Educational CyberPlayGround ®

1000 Search Engines help you find
The Invisible Web also known as The Hidden Net

Learn how to Find and Use
the Invisible Web and Meta Search Engines
From the Educational CyberPlayGround.



"The art of Searching and evaluating Online Data" Searching is an art, and a skill that we should be teaching.

What do you know about regexp and can you guestimate what google just might be storing in it's databases?






Facebook the world's largest social network already has its own unique stockpile of data—courtesy of its users' social lives—that could power a new kind of search engine altogether. By mining users' updates about vacations, music listening interests, online habits, and more, Facebook Search could be better at answering subjective questions, about what products, experiences, and businesses you might be interested in, than a traditional search engine. The social network has amassed a huge amount of data (see "What Facebook Knows") because, in a sense, its users are crawlers that index tiny fragments of both the Web and the offline world. As well as recommending Web pages, videos, and songs by sharing them with friends, and labeling those recommendations with relevant descriptions, Facebook users check into restaurants and other businesses, and post photos tagged to real locations.

Since 2009, Microsoft has spent more than $5 billion on Bing. Although the quality of Bing's results come close to Google's by some measures, Microsoft has struggled to turn Web users' heads. It serves only 15 percent of U.S. searches, compared with Google's 65 percent.


  • is making 8,255 CRS reports available to the general public.
  • News and Transcript Resources: Fact Sheet It contains brief descriptions of Library of Congress news resources (available in the Congressional Research Service's [CRS's] and other Library reading rooms), selected subscription news resources, broadcast news transcript resources, radio and television news resources, directories for online news sites, and contact information for further assistance. It also includes locations of where subscription databases can be accessed (e.g., House and Senate offices, House and Senate Libraries, CRS La Follette Reading Room); some House and Senate offices or committees may also subscribe to these or other paid databases.


Use a Privacy Search Engine duckduckgo

VPN Virtual Private Network creates your own private, encrypted channel that runs alongside the normal Internet from within any country.

How to set up your own Raspberry Pi powered VPN


  1. Learn How the Google Search Engine searches the internet.
  3. Find free Search Engine databases, Tools, Share Ware, and Data Mining sources.
  5. FREE ONLINE DATABASES Government Search Engines
  6. Search Engines: What are 21st Century Literacy Skills?



Undergraduates are often reluctant to approach a librarian - and often they might have a question where they want to remain anonymous. It used to be an actual bulletin board at one time. There was an article on QB in College & Research Libraries News a few years back. Apparently the service is fondly remembered by alumni. It also serves to give UIUC library school students experience with reference.


ASK AN ipl2 LIBRARIAN QUESTION FORM Use this form if you are under 13 years of age.

ipl2 Search engine For Kids

2007 Saint Mary's College of California,
did a report on students' research habits says the worry over students' overreliance on Google and Wikipedia to complete assignments found that most students started their research by turning to course readings or the library Web site, not Web search engines or Wikipedia. Many students are overwhelmed by research assignments, "especially selecting and evaluating information and figuring out professors' expectations for quality research." -- for elementary students



Fight for you Right to Privacy and Protect Yourself When You Search

Invisible Internet Project (I2P) underground black market
First, download the TAILS operating system. Then burn it onto a DVD drive or toss it on a USB stick. Connect to Tor, disable javascript via the NoScript extension, and enter this into the B32 browser: http://r35rdglu7cjmsxh5qn3v6o5q7cnejanwg4h2viuvaqavpbf5uqaq.b32.i2p
Add the newhosts.txt to your subscriptions, and use a jump service by typing themarketplace.i2p in the address bar. Click enter go to TheMarketplace. TheMarketplace runs not on Tor but on i2p—an anonymous computer network built by developers in 2003. It also uses a complex “Bitcoin escrow” process, whereby no Bitcoin is actually held by one party until a transaction is confirmed on both ends.


Tor is less anonymous than you think. You can CompareTor and I2P

Almost everyone involved in developing Tor was (or is) funded by the US government "The United States government can't simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, 'Oh, it's another CIA agent.' If those are the only people using the network." ~ Roger Dingledine, co-founder of the Tor Network, 2004
NSA? DoD? U.S. Navy? Police surveillance? What the hell is going on? How is it possible that a privacy tool was created by the same military and intelligence agencies that it's supposed to guard us against? Is it a ruse? A sham? A honeytrap? Maybe I'm just being too paranoid… Unfortunately, this is not a tinfoil hat conspiracy theory. It is cold hard fact.
In 2013, the Washington Post revealed that the NSA had figured out various ways of unmasking and penetrating the anonymity of the Tor Network.
In his e-mail, Snowden wrote that he personally ran one of the “major tor exits”-a 2 gbps server named “TheSignal”-and was trying to persuade some unnamed coworkers at his office to set up additional servers. He didn't say where he worked. But he wanted to know if Sandvik could send him a stack of official Tor stickers. (In some post-leak photos of Snowden you can see the Tor sticker on the back of his laptop, next to the EFF sticker).
the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.
If wikileaks can pull off of this: WikiLeaks Was Launched With Documents Intercepted From Tor then you know others can. Spy attracts spy, so its probably been tracked for a long time. 2014 Blackhat... You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget

Which PGP keys sign which packages

Join NetHappenings the oldest newsletter for the education community and others in the U.S. started by Internet Pioneer Gleason Sackman hosted by the Educational CyberPlayGround.

