Google Dorking Commands 101 - The Dark Web | Uncensored Hidden Darknet Gateway (2022)

  • The Reason for Dorking
  • Dorking in a Nutshell
  • Dorking for Beginners
    • Example 1: Prying into Budgets on the US Homeland Security Site
    • Example 2: House Prices in London
    • Example 3: Looking for the Indian government’s security plans
    • Dork It Yourself
    • Dork the Duck
    • Other Search Engines That Take Privacy in Account
    • Dork for Defense
    • Uncovering Security Issues
    • Looking for sensitive information

Google dorking has become a synonym of ethical hacking that can be learned by pretty much any user of the World Wide Web. Even though the term focuses on Google, there are quite a few dorking commands that work in other search engines, as well.

When researching, you often require to gather as much details as feasible concerning a subject. Advanced search techniques can aid to discover data or leads that are relevant to the concerns you are trying to answer. As an example you might be able to discover a company’s income tax return or a city government’s expense reports, details that might not show up on their web sites or appear when you do a routine web search.

Google dorking (also referred to as Google hacking) is a strategy used by newsrooms, investigatory reporting organizations, safety auditors as well as tech wise crooks to query online search engine in order to locate covert details that might be available on public internet sites or to identify evidence of electronic protection susceptabilities. This method can be made use of on the majority of online search engine, not just Google’s, so we typically refer to it simply as “dorking.”.

Dorking involves making use of search engines to their complete potential to uncover outcomes that are not noticeable with a routine search. It enables you to refine your searches and dive deeper, and with better accuracy, right into web pages as well as files that are available online. Revealing covert documents and safety and security defects by dorking does not require a good deal of technical knowledge. It actually comes down to discovering just a few search strategies and using them across a variety of online search engine.

All you require to execute a Google dork is a computer, a net link and a basic understanding of the suitable search syntax: search phrases and symbols (in some cases called “operators” or “filters”) that you can make use of to fine-tune your search results page. To do so successfully, nonetheless, you may likewise require perseverance, creative thinking, patience as well as good luck.

The Reason for Dorking

By unleashing the full power of online search engine, dorking can reveal info on websites as well as vulnerabilities within them. This may include details that was meant to remain in a password-protected folder however that ended up elsewhere. Or, it may consist of a configuration manuscript for a content monitoring system (CMS) that still has the capability to carry out management features like adding users as well as changing passwords.

Dorking can reinforce your examinations by increasing your access to info that is of public interest however that is not, whether deliberately or by accident, readily available via online search engine. It can additionally aid you locate electronic safety problems in your very own on the internet solutions and magazine platforms.

If you decide to proceed with an examination that entails Google dorking, the complying with techniques will certainly help you get going as well as offer a contrast of sustained dorks throughout numerous search engines.

Dorking in a Nutshell

In everyday usage, internet search engine like Google, Bing, DuckDuckGo and Yahoo accept a search term (a word), or a string of search terms, and return matching results. But a lot of search engines are programmed to approve advanced “filters” or “prefix drivers” too. A filter is a keyword phrase or expression that has particular significance for the search engine. This consists of terms like:





(Video) Find Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]


At the end of the day, whether you call it something pompous (like “advanced online search engine query phrase structure”) or something silly, a dork is simply a search that counts on these as well as other special keywords to acquire more significant results. Those results might include details strings of text from the body of a web site, for instance, or data organized at a specific web address.

Not all “sophisticated” search methods depend on prefix filters like those shown above. Adding quote marks (“all evening pharmacies in Budapest”, for example) tells most internet search engine to match an exact expression. Positioning an all-caps OR in between search terms (like drug stores OR pharmacies in Budapest) informs the internet search engine to return outcomes with either term.

The following is an easy instance of a dork that does rely upon a prefix driver. It will search for all indexed PDF documents hosted on that particular domain. filetype:pdf

Another example, which returns all web sites under the domain that have words “invisible” in their titles, may look like this: intitle:invisible

If you require to utilize a search term that contains numerous words, you can border them with quote marks: intext:exposing intitle:”the invisible”

Dorks can also be paired with a general search term. For instance:

exposing, or

exposing filetype:pdf

Right here, ‘exposing’ is the basic search term, as well as the filters website: as well as filetype: narrow down the outcomes.

