lou1984 |
2010-04-05 21:29 |
现在很多国外高校都有校外入口,通过校外入口可以轻松搞定很多文献资源
关键是校外入口都是需要密*****的,一般校外入口常用的就是ezproxy了,通过
这样的代理,校外的工作人员和学生就可以方便使用图书馆的资源了
因此国内很多论坛都提供这样的东西,那么如何通过百度和google搜索最好用的资源呢
下面告诉你关键词:ezproxy password bbs
为什么是这几个呢 下面解释一下
我们要搜索ezproxy的密*****
所以需要关键词ezproxy password
我们需要在论坛查找,所以需要加上 bbs
最后关键词定为:ezproxy password bbs
整理的google检索词
intitle:"index of" passwd
allinurl:cpidlogin site:epnet.com
allinurl:password user site:epnet.com
intitle:"EBSCO Publishing Service Selection Page
allinurl:password siteclc.org
thorization password 100 oclc.org
allinurl:password site:hwwilsonweb.com
allinurl:itweb id site:infotrac.galegroup.com
allinurl:groups site:mdconsult.com
inurl:user password site:mdconsult.com
allinurlvidweb.cgi?QS= sitevid.com
library +username +password proquest welcome
cert= + umi.com
allinurl:passwd -ipauto site:umi.com
inurl:epnet inurl:password=password
inurl:password= inurl:lib│inurl:library -net -com -org -nl -co.uk
allinurl:itweb id site:infotrac.galegroup.com
allinurl:passwd -IPAUTO inurl:welcome site:umi.com
allinurl:password site:hwwilsonweb.com
Article.asp?ContributionID
inurl:access.web-sci.com
science│medicine│biology inurl:forum inurl:asp?id=│inurl:aspx?id=│
inurl:cfm?id=
intitle:publisher inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id= inurl:press inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id= inurl:fulltext inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id= inurl:sci inurl:asp?id=│inurl:aspx?id=│inurl:cfm?id= netid filetype:pdf site:msstate.edu;netid filetype:xls site:msstate.edu Personal ID number site:emory.edu ID number filetype:xls site:emory.edu "ID number" grade site:emory.edu ID number filetype:pdf site:emory.edu
allinurl:password user site:epnet.com intitle:"EBSCO Publishing Service Selection Page" allinurl:cert= site:umi.com +library +username +password proquest welcome inurl:8080 inurl:login
allinurl:ezproxy edu login allinurl:login +edu ezproxy OR proxy allinurl: login ezproxy OR proxy OR lib OR library OR 2048
site:×××.edu numrange:100000000..100999999
password=password&& site:epnet.com
htpasswrd .passwd .passwrd ASPSamp/AdvWorks/equipment/catalog_type.asp AdvWorks/equipment/catalog_type.asp _AuthChangeUrl? __vti_inf.html _vti_pvt/administrators.pwd _vti_pvt/authors.pwd _vti_pvt/service.pwd _vti_pvt/shtml.dll _vti_pvt/shtml.exe _vti_pvt/users.pwd carbo.dll ccbill ccbill/ccbill-.cgi cfdocs/expelval/displayopenedfile.cfm cfdocs/expelval/exprcalc.cfm cfdocs/expelval/openfile.cfm cfdocs/expelval/sendmail.cfm cgi-bin/add_user.cgi cgi-bin/admin.cgi cgi-bin/aglimpse cgi-bin/AnyForm2 cgi-bin/AT-admin.cgi cgi-bin/auth.cgi cgi-bin/bnbform.cgi cgi-bin/campas cgi-bin/cgiwrap cgi-bin/classifieds.cgi cgi-bin/count.cgi cgi-bin/Count.cgi cgi-bin/day5datacopier.cgi cgi-bin/day5datanotifier.cgi cgi-bin/dumpenv.pl cgi-bin/edit.pl cgi-bin/environ.cgi cgi-bin/faxsurvey cgi-bin/filemail.pl cgi-bin/files.pl cgi-bin/finger cgi-bin/finger?@host cgi-bin/finger?@localhost cgi-bin/formmail.pl cgi-bin/glimpse "Index of /admin" "Index of /password" "Index of /mail" "Index of /" +passwd "Index of /" +password.txt "Index of /" +.htaccess index of ftp +.mdb allinurl:/cgi-bin/ +mailto administrators.pwd.index authors.pwd.index service.pwd.index filetype:config web gobal.asax index allintitle: "index of/admin" allintitle: "index of/root" allintitle: sensitive filetype oc allintitle: restricted filetype :mail allintitle: restricted filetype oc site:gov for IIS server exlpoit allinurl: winnt/system32/ and u'll get many IIS server exploits intitle:"Index of" .sh_history intitle:"Index of" .bash_history
inurl:access.web-sci.com password intitle:"Ejournal Information Page" "# -FrontPage-" inurl:service.pwd "AutoCreate=TRUE password=*" "http://*:*@www" domainname "index of/" "ws_ftp.ini" "parent directory" allinurl: admin mdb auth_user_file.txt config.php eggdrop filetype:user user etc (index.of)
|
|