管理提醒: 本帖被 lou1984 从 文献检索知识 移动到本区(2010-04-13)
现在很多国外高校都有校外入口,通过校外入口可以轻松搞定很多文献资源
关键是校外入口都是需要密*****的,一般校外入口常用的就是ezproxy了,通过
这样的代理,校外的工作人员和学生就可以方便使用图书馆的资源了
因此国内很多论坛都提供这样的东西,那么如何通过百度和google搜索最好用的资源呢
下面告诉你关键词:ezproxy password bbs
为什么是这几个呢 下面解释一下
我们要搜索ezproxy的密*****
所以需要关键词ezproxy password
我们需要在论坛查找,所以需要加上 bbs
最后关键词定为:ezproxy password bbs
整理的google检索词
intitle:"index of" passwd
allinurl:cpidlogin site:epnet.com
allinurl:password user site:epnet.com
intitle:"EBSCO Publishing Service Selection Page
allinurl:password siteclc.org
thorization password 100 oclc.org
allinurl:password site:hwwilsonweb.com
allinurl:itweb id site:infotrac.galegroup.com
allinurl:groups site:mdconsult.com
inurl:user password site:mdconsult.com
allinurlvidweb.cgi?QS= sitevid.com
library +username +password proquest welcome
cert= + umi.com
allinurl:passwd -ipauto site:umi.com
inurl:epnet inurl:password=password
inurl:password= inurl:lib│inurl:library -net -com -org -nl -co.uk
allinurl:itweb id site:infotrac.galegroup.com
allinurl:passwd -IPAUTO inurl:welcome site:umi.com
allinurl:password site:hwwilsonweb.com
Article.asp?ContributionID
inurl:access.web-sci.com
science│medicine│biology inurl:forum inurl:asp?id=│inurl:aspx?id=│
inurl:cfm?id=
intitle:publisher inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id=
inurl:press inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id=
inurl:fulltext inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id=
inurl:sci inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id=
netid filetype:pdf site:msstate.edu;netid filetype:xls site:msstate.edu
Personal ID number site:emory.edu
ID number filetype:xls site:emory.edu
"ID number" grade site:emory.edu
ID number filetype:pdf site:emory.edu
allinurl:password user site:epnet.com
intitle:"EBSCO Publishing Service Selection Page"
allinurl:cert= site:umi.com
+library +username +password proquest welcome
inurl:8080 inurl:login
allinurl:ezproxy edu login
allinurl:login +edu ezproxy OR proxy
allinurl: login ezproxy OR proxy OR lib OR library OR 2048
site:×××.edu numrange:100000000..100999999
password=password&& site:epnet.com
htpasswrd
.passwd
.passwrd
ASPSamp/AdvWorks/equipment/catalog_type.asp
AdvWorks/equipment/catalog_type.asp
_AuthChangeUrl?
__vti_inf.html
_vti_pvt/administrators.pwd
_vti_pvt/authors.pwd
_vti_pvt/service.pwd
_vti_pvt/shtml.dll
_vti_pvt/shtml.exe
_vti_pvt/users.pwd
carbo.dll
ccbill
ccbill/ccbill-.cgi
cfdocs/expelval/displayopenedfile.cfm
cfdocs/expelval/exprcalc.cfm
cfdocs/expelval/openfile.cfm
cfdocs/expelval/sendmail.cfm
cgi-bin/add_user.cgi
cgi-bin/admin.cgi
cgi-bin/aglimpse
cgi-bin/AnyForm2
cgi-bin/AT-admin.cgi
cgi-bin/auth.cgi
cgi-bin/bnbform.cgi
cgi-bin/campas
cgi-bin/cgiwrap
cgi-bin/classifieds.cgi
cgi-bin/count.cgi
cgi-bin/Count.cgi
cgi-bin/day5datacopier.cgi
cgi-bin/day5datanotifier.cgi
cgi-bin/dumpenv.pl
cgi-bin/edit.pl
cgi-bin/environ.cgi
cgi-bin/faxsurvey
cgi-bin/filemail.pl
cgi-bin/files.pl
cgi-bin/finger
cgi-bin/finger?@host
cgi-bin/finger?@localhost
cgi-bin/formmail.pl
cgi-bin/glimpse
"Index of /admin"
"Index of /password"
"Index of /mail"
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
administrators.pwd.index
authors.pwd.index
service.pwd.index
filetype:config web
gobal.asax index
allintitle: "index of/admin"
allintitle: "index of/root"
allintitle: sensitive filetype oc
allintitle: restricted filetype :mail
allintitle: restricted filetype oc site:gov
for IIS server exlpoit
allinurl: winnt/system32/
and u'll get many IIS server exploits
intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
inurl:access.web-sci.com
password intitle:"Ejournal Information Page"
"# -FrontPage-" inurl:service.pwd
"AutoCreate=TRUE password=*"
"http://*:*@www" domainname
"index of/" "ws_ftp.ini" "parent directory"
allinurl: admin mdb
auth_user_file.txt
config.php
eggdrop filetype:user user
etc (index.of)