computer Create an emulator for a usb device under windows">Create a virtual USB flash drive on your computer Create an emulator for a usb device under windows</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/ne-viditsya-etoken-v-pki-client-chto-delat-esli-ne-obnaruzhen-apparatnyi.html" rel="bookmark" title="What to do if the hardware key for egais is not found?"><img width="218" height="150" class="entry-thumb" src="/uploads/5aa4cbee24ff8528e85cba09b1f8e044.jpg" alt="What to do if the hardware key for egais is not found?" title="What to do if the hardware key for egais is not found?"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/ne-viditsya-etoken-v-pki-client-chto-delat-esli-ne-obnaruzhen-apparatnyi.html" rel="bookmark" title="What to do if the hardware key for egais is not found?">What to do if the hardware key for egais is not found?</a></h3> </div> </div> </div></div></div> <div class="clearfix"></div> </div> <div class="td-pb-span4"> <div class="td_block_wrap td_block_15 td_block_widget td_uid_12_5a23980e79990_rand td-pb-border-top td_block_template_1 td-column-1 td_block_padding" data-td-block-uid="td_uid_12_5a23980e79990" > <div class="td-block-title-wrap"></div><div id=td_uid_12_5a23980e79990 class="td_block_inner td-column-1"><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/soobshchenie-kriptopro-csp-vstavte-klyuchevoi-nositel-ili.html" rel="bookmark" title=""Не вставлен ключевой носитель"><img width="218" height="150" class="entry-thumb" src="/uploads/fd841cce6d40085da05240eead4c60b8.jpg" alt=""Не вставлен ключевой носитель" title=""Не вставлен ключевой носитель"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/soobshchenie-kriptopro-csp-vstavte-klyuchevoi-nositel-ili.html" rel="bookmark" title=""Не вставлен ключевой носитель">"Key carrier not inserted</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/kak-provodit-tendery-i-zakupki-na-torgovoi-ploshchadke-sberbank-ast-i-s.html" rel="bookmark" title="Sberbank ast plug-in is not available, possible reasons for the failure Sberbank ast plug-in error is not available"><img width="218" height="150" class="entry-thumb" src="/uploads/20bcd39463dad408add6ffb58d0e6c71.jpg" alt="Sberbank ast plug-in is not available, possible reasons for the failure Sberbank ast plug-in error is not available" title="Sberbank ast plug-in is not available, possible reasons for the failure Sberbank ast plug-in error is not available"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/kak-provodit-tendery-i-zakupki-na-torgovoi-ploshchadke-sberbank-ast-i-s.html" rel="bookmark" title="Sberbank ast plug-in is not available, possible reasons for the failure Sberbank ast plug-in error is not available">Sberbank ast plug-in is not available, possible reasons for the failure Sberbank ast plug-in error is not available</a></h3> </div> </div> </div><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/kak-udalit-kontinent-ap-s-kompyutera-polnostyu-udalenie-abonentskogo.html" rel="bookmark" title="Deleting a Subscriber Station of Earlier Versions"><img width="218" height="150" class="entry-thumb" src="/uploads/a7de18fac5edfb74ea0b991647d89f2c.jpg" alt="Deleting a Subscriber Station of Earlier Versions" title="Deleting a Subscriber Station of Earlier Versions"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/kak-udalit-kontinent-ap-s-kompyutera-polnostyu-udalenie-abonentskogo.html" rel="bookmark" title="Deleting a Subscriber Station of Earlier Versions">Deleting a Subscriber Station of Earlier Versions</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/firefox-ne-vidit-plagin-kriptopro-ustanovka-plagina-kriptopro-csp-v.html" rel="bookmark" title="Installing the CryptoPro CSP plugin in the Mozilla Firefox browser"><img width="218" height="150" class="entry-thumb" src="/uploads/f6d4d1539d89da46b138a553a284fbf1.jpg" alt="Installing the CryptoPro CSP plugin in the Mozilla Firefox browser" title="Installing the CryptoPro CSP plugin in the Mozilla Firefox browser"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/firefox-ne-vidit-plagin-kriptopro-ustanovka-plagina-kriptopro-csp-v.html" rel="bookmark" title="Installing the CryptoPro CSP plugin in the Mozilla Firefox browser">Installing the CryptoPro CSP plugin in the Mozilla