Dorking for Beginners

There are various dorking drivers, and they differ throughout online search engine. To offer you a basic idea of what can be located, we have actually included 4 examples of dorks below. Even if two search engines sustain the exact same drivers, they typically return various results.

Repeating these searches throughout different internet search engine is an excellent way to get a sense of those differences. For a quick comparative referral, see the dorking operators utilized by Google, DuckDuckGo, Yahoo as well as Bing in the table listed below.

Example 1: Prying into Budgets on the US Homeland Security Site

This dork will bring you all public, indexed Excel spread sheets which contain words ‘budget plan’:

(Video) Google HACKING (use google search to HACK!)

budget filetype:xls

The ‘filetype:’ operator does not automatically identify different versions of similar data layouts (i.e. doc vs. odt or xlsx vs. csv), so each of these layouts should be dorked independently:

budget filetype:xlsx OR filetype:csv

This dork will return PDF files on the NASA site: filetype:pdf

And this dork will certainly return.xlsx spread sheets consisting of words ‘spending plan’ on the United States Department of Homeland Security internet site:

budget filetype:xls

That last inquiry, executed across numerous internet search engine, will certainly return various outcomes.

Example 2: House Prices in London

Another intriguing example checks out real estate prices in London:

filetype:xls “house prices” AND “London”

Example 3: Looking for the Indian government’s security plans

For our last example we will find files having the words ‘protection plan’ on Indian federal government sites:

filetype:doc “security plan”

With any luck, after examining these instances out, you can think about a couple of web sites you wish to search making use of similar strategies.

Dork It Yourself

To look for sensitive information, we recommend starting with the following simple commands, along with the filter. You can then remove the site:filter to discover which other websites might be exposing information about you or your organization. Below are a few examples.

Table: Dorking operators that work with Google, DuckDuckGo, Yahoo and Bing

DorkWhat it does
cache:[url]Shows the version of the website from the internet search engine’s cache.
related:[url]Finds websites that are similar to the defined web page.
info:[url]Offers some info that Google has concerning a web page, consisting of similar pages, the cached version of the page, and sites connecting to the page.
site:[url]Finds web pages just within a specific domain name and all its subdomains.
intitle:[text] or allintitle:[text]Discovers web pages that include a particular search phrase as part of the indexed title tag. You must add a space between the colon and the question for the driver to work in Bing.
allinurl:[text]Discovers pages that include a specific keyword as part of their indexed URLs.
meta:[text]Locates pages that contain the certain search phrase in the meta tags.
filetype:[file extension]Look for details data kinds.
intext:[text], allintext:[text], inbody:[text]Searches text of page. For Bing and Yahoo the inquiry is inbody: [text] For DuckDuckGo the inquiry is intext: [message] For Google either intext: [text] or allintext: [message] can be utilized.
inanchor:[text]Browse web link support text.
location:[iso code] or loc:[iso code], region:[region code]Look for particular region. For Bing utilize area: [iso code] or loc: [iso code] as well as for DuckDuckGo use region: [iso code] An ISO code is a brief code for a nation for example, Egypt is EG as well as U.S.A. is US.
contains:[text]Determines websites that contain links to filetypes specified (i.e. contains: pdf).
altloc:[iso code]Look for location along with one defined by language of site (i.e. pt-us or en-us).
feed:[feed type, i.e. rss]Locates RSS feed related to search term.
hasfeed:[url]Locates web pages which contain both the term or terms for which you are quizzing as well as one or more RSS or Atom feeds.
ip:[ip address]Find websites organized by a certain IP address.
language:[language code]Returns sites that match the search term in a defined language.
book:[title]Look for book titles related to keywords.
maps:[location]Searches for maps related to keyword phrases.
linkfromdomain:[url]Shows websites whose web links are mentioned in the defined link (with errors).

Dork the Duck

We consisted of one of the most commonly utilized online search engine in the analysis over, yet our preferred service is DuckDuckGo, which is a privacy-focused online search engine that asserts not to collect personal details regarding its individuals and that conserves search inquiries as if they can not be credited to particular users.

