Educational CyberPlayGround ®☰ Menu

1000 Search Engines help you find
The Invisible Web also known as The Hidden Net

Learn how to Find and Use
the Invisible Web and Meta Search Engines
From the Educational CyberPlayGround.



"The art of Searching and evaluating Online Data" Searching is an art, and a skill that we should be teaching.

What do you know about regexp and can you guestimate what google just might be storing in it's databases?






Facebook the world's largest social network already has its own unique stockpile of data—courtesy of its users' social lives—that could power a new kind of search engine altogether. By mining users' updates about vacations, music listening interests, online habits, and more, Facebook Search could be better at answering subjective questions, about what products, experiences, and businesses you might be interested in, than a traditional search engine. The social network has amassed a huge amount of data (see "What Facebook Knows") because, in a sense, its users are crawlers that index tiny fragments of both the Web and the offline world. As well as recommending Web pages, videos, and songs by sharing them with friends, and labeling those recommendations with relevant descriptions, Facebook users check into restaurants and other businesses, and post photos tagged to real locations.

Since 2009, Microsoft has spent more than $5 billion on Bing. Although the quality of Bing's results come close to Google's by some measures, Microsoft has struggled to turn Web users' heads. It serves only 15 percent of U.S. searches, compared with Google's 65 percent.





Use a Privacy Search Engine duckduckgo

VPN Virtual Private Network creates your own private, encrypted channel that runs alongside the normal Internet from within any country.

How to set up your own Raspberry Pi powered VPN


  1. Learn How the Google Search Engine searches the internet.
  3. Find free Search Engine databases, Tools, Share Ware, and Data Mining sources.
  5. FREE ONLINE DATABASES Government Search Engines
  6. Search Engines: What are 21st Century Literacy Skills?



Undergraduates are often reluctant to approach a librarian - and often they might have a question where they want to remain anonymous.  It used to be an actual bulletin board at one time. There was an article on QB in College & Research Libraries News a few years back.  Apparently the service is fondly remembered by alumni.  It also serves to give UIUC library school students experience with reference.


ASK AN ipl2 LIBRARIAN QUESTION FORM Use this form if you are under 13 years of age.

ipl2 Search engine For Kids

2007 Saint Mary's College of California,
did a report on students' research habits says the worry over students' overreliance on Google and Wikipedia to complete assignments found that most students started their research by turning to course readings or the library Web site, not Web search engines or Wikipedia. Many students are overwhelmed by research assignments, "especially selecting and evaluating information and figuring out professors' expectations for quality research." -- for elementary students




Fight for you Right to Privacy and Protect Yourself When You Search

Invisible Internet Project (I2P) underground black market
First, download the TAILS operating system. Then burn it onto a DVD drive or toss it on a USB stick. Connect to Tor, disable javascript via the NoScript extension, and enter this into the B32 browser: http://r35rdglu7cjmsxh5qn3v6o5q7cnejanwg4h2viuvaqavpbf5uqaq.b32.i2p
Add the newhosts.txt to your subscriptions, and use a jump service by typing themarketplace.i2p in the address bar. Click enter go to TheMarketplace. TheMarketplace runs not on Tor but on i2p—an anonymous computer network built by developers in 2003. It also uses a complex “Bitcoin escrow” process, whereby no Bitcoin is actually held by one party until a transaction is confirmed on both ends.


Tor is less anonymous than you think. You can CompareTor and I2P

Almost everyone involved in developing Tor was (or is) funded by the US government "The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, 'Oh, it’s another CIA agent.' If those are the only people using the network." ~ Roger Dingledine, co-founder of the Tor Network, 2004
NSA? DoD? U.S. Navy? Police surveillance? What the hell is going on? How is it possible that a privacy tool was created by the same military and intelligence agencies that it’s supposed to guard us against? Is it a ruse? A sham? A honeytrap? Maybe I’m just being too paranoid… Unfortunately, this is not a tinfoil hat conspiracy theory. It is cold hard fact.
In 2013, the Washington Post revealed that the NSA had figured out various ways of unmasking and penetrating the anonymity of the Tor Network.
In his e-mail, Snowden wrote that he personally ran one of the “major tor exits”–a 2 gbps server named “TheSignal”–and was trying to persuade some unnamed coworkers at his office to set up additional servers. He didn’t say where he worked. But he wanted to know if Sandvik could send him a stack of official Tor stickers. (In some post-leak photos of Snowden you can see the Tor sticker on the back of his laptop, next to the EFF sticker).
the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.
If wikileaks can pull off of this: WikiLeaks Was Launched With Documents Intercepted From Tor then you know others can. Spy attracts spy, so its probably been tracked for a long time. 2014 Blackhat... You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget

Which PGP keys sign which packages

Join NetHappenings the oldest newsletter for the education community and others in the U.S. started by Internet Pioneer Gleason Sackman hosted by the Educational CyberPlayGround.

The WELL is one of the oldest online communities in the world and it is centered in San Francisco so it's a terrific way to make connections.

How to disable Java in Chrome, Firefox, Opera, and Safari.
Unless you have a particular reason that you have to have it in your browser — and I really hope you don’t — please, get Java out of your browser. It’s a horrible security risk.


The Internet Archive



Internet Archive was founded in 1996 and is not a start-up.
“You could turn all the books in the Library of Congress into a stack of disks that would fit in one shopping cart in Best Buy,” Mr. Kahle said. He estimates that the Internet Archive now contains about 9,000 terabytes of data; by contrast, the digital collection of the Library of Congress is a little more than 300 terabytes, according to an estimate earlier this year. The act of copying all this news material is protected under a federal copyright agreement signed in 1976. That was in reaction to a challenge to a news assembly project started by Vanderbilt University in 1968.
The archive has no intention of replacing or competing with the Web outlets owned by the news organizations.
Brewster Kahle has a grand vision for the Internet Archive, the giant aggregator and digitizer of data, which he founded and leads. The archive has already digitized millions of books and tried to collect everything published on every Web page for the last 15 years (that adds up to more than 150 billion Web pages), is intended not only for researchers, Mr. Kahle said, but also for average citizens who make up some of the site’s estimated two million visitors each day.
It is financed mainly through outside grants rom the National Archives, the Library of Congress and other government agencies and foundations made up the bulk of the financing for the project.
The archive’s online collection will include every morsel of news produced since 2009 capturing not only every edition of “60 Minutes” on CBS but also every minute of every day on CNN and "The Daily Show". All of this will be available, free, to those willing to dive into the archive. The user simply plugs in the words of the search, along with some kind of time frame, and matches of news clips will appear. The system has an interface that makes it easy to browse quickly through 30-second clips in search of the right one. If a researcher wants a copy of the entire program, a DVD will be sent on loan.



  4. Take Down Notices


Academic Search Englines









Natural Language Searching



AnswerBus | BrainBoost| | Gigablast | Yahoo Related | Google Related | ASK 


© Educational CyberPlayGround ® All rights reserved world wide.