Firefox browser</a></h3> </div> </div> </div><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/cryptopro-csp-4-0-seriinyi-nomer-licenziya-nakriptopro-csp.html" rel="bookmark" title="Cryptopro csp 4.0 serial number. CryptoPro CSP license"><img width="218" height="150" class="entry-thumb" src="/uploads/504057b2ab1d76f2bb57f879d57c26a5.jpg" alt="Cryptopro csp 4.0 serial number. CryptoPro CSP license" title="Cryptopro csp 4.0 serial number. CryptoPro CSP license"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/cryptopro-csp-4-0-seriinyi-nomer-licenziya-nakriptopro-csp.html" rel="bookmark" title="Cryptopro csp 4.0 serial number. CryptoPro CSP license">Cryptopro csp 4.0 serial number. CryptoPro CSP license</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/interaktivnye-sluzhby-pozvolyayut-uprostit-inventarizaciyu.html" rel="bookmark" title="Which Windows services are needed and which can be disabled How to disable online services messages"><img width="218" height="150" class="entry-thumb" src="/uploads/11c1781d0e37f71bd0853d09a8ea421b.jpg" alt="Which Windows services are needed and which can be disabled How to disable online services messages" title="Which Windows services are needed and which can be disabled How to disable online services messages"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/interaktivnye-sluzhby-pozvolyayut-uprostit-inventarizaciyu.html" rel="bookmark" title="Which Windows services are needed and which can be disabled How to disable online services messages">Which Windows services are needed and which can be disabled How to disable online services messages</a></h3> </div> </div> </div></div></div> <div class="clearfix"></div> </div> <div class="td-pb-span4"> <div class="td_block_wrap td_block_15 td_block_widget td_uid_13_5a23980e7caa8_rand td-pb-border-top td_block_template_1 td-column-1 td_block_padding" data-td-block-uid="td_uid_13_5a23980e7caa8" > <div class="td-block-title-wrap"></div><div id=td_uid_13_5a23980e7caa8 class="td_block_inner td-column-1"><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/fleshka-stala-opredelyatsya-kak-lokalnyi-disk-reshenie-problem-s.html" rel="bookmark" title="Solving external hard drive problems"><img width="218" height="150" class="entry-thumb" src="/uploads/ad26692fd5023e431e4a36bdf4a933e7.jpg" alt="Solving external hard drive problems" title="Solving external hard drive problems"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/fleshka-stala-opredelyatsya-kak-lokalnyi-disk-reshenie-problem-s.html" rel="bookmark" title="Solving external hard drive problems">Solving external hard drive problems</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/ustanovka-kriptopro-naznachenie-kriptopro-csp-ustanovit.html" rel="bookmark" title="Purpose of CryptoPro CSP Install CryptoPro with sp version 3 6"><img width="218" height="150" class="entry-thumb" src="/uploads/04f072971a4788505f92d79d91aec23e.jpg" alt="Purpose of CryptoPro CSP Install CryptoPro with sp version 3 6" title="Purpose of CryptoPro CSP Install CryptoPro with sp version 3 6"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/ustanovka-kriptopro-naznachenie-kriptopro-csp-ustanovit.html" rel="bookmark" title="Purpose of CryptoPro CSP Install CryptoPro with sp version 3 6">Purpose of CryptoPro CSP Install CryptoPro with sp version 3 6</a></h3> </div> </div> </div><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/ekstern-kak-vvesti-seriinyi-nomer-kriptopro-kontur-ekstern-kriptopro-3-6-klyuch.html" rel="bookmark" title="How to enter the serial number of CryptoPro - Contour"><img width="218" height="150" class="entry-thumb" src="/uploads/e17558a2620cdc01c70542eb7a86abc8.jpg" alt="How to enter the serial number of CryptoPro - Contour" title="How to enter the serial number of CryptoPro - Contour"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/ekstern-kak-vvesti-seriinyi-nomer-kriptopro-kontur-ekstern-kriptopro-3-6-klyuch.html" rel="bookmark" title="How to enter the serial number of CryptoPro - Contour">How to enter the serial number of CryptoPro - Contour</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/russian-dpc-tax-service-kornevoi-sertifikat-elektronnaya-podpis-podgotovka-k.html" rel="bookmark" title="Russian dpc tax service