(Video) HakByte: How to find anything on the internet with Google Dorks

That said, if you are doing sensitive research, it still makes sense to make use of the Tor Browser, in mix DuckDuckGo, to further safeguard your personal privacy. And the good news is, DuckDuckGo is a lot less likely than Google to block Tor users or make them resolve CAPTCHAs.

DuckDuckGo likewise has an useful function called “bang,” which enables you to query other search engines without leaving the DuckDuckGo website. To do so, you start your search with an exclamation mark followed by a qualifier, which is usually an acronym for a particular search carrier. Note that if DuckDuckGo is your browser’s default search engine, you can use bangs in your address bar too.

For example, starting your search with the! w bang permits you to search Wikipedia directly, while! twitter, followed by your search terms, will certainly return relevant twitter messages. You can locate countless bang shortcuts below:

Mean you intended to lookup the Wikipedia access for ‘dorking’. The complying with query will take you to Wikipedia’s online search engine:

!w dorking

And, because it’s a specific suit, you will end up on the ‘dorking’ Wikipedia entry itself, however, with a different meaning than ours.

Other Search Engines That Take Privacy in Account

For general searching, we likewise recommend StartPage which is an internet search engine that returns Google results using a privacy filter that lowers the quantity of individual details that Google can collect about your searches.

As important as it is to utilize privacy-aware search engines in your daily surfing, the Tor Internet browser should provide sufficient security to allow you dork across various other online search engine when required.

Dork for Defense

You can use dorking to safeguard your very own information and to defend web sites for which you are liable. We call this “protective dorking,” as well as it usually takes a couple of kinds:

  • Checking for protection susceptabilities in an on-line solution, such as an internet site or an FTP web server, that you carry out; or.
  • Looking for delicate information concerning yourself – or about somebody else, with their authorization – that may be exposed inadvertently on a web site, regardless of whether or not you provide that internet site.

This suggestion is mostly interested in the last sort of dorking however we will certainly initially introduce a database that might aid you or your solution managers with the former.

Uncovering Security Issues

The Google Hacking Database (GHDB) recommends various keyword phrases and other terms that you can make use of – along with the website: filter in order to determine particular vulnerabilities.

While these searches may assist enemies locate at risk services, they likewise aid administrators secure their very own. We recommend that you collaborate with the technological administrator of the service you want to test (unless of course that’s you) before attempting them out.

Looking for sensitive information

To try to find sensitive details, we suggest starting with the following simple commands, in addition to the website: filter. You can then get rid of the website: filter to find which other sites may be revealing info about you or your organization. Below are a few examples.

You can search for your name in PDF records with:

<your name> filetype:pdf

You can duplicate this search with other possibly pertinent filetypes, such as xls, xlsx, doc, docx, ods or odt. You can even look for a number of different data enters one search:

(Video) This is How Hackers Crack Passwords!

<your name> filetype:pdf OR filetype:xlsx OR filetype:docx

Or you can search for your name in normal internet site web content with something like the following. (See the table above for info about whether your internet search engine of selection uses intext: or inbody: as the text-searching filter.)

<your name> intext:”<personal information like a phone number or address>“

You can likewise look for details related to the IP address of your web servers:

ip:[your server’s IP address] filetype:pdf

If you’re not running a lot of sites, scanning via a number of pages of results must suffice to provide you a suggestion of what’s publicly offered. Nonetheless, you can fine-tune this with keywords as well as other terms extracted from the Google Hacking Databases.

To reinforce this defense, try a few of the harmful attacks in the Google Hacking Databases (GHDB) on your own websites and IP addresses. Numerous versions of the GHDB can be found here (the original), right here (the initial “reborn”), right here, as well as right here. Keep in mind that these databases include search operators in addition to search terms. While they might aid assaulters situate vulnerable internet sites, they additionally assist administrators secure their own.

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Google Dorks is a search string that leverages advanced search operators to find information that isn’t readily available on a particular website.. We have curated this Google Dorks cheat sheet to help you understand how different Google Dorking commands work.. Google Dorking, also known as Google hacking , is the method capable of returning the information difficult to locate through simple search queries by providing a search string that uses advanced search operators.. This Google hacking cheat sheet will help you carry out Google Dorking commands and access hidden information.. If you find any exposed information, just remove them from search results with the help of the Google Search Console.. allinurl: provide URL containing all the specified characters, e.g: allinurl:pingpong filetype: to get information related to file extensions, for example, looking for specifically pdf files, use- email security filetype: pdf intitle: will provide information related to keywords within the title, for example, intitle:dorking tools.

