<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" 
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:meneame="http://meneame.net/faq-es.php"
 >
<channel>
	<title>Menéame: comentarios [43557]</title>
	<link>http://www.meneame.net</link>
	<image><title>www.meneame.net</title><link>http://www.meneame.net</link><url>http://cdn.mnmstatic.net/img/mnm/eli-rss.png</url></image>
	<description>Sitio colaborativo de publicación y comunicación entre blogs</description>
	<pubDate>Tue, 10 Oct 2006 16:04:20 +0000</pubDate>
	<generator>http://blog.meneame.net/</generator>
	<language>es</language>
	<item>
		<meneame:comment_id>178287</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>8</meneame:order>
		<meneame:user>namikata</meneame:user>
		<meneame:votes>1</meneame:votes>
		<meneame:karma>13</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#8 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c08#c-8</link>
		<pubDate>Tue, 10 Oct 2006 16:04:20 +0000</pubDate>
		<dc:creator>namikata</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c08#c-8</guid>
		<description><![CDATA[<p>cambiemos el titular:<br />
<br />
&#34;Despistados, incapaces e ignorantes dejan sus datos en internet para quien los quiera buscar. La cena esta servida, sirvase usted mismo.&#34;<br />
<br />
<img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/lol.gif" alt="xD" title=":lol: xD" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>namikata</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>178026</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>7</meneame:order>
		<meneame:user>kNo</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>6</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#7 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c07#c-7</link>
		<pubDate>Tue, 10 Oct 2006 12:43:20 +0000</pubDate>
		<dc:creator>kNo</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c07#c-7</guid>
		<description><![CDATA[<p><a class="tooltip c:43557-1" href="https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c01#c-1" rel="nofollow">#1</a> Son las contraseñas por defecto que vienen en la distribución de algunos programas (al menos la primera página). Tipo user/pass, test/toto etc. No creo que encuentres así muchas contraseñas reales de nada (salvo para el necio que no la haya configurado durante la instalación).</p><p>&#187;&nbsp;autor: <strong>kNo</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>177774</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>6</meneame:order>
		<meneame:user>madelgado</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>6</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#6 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c06#c-6</link>
		<pubDate>Tue, 10 Oct 2006 08:59:47 +0000</pubDate>
		<dc:creator>madelgado</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c06#c-6</guid>
		<description><![CDATA[<p>Mejor, así tomamos consciencia y hacemos código mas seguro.</p><p>&#187;&nbsp;autor: <strong>madelgado</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>177678</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>5</meneame:order>
		<meneame:user>Hass</meneame:user>
		<meneame:votes>1</meneame:votes>
		<meneame:karma>13</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#5 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c05#c-5</link>
		<pubDate>Tue, 10 Oct 2006 06:37:40 +0000</pubDate>
		<dc:creator>Hass</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c05#c-5</guid>
		<description><![CDATA[<p>Crackers, no hackers... bueno casi es mejor dejarlo, es una batalla perdida <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/undecided.png" alt=":-/" title=":-/ :/" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>Hass</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>177667</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>4</meneame:order>
		<meneame:user>acastro</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>8</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#4 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c04#c-4</link>
		<pubDate>Tue, 10 Oct 2006 06:16:47 +0000</pubDate>
		<dc:creator>acastro</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c04#c-4</guid>
		<description><![CDATA[<p>El problema no lo provoca Google Code Search como parece dar a entender la noticia.</p><p>&#187;&nbsp;autor: <strong>acastro</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>177660</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>3</meneame:order>
		<meneame:user>Ironic</meneame:user>
		<meneame:votes>1</meneame:votes>
		<meneame:karma>0</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#3 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c03#c-3</link>
		<pubDate>Tue, 10 Oct 2006 05:50:19 +0000</pubDate>
		<dc:creator>Ironic</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c03#c-3</guid>
		<description><![CDATA[<p>es open source gente... es sucede por hardcodear el codigo... <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/confused.png" alt=":-S" title=":-S :S" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>Ironic</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>177591</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>2</meneame:order>
		<meneame:user>--5404--</meneame:user>
		<meneame:votes>3</meneame:votes>
		<meneame:karma>26</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#2 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c02#c-2</link>
		<pubDate>Tue, 10 Oct 2006 01:20:57 +0000</pubDate>
		<dc:creator>--5404--</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c02#c-2</guid>
		<description><![CDATA[<p>Eso es como decir que la culpa de que te roben la casa si dejas la puerta abierta es del ayuntamiento por poner farolas en las calles.<br />
<br />
Puestos a decir bobadas los que han puesto la mejor herramienta en manos de los hackers son los fabricantes de teclados  <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/lol.gif" alt="xD" title=":lol: xD" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>--5404--</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>177555</meneame:comment_id>
		<meneame:link_id>43557</meneame:link_id>
		<meneame:order>1</meneame:order>
		<meneame:user>tomasulo</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>6</meneame:karma>
		<meneame:url>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos</meneame:url>
		<title>#1 Los hacker utilizan Google Code Search para sus objetivos</title>
		<link>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c01#c-1</link>
		<pubDate>Mon, 09 Oct 2006 23:31:21 +0000</pubDate>
		<dc:creator>tomasulo</dc:creator>
		<guid>https://www.meneame.net/story/hacker-utilizan-google-code-search-para-objetivos/c01#c-1</guid>
		<description><![CDATA[<p>solo con esta busqueda aparecen más de 8000 contraseñas<br />
<br />
<a href="http://www.google.com/codesearch?lr=&#38;q=DB_USER+DB_PASSWORD" title="www.google.com/codesearch?lr=&#38;q=DB_USER+DB_PASSWORD" rel="nofollow">www.google.com/codesearch?lr=&#38;q=DB_USER+DB_PASSWORD</a><br />
<br />
y la gente continua siendo muy torpe a la hora de poner contraseñas,<br />
<br />
la culpa no es de google, sino de la gente que deja accesible codigos con informacion critica, o que se copia codigos si saber lo que copia.</p><p>&#187;&nbsp;autor: <strong>tomasulo</strong></p>]]></description>
	</item>

</channel>
</rss>
