This has been exposed pretty well by Johnny Long (mentioned in the article) - his presentation at BlackHat Conference can be found here:

"Google hacking for penetration testers"
http://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Long.pdf