Google hacking, sometimes, referred to as Google Dorking, is an information-gathering technique used by an attacker leveraging advanced Google searching techniques.. Google hacking search queries can be used to identify security vulnerabilities in web applications, gather information for arbitrary or individual targets, discover error messages disclosing sensitive information, discover files containing credentials and other sensitive data.. The following list of queries can be run to find a list of files, find information about your competition, track people, get information about SEO backlinks, build email lists, and of course, discover web vulnerabilities.. cache : this dork will show you the cached version of any website, e.g. allintext : searches for specific text contained on any web page, e.g. allintext: hacking tools allintitle : the same as allintext, but will show pages that contain titles with X characters, e.g. allintitle:"Security Companies" allinurl : it can be used to fetch results whose URL contains all the specified characters, e.g: allinurl:clientarea filetype : used to search for any kind of file extensions, for example, if you want to search for pdf files you can use: email security filetype: pdf inurl : this is the same as allinurl , but it is only useful for one single keyword, e.g. inurl:admin intitle : used to search for various keywords inside the title, for example, intitle:security tools will search for titles beginning with “security” but “tools” can be somewhere else on the page.. inanchor : this is useful when you need to search for an exact anchor text used on any links, e.g. inanchor:"cyber security" intext : useful to locate pages that contain certain characters or strings inside their text, e.g. intext:"safe internet" site : will show you the full list of all indexed URLs for the specified domain and subdomain, e.g. * : wildcard used to search pages that contain “anything” before your word, e.g. how to * a website , will return “how to…” design/create/hack, etc… “a website”.. + : used to concatenate words, useful to detect pages that use more than one specific key, e.g. security + trails – : minus operator is used to avoiding showing results that contain certain words, e.g. security -trails will show pages that use “security” in their text, but not those that have the word “trails.”. The following Google Dork can be used to detect vulnerable or hacked servers that allow appending “/proc/self/CWD/” directly to the URL of your website.. With the following dork, you’ll be able to find SSH private keys that were indexed by uncle Google.. It’s pretty easy to find email lists using Google Dorks.. Google dorks can also be used to find web applications hosting important enterprise data (via JIRA or Kibana).. You can find a great list of popular dorks at the Exploit DB Dorks database .. Google Hacking isn’t just a fantastic way to find and view website pages without being presented to the targeted frameworks, but it’s also a legitimate method of revealing data in a typical Information Gathering period of an assault.

Dark web, deep web, clear web – just words or more?. Well, in seeing just how many of you are interested in hearing all about the dark wonders of the internet, I’ve decided to make this small dark web guide.. Now, before we dig into it, we’ll need to stage a little show-and-tell about the differences between the deep web, dark web, and clear net.. Well, if the clear web is Google’s BFF and the deep web, its secret lover, then the dark web can only be the evil twin or the oddball.. VPN services are a must when you’re attempting to access the dark web.. The two of them (Tor and VPN) work in tandem and, as it happens, there are several ways of tunneling your way all the way through the dark web using this dynamic duo.. Although content on the dark web is not as ‘indexed’ compared to the one on the clear web, you can still use search engines to find stuff.. Think of the Hidden Wiki as Wikipedia’s evil twin – looks more or less the same, but contains links to various dark web categories: editor’s picks, volunteer, introduction points, financial services, commercial services, email\messaging, drugs (yes, it’s the real deal), blogs & essays, hosting providers, hacking services, darknet radio (nothing shady about that; just some weird electronic tunes and, occasionally, a bit of jazz), literature (mostly resources on hacking, both ethical and black hat).. There are several email and IM services which you can use, and it’s highly recommended to pick one if you want to step up your dark web game.