root certificate"><img width="218" height="150" class="entry-thumb" src="/uploads/bc1e2ae3c9a77a5e68188ec1f1f05476.jpg" alt="Russian dpc tax service root certificate" title="Russian dpc tax service root certificate"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/russian-dpc-tax-service-kornevoi-sertifikat-elektronnaya-podpis-podgotovka-k.html" rel="bookmark" title="Russian dpc tax service root certificate">Russian dpc tax service root certificate</a></h3> </div> </div> </div><div class="td-cust-row"> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/udostoveryayushchim-centrom-dlya-raboty-s-portalom-fns-elektronnaya-podpis.html" rel="bookmark" title="Certification center for working with the fns portal"><img width="218" height="150" class="entry-thumb" src="/uploads/bc1e2ae3c9a77a5e68188ec1f1f05476.jpg" alt="Certification center for working with the fns portal" title="Certification center for working with the fns portal"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/udostoveryayushchim-centrom-dlya-raboty-s-portalom-fns-elektronnaya-podpis.html" rel="bookmark" title="Certification center for working with the fns portal">Certification center for working with the fns portal</a></h3> </div> </div> <div class="td-block-span12"> <div class="td_module_mx4 td_module_wrap td-animation-stack td-meta-info-hide"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://obanracer.ru/en/algoritm-kriptograficheskogo-preobrazovaniya-soglasno-gost-28147-89.html" rel="bookmark" title="Domestic data encryption standard"><img width="218" height="150" class="entry-thumb" src="/uploads/8b768816718996b0f00db63e0d3ae4f7.jpg" alt="Domestic data encryption standard" title="Domestic data encryption standard"/ loading=lazy loading=lazy></a></div> <a href="" class="td-post-category"></a> </div> <h3 class="entry-title td-module-title"><a href="https://obanracer.ru/en/algoritm-kriptograficheskogo-preobrazovaniya-soglasno-gost-28147-89.html" rel="bookmark" title="Domestic data encryption standard">Domestic data encryption standard</a></h3> </div> </div> </div></div></div> <div class="clearfix"></div><aside class="td_block_template_1 widget widget_text"> <div class="textwidget"> </div> </aside><aside class="td_block_template_1 widget widget_text"> <div class="textwidget"> </div> </aside> </div> </div> </div> </div> <div class="td-sub-footer-container td-container-wrap "> <div class="td-container"> <div class="td-pb-row"> <div class="td-pb-span td-sub-footer-menu"> </div> <div class="td-pb-span td-sub-footer-copy">Copyright 2021 - Computer and Laptop Repair. Video cards, hard drives, internet, monitors.</div> </div> </div> </div> </div> <style type="text/css" media="screen"> /* custom css theme panel */ .td-post-header .entry-title { font-weight: normal !important; } h1.entry-title { font-weight: normal !important; border-bottom:#c44c4c 2px dotted; } h1.entry-title:before { content: "\f184"; font-family: "FontAwesome"; margin-right:10px; color:#c44c4c; } .sf-menu ul .td-menu-item > a:hover, .sf-menu ul .sfHover > a, .sf-menu ul .current-menu-ancestor > a, .sf-menu ul .current-category-ancestor > a, .sf-menu ul .current-menu-item > a { color: #edf3f7; } .td-post-content h2 { border-bottom:#c44c4c 2px dotted;} .td-post-content h2:before { content: "\f184"; font-family: "FontAwesome"; margin-right:10px; color:#c44c4c; } .td-post-content h3 { border-bottom:#c44c4c 2px dotted;} .td-post-content h3:before { content: "\f103"; font-family: "FontAwesome"; margin-right:10px; color:#c44c4c; } .category-my .td-page-title { color:#c44c4c; font-weight: 400; font-size: 36px; } .post header .entry-title { line-height: 40px; } .td-category-description h2, .td-category-description h3 { color:#c44c4c;} .td-category-description h2 { border-bottom:#c44c4c 2px solid;} .td-category-description h2:before { content: "\f055"; font-family: "FontAwesome"; margin-right:10px; color:#c44c4c; } .td-category-description h3 { border-bottom:#c44c4c 2px solid;} .td-category-description h3:before { content: "\f103"; font-family: "FontAwesome"; margin-right:10px; color:#c44c4c; } .td-category-description ol, .td-category-description ul { margin-top:20px !important; margin-bottom:20px !important;} .td-category-description ul, .td-post-content ul { padding:0; margin:0; list-style:none; clear:both;} .td-category-description ul li, .td-post-content ul li { padding:0 0 0 15px; margin:0 0 10px 35px; position:relative;} .td-category-description ul li:before, .td-post-content ul li:before { content: "\f192"; font-family: "FontAwesome"; color:#c44c4c; position:absolute; left:-10px;} .td-category-description ol, .td-post-content ol { padding:0; margin:0 0 0 5px; list-style:none; counter-reset: lipoint; clear:both;} .td-category-description ol li, .td-post-content ol li { padding:0 0 0 15px; margin:0 0 10px 35px; position:relative;} .td-category-description ol li:before, .td-post-content ol li:before { content: counter(lipoint); counter-increment: lipoint; color:#fff; position:absolute; left:-16px; background:#c44c4c; width:20px; height:20px; line-height:20px; text-align:center; -webkit-border-radius: 20px;border-radius: 20px; font-size:12px; top:3px;} .toc_list li:before { display:none} .td-header-style-9 .td-header-menu-wrap-full { /* Permalink - use to edit and share this gradient: http://colorzilla.com/gradient-editor/#c44c4c+0,c10000+100 */ background: #c44c4c; /* Old browsers */ background: -moz-linear-gradient(top, #c44c4c 0%, #c10000 100%); /* FF3.6-15 */ background: -webkit-linear-gradient(top, #c44c4c 0%,#c10000 100%); /* Chrome10-25,Safari5.1-6 */ background: linear-gradient(to bottom, #c44c4c 0%,#c10000 100%); /* W3C, IE10+, FF16+, Chrome26+, Opera12+, Safari7+ */ filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#c44c4c', endColorstr='#c10000',GradientType=0 ); /* IE6-9 */ } .sf-menu > li > a { color: #fff; } .td-header-style-9 .header-search-wrap .td-icon-search { color: #fff; } .td-affix a { color:#000 !important;} </style> <script type='text/javascript'> /* <![CDATA[ */ var tocplus = { "smooth_scroll":"1"} ; /* ]]> */ </script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/table-of-contents-plus/front.min.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/wp-postratings/js/postratings-js.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/themes/Newspaper/js/tagdiv_theme.js'></script> <script type='text/javascript' src='/wp-includes/js/comment-reply.min.js'></script> <script type='text/javascript'> /* <![CDATA[ */ var boxzilla_options = { "testMode":"","boxes":[]} ; /* ]]> */ </script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/boxzilla/assets/js/script.min.js'></script> <script type='text/javascript' src='/wp-includes/js/wp-embed.min.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/simple-lightbox/client/js/prod/lib.core.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/simple-lightbox/client/js/prod/lib.view.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/simple-lightbox/themes/baseline/js/prod/client.js'></script> <script type='text/javascript' src='/assets/client1.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/simple-lightbox/template-tags/item/js/prod/tag.item.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/simple-lightbox/template-tags/ui/js/prod/tag.ui.js'></script> <script type='text/javascript' src='https://obanracer.ru/wp-content/plugins/simple-lightbox/content-handlers/image/js/prod/handler.image.js'></script> <script> (function(){ var html_jquery_obj = jQuery('html'); if (html_jquery_obj.length && (html_jquery_obj.is('.ie8') || html_jquery_obj.is('.ie9'))) { var path = '/wp-content/themes/Newspaper/style.css'; jQuery.get(path, function(data) { var str_split_separator = '#td_css_split_separator'; var arr_splits = data.split(str_split_separator); var arr_length = arr_splits.length; if (arr_length > 1) { var dir_path = '/wp-content/themes/Newspaper'; var splited_css = ''; for (var i = 0; i < arr_length; i++) { if (i > 0) { arr_splits[i] = str_split_separator + ' ' + arr_splits[i]; } //jQuery('head').append('<style>' + arr_splits[i] + '</style>'); var formated_str = arr_splits[i].replace(/\surl\(\'(?!data\:)/gi, function regex_function(str) { return ' url(\'' + dir_path + '/' + str.replace(/url\(\'/gi, '').replace(/^\s+|\s+$/gm,''); } ); splited_css += "<style>" + formated_str + "</style>"; } var td_theme_css = jQuery('link#td-theme-css'); if (td_theme_css.length) { td_theme_css.after(splited_css); } } } ); } } )(); </script> </body> </html>