Screencast: Google hacking, infosec style

Can't see the screen?

Watch Tom Bowers' Google hacking demonstration in a larger window.
Search engines and tools are not only handy when it comes to finding something on the Web, but they can also help security professionals ensure an organization's intellectual property doesn't slip off the network and into the public domain.

In this step-by-step demonstration, contributor Tom Bowers demonstrates how some basic "Google hacking" methods can offer fascinating competitive intelligence for your enterprise.

About the author:
Tom Bowers, managing director of security think tank and industry analyst firm Security Constructs, holds the CISSP, PMP and Certified Ethical Hacker certifications, and is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers serves as the president of the 600-member Philadelphia chapter of Infragard, is a technical editor of Information Security magazine, and speaks regularly at events like Information Security Decisions.

Learn more about Google hacking:

This was first published in August 2007

Join the conversation Comment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.