Dark Lair allows you to post comments, share music, upload photos, message your dark web ‘friends’, and everything in between.. Absolutely nothing; Deep Web Radio is all about tunes and enriching your dark web experience.. Hidden Answers is the dark web version of Reddit or Quora and, in essence, works just like its clear web peers.. Before Hidden Wiki is Daniel, a ‘dark web websites’ aggregator that can help you navigate the onion maze.. Daniel regularly crawls the dark web searching for new websites or checking the status(es) of other websites.. Here are some things to keep in mind while browsing your favorite dark web websites.. I advise you to stick to these websites while browsing the dark web.. Here are the best 15 best dark web websites you should check out.

The deep web and dark web are often confused terms.. Yes, there is nothing inherently illegal about accessing the deep web.. What Is a Deep Web Search?. Although the deep web functions by hiding itself from regular search engines, there are still ways to search for sites located on it.. If your website is only accessible through the deep net, tracking down the physical location of your servers is much harder than it would be for a regular website.. This means that if you want to access a site on the deep net, you need to know the specific web address beforehand or use a dedicated deep web search engine, as traditional ones like Google won’t be able to help you.. For example, one of the most common ways to access both the deep web and the dark web is through Tor .. The most common way to access the dark web or deep web is by using the Tor network, and doing so is not nearly as complicated as you might think.

Many times, people confuse the deep web and the dark web as being one and the same, but there are differences between the two.. When you compare the deep web with the dark web, it is a pretty safe place.. This is the other side of the coin, and probably what most people think about when they hear of the terms dark web and deep web, but the two are distinctively different.. While the deep web contains usually digitized records and harmless data, the dark web is usually crawling with a lot of criminal activity.. Visit NordVPN This is the browser that initially opened the gates for dark web browsing, allowing users both high security and anonymity when using the deep and dark web.. Make sure to use safe deep web browsers and dark web browsers, as well as a VPN to remain completely safe when surfing the dark web.

Hackers exploit power search to find critical information about you, be it your card information or seeing you in real time!. The practice of applying specialised search methods and advanced search engine parameters to locate confidential information is typically termed as Google Dorking.. Simultaneously, hackers can use Google Dorking tactics to reveal data that companies and individuals do not wish to make available through a web search.. Hacking Security Cameras:. Hackers can actually gain full control of a security camera using this method.. Last year’s Miss Teen USA Cassidy Wolf’s webcam was hacked by hackers using Remote Administration Tool.. Hacking Vulnerable Websites:. Advanced search filters can be used to hack vulnerable Wi-Fi networks.. The dorks used to hack routers can be: inurl:”cgi-bin” “No password set!” “ There is no password set on this router.” intitle:”router”inurl:”home.asp”. In 2014, the cyber world was petrified when a website was reported to have collected the streaming footage from over 73,000 IP cameras whose owners did not chang their default passwords.. Insecam – “the world’s biggest directory of online surveillance security cameras” as they describe themselves, claimed to feature feeds from IP cameras all over the world.

Learning how to access the dark web isn't as clandestine and illegal as it's often portrayed.. It's a free-to-use web browser based on Firefox that lets you access the dark web relatively safely.. Step 2: If you're using the dark web, you probably don't want your activity monitored — privacy is a core component of the Tor browser and the dark web itself.. Step 3: Now you can launch the Tor browser and start exploring the dark web.. In principle, the dark web is just a version of the internet that you can only access using a Tor browser and where it's almost impossible to identify the users and owners of the websites on there.. If you exercise due caution and use a combination of the Tor browser and common sense in which sites you access on the dark web, yes, the dark web is safe to use.. However, if you go poking around in illegal sites and services or don't practice good operational security by offering up personal information or trying to perform illegal activities, it very much isn't safe.. If you want to be extra safe, routing your connection through a VPN and then accessing the dark web using the Tor browser provides more security than Tor alone.. If you're just browsing the dark web out of curiosity, Tor, or a Tor and VPN configuration is safe enough.

Most of these pages are kept hidden from the open web to protect user information and privacy, such as:. Tor websites are located at this far end of the deep web, which are deemed the “dark web” and are only accessible by an anonymous browser.. Deep web safety is more relevant to the average internet user than dark web safety, as you could end up in dangerous areas by accident: many portions of the deep web can still be accessed in normal internet browsers.. Before we unpack the dark web’s threats, let’s explore how and why users access these sites.. However, you can still take illegal actions within Tor that could incriminate you regardless of the browser’s legality.. Using a legal browser will not make your actions fall to the right side of the law.. So, what is the dark web used for when it’s used for illegal activity?. Many online security services now offer identity protection for your safety.

