Upload
vinod-kumar
View
92
Download
2
Embed Size (px)
Citation preview
BY
by
VINODKUMAR
CONTENTS OF DEEP WEB• INTRODUCTION• WHAT IS DEEPWEB• WHY IT IS USE• WHO IT IS USE• HOW IT IS USE & WHAT IS IT• HOW IT IS WORK• SAFETY PRECAUSIONS• ADVANTAGES & DISADVANTAGES• APPLICATIONS• CONCLUSION
INTRODUCTION• OUR INTERNET HAVING 1000 PETTA BYTES• TOTALLY THESE INTERNET HAVING 2 LEVELS i.e., 1.SURFACE
WEB 2.DEEP WEB , DARK WEB
• SURFACE WEB is normal web i.e., our daily uses by normal WEB browsers.
• DEEP WEB is the some legal and some illegal• Deep web having the data of govt. & private business
information & sienctists ,journalists data etc..,• DARK WEB is the part of the deep web• Dark web also called darknet . In the darknet doneing
activities of totally ILLEGAL.• That is hacking ,drugs ,crimes and other illegal activities where
done.
DEEP WEB
DEEPWEB IS 500X GREATER THAN THE SURFACE WEB
• DEEP WEB HAVING ZETTABYTES OF MEMORY
• THAT MEMORY IS THE TOTALLY INVISABLE
• THIS DEEPWEB IS NOT VIEW IN THE NORMAL WEB BROWSERS AND NORMAL SEARCH ENGIENS
• BECAUSE SEARCH ENGINES NOT PERMISSION TO VIEW THAT DEEPWEB AND IT’S WEBSITES
• DEEP WEB HAVING SAME AS SEARCH ENGINES AND ALSO WEBSITES…
• WHY OUR SEARCH ENGINES NOT PERMIT TO SEE THE DEEP WEB AND ITS WEBSITES.
• The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines i.e.,
• etc.,
• Because deep websites having dynamic pages i.e., in this pages having the data more personalized.
WHY IT IS USE
• DATA WILL BE MORE SECURE• DATA WILL BE NOT VISIBLE TO OTHERS• NOT ACCESS DATA USING BROWSERS
WITHOUT UR PERMISSION
WHO IT IS USE
• MAINLY USE OF THIS MILITARY PURPOSE• SCIENTIST • BUSINESS PERSONS• POLICEMENS• GOVT.(OVERAL WORLD)
HOW IT IS USE & WHAT IS IT
• USING OF DEEP WEB THE BROWSER IS
• Tor is an anonymously browsing network. TOR is “The Onion Router,” because of the technique it uses to provide anonymity. Onion routing means that messages and communication are encapsulated in layers of encryption, like onion layers…..
HOW IT IS WORKS
Encrypted data is transmitted through a series of nodes and relays to taking the data from the deep websites without knowing ur IP address , and our location & ur details..
DARKNET BUSINESSES
• BASED ON THE BUYING & SELLING ACTIVIES FOR MANY WEBSITES ARE IN THERE…
• I.e.,1.SILKROAD (DRUGS)• 2. Nucleus Market Etc.,• In the dark net business uses the currency of
BITCOINS• BITCOIN VALUE IS VERY HIGH.. • 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY
SAFETY PRECAUSIONS
• 1. Don’t trust anyone out there in the deep web.• 2. COVER your webcam using tape OR removing it.• 3. Never download any files or software from deep
web.• 4. If you want some extra protection disable java
scripts • 5. Don't use U torrent or any other torrenting
services while surfing on the deep web.
ADVANTAGES
1. Anonymity2. Freedom to SEARCH3. more Knowledge gain4. you can publish & do any thing5.You can’t fear6.Open banned websites also.
DISADVANTAGES
• 1. The Deep Web doesn't work as smoothly• 2.Slow compare to our normal browsers.• 3.piracy is increases• 4.hacking is fastly grown.• 5.prison to Illegal activities
APPLICATIONS
• 1.MILITARY PURPOSE• 2.SCIENCTISTS• 3.JOURNALISTS• 4. TO OPEN ANY BANNED SITES• 5. ANONYMOUSLY
CONCLUSION
• DEEP WEB AND DARKWEB ARE HAVING LARGE AMOUