Book Image

An Ethical Guide to Cyber Anonymity

By : Kushantha Gunawardana
Book Image

An Ethical Guide to Cyber Anonymity

By: Kushantha Gunawardana

Overview of this book

As the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web. You will start the book by understanding what anonymity is and why it is important. After understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you’ll learn how to configure tools and understand the architectural components of cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking relevant precautions. By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity.
Table of Contents (16 chapters)
Part 1: The Basics of Privacy and Cyber Anonymity
Part 2: Methods and Artifacts That Attackers and Competitors Can Collect from You
Part 3: Concepts and Maintaining Cyber Anonymity

Google Advanced Search and dorks

Google is the most popular search engine, capable of searching through the searchable portion of the internet and providing accurate and most relevant results much faster than other search engines. Google frequently crawls through all the websites in the world and keeps cached copies of the web pages in Google Cache. Then, Google indexes all the web pages according to the keywords. The results we derive from a Google search are not something Google has searched on the go but have been searched and indexed even before you execute your own search. That’s the reason Google suggests you use keywords whenever you start typing a query on Google search.


There are ways that we can use the hidden capabilities of Google by employing special syntaxes, which are known as Google dorks, or as Google hacking. Attackers use Google dorks to gather information from the internet using Google Search capabilities.

As an example, let us check what Google...