Dark web websites are often associated with illegal activity — but not all of them.. Accessing content on the deep web is relatively safe.. But that doesn’t mean that accessing that personal information has no risks.. For instance, your accounts on the deep web contain a lot of your personal information that criminals might value.. Regular browsers can’t access dark web websites.. For instance, here’s a sample of illegal things you can find on the dark web.. Law enforcement officials operate on the dark web to catch people engaged in criminal activity.. There are such things as dark web search engines.. Don’t use your regular email on websites when using Tor.. Anytime you’re in the company of illegal drugs, illegal content, and other sordid online activities, you could risk landing in legal trouble.. Almost every time you search internally on a website, you’re accessing deep web content.. That’s a good thing.

Those who hold an online cyber security master’s degree understand the dark web as an enormous source of hacking knowledge and software.. Studying hacking forums on the deep web equips professional penetration testers, security analysts and software developers with the cyber security information they need to perform their responsibilities.. Developed to help anonymize government intelligence communications, the dark web takes advantage of network routing capabilities designed initially to protect intelligence data online via the use of special equipment and programs.. “Tor, which stands for ‘onion router’ or ‘onion routing,’ is designed primarily to keep users anonymous,” the security software company Radware explains in “Understanding the Darknet and Its Impact on Cyber Security” in Security Boulevard.. Security writer Matias Porolli lists these services in “Cybercrime Black Markets: Dark Web Services and Their Prices” on WeLiveSecurity:. Ransomware as a service — Preconfigured ransomware sold on a monthly or annual basis Selling access to servers — Remote desktop protocol (RDP) credentials sold per server through a customizable search service Renting infrastructure — Computing resources leased for botnets and denial-of-service attacks that require massive processing power Selling PayPal and credit card accounts — Account access credentials sold to cyber criminals for a fraction of the available balance on each account. In “The Truth about the Dark Web” for the International Monetary Fund, international affairs authorities Aditi Kumar and Eric Rosenbach write, “For individuals living under oppressive regimes that block large parts of the internet or punish political dissent, the dark web is a lifeline that provides access to information and protection from persecution.. For cyber security personnel, especially those who deal directly with protecting sensitive systems against cyber attacks, understanding the dark web can help them study the ways of the enemy, so to speak.. Dark web cyber threat intelligence mining is the process by which the more inaccessible corners of the internet are scoured for actionable intelligence to strengthen cyber security.. In SecurityIntelligence’s “7 Ways to Identify Darknet Cyber Security Risks,” tech writer Jasmine Henry points out that dark web-based emerging threats and vulnerabilities can be analyzed to protect against threats before they can strike.. Invaluable cyber threat information can be gleaned from the dark web in several ways.. AI algorithms can scour the onion sites in search of usable data while skilled cyber security researchers inject themselves into the realm of hackers and learn from their opponents’ dark web activities.. Through the dark web, however, cyber security professionals can research their ways and learn how to counter their moves before they can launch their attack.. The University of North Dakota’s online Master of Science in Cyber Security degree program offers this type of forward-thinking preparation for leadership roles in cyber security.. Students complete three certificate tracks to earn their master’s degree, including the mandatory Cyber Security Analyst track as well as two of the following: Ethical Hacking, Computer Forensics or Secure Networks.


1. Watch How Hackers Checkout Products For Free On Any Website And Learn To Defend Against Hackers!
(Loi Liang Yang)
2. find info on phone numbers with PhoneInfoga
3. Website Hacking in 6 Minutes
(Tech Raj)
4. Powerful Hacking Tools that hackers use..
(Tech Raj)
5. Gaining Access - Web Server Hacking - Metasploitable - #1
6. Hack Wi-Fi in 10 Minutes 😨 | WEP Wi-Fi Hacking - Ethical Hacking
(WsCube Tech)

You might also like

Latest Posts

Article information

Author: Pres. Lawanda Wiegand

Last Updated: 06/18/2022

Views: 6538

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.