The WELL is one of the oldest online communities in the world and it is centered in San Francisco so it's a terrific way to make connections.

How to disable Java in Chrome, Firefox, Opera, and Safari.
Unless you have a particular reason that you have to have it in your browser — and I really hope you don't — please, get Java out of your browser. It's a horrible security risk.


The Internet Archive

Internet Archive was founded in 1996 and is not a start-up.
“You could turn all the books in the Library of Congress into a stack of disks that would fit in one shopping cart in Best Buy,” Mr. Kahle said. He estimates that the Internet Archive now contains about 9,000 terabytes of data; by contrast, the digital collection of the Library of Congress is a little more than 300 terabytes, according to an estimate earlier this year. The act of copying all this news material is protected under a federal copyright agreement signed in 1976. That was in reaction to a challenge to a news assembly project started by Vanderbilt University in 1968.
The archive has no intention of replacing or competing with the Web outlets owned by the news organizations.
Brewster Kahle has a grand vision for the Internet Archive, the giant aggregator and digitizer of data, which he founded and leads. The archive has already digitized millions of books and tried to collect everything published on every Web page for the last 15 years (that adds up to more than 150 billion Web pages), is intended not only for researchers, Mr. Kahle said, but also for average citizens who make up some of the site's estimated two million visitors each day.
It is financed mainly through outside grants rom the National Archives, the Library of Congress and other government agencies and foundations made up the bulk of the financing for the project.
The archive's online collection will include every morsel of news produced since 2009 capturing not only every edition of “60 Minutes” on CBS but also every minute of every day on CNN and "The Daily Show". All of this will be available, free, to those willing to dive into the archive. The user simply plugs in the words of the search, along with some kind of time frame, and matches of news clips will appear. The system has an interface that makes it easy to browse quickly through 30-second clips in search of the right one. If a researcher wants a copy of the entire program, a DVD will be sent on loan.



  4. Take Down Notices


Academic Search Englines



  • Find information on rare diseases on FindZebra which is better than google.
  • Database of Hospital Inspection Reports
  • Academic Info best and most useful links and resources within a specific subject area
  • Archival Research Catalogue online catalog of NARA's nationwide holdings in the Washington, DC area, Regional Archives and Presidential Libraries.
  • BASE especially for academic open access web resources
  • CiteuLike free service for managing and discovering scholarly references.
  • Eric provides ready access to education literature to support the use of educational research and information to improve practice in learning, teaching, educational decision-making, and research.
  • Infotopia A Google alternative safe search engine for students offering information and reference sites: art, social sciences,social issues,social problems, history.
  • Lib Guides Community all the librariarians
  • Refseek for students and researchers that aims to make academic information easily accessible to everyone.
  • The Virtual LRC best academic information websites,selected by teachers and library professionals worldwide, in order to provide to students and teachers current, valid information for school and university academic projects.





Natural Language Searching

AnswerBus | BrainBoost| | Gigablast | Yahoo Related | Google Related | ASK

  • FEE based database publishers are specialized database tools that are no longer necessary!!!
  • EVERY FREE PUBLIC LIBRARY in the US is available for free
  • Paratext "A single search through 28000+ authoritative printed and online reference works--linked to each library's local reference collection."
  • NYPL Science, Industry, Business Research Guides here
  • Grey Literature, Grey Water A podcast from George C. Gordon Library, Worcester Polytechnic Institute, about grey literature. One of a series, found here.
  • Read How Google Books is Changing Academic History
  • EDUREF The Educators Reference Desk and Resource Guide
  • Jimmy Wales' Wikipedia the free encyclopedia comes close to Britannica in terms of the accuracy of its science entries, a Nature investigation finds.
  • - Upload and share books and papers.
  •, which lets potential buyers discover which fraud sites hold the cards they're looking for without having to first create accounts at each one. This free search engine aggregates data about compromised payment cards, and points searchers to various fraud sites selling them. The site is domiciled in the Cocos Islands, an Australian territory, but was offline at time of publication. According to its creator, the search engine does not store the compromised card numbers or any information about the card holders. Instead, it works with carders' market owners to index the first six digits of all compromised account numbers that are for sale. These six digits, also known the "Bank Identification Number" — or BIN — identify which bank issued the cards. Searching by BIN, MegaSearch users are given links to different fraud sites that are currently selling cards issued by the corresponding bank. This gives cyber criminals an easy way to search for multiple stolen cards in a particular location, helping their fraud efforts.
  • GPX2KML *nix shell script that will help you audit websites for any potentially sensitive GPS data that may be compromising your organizational security.
  • EXIF Data Embedded In Your Photos
  • Old Maps Online The world's single largest online collection of historical maps Cooperating institutions include the British Library, the National Library of Scotland, the Czech Republic's Moravian Library and the San Francisco Bay Area's David Rumsey Map Collection.