Hackers use Google to search for improperly configured software. Let's look at some common configuration errors that leave the door open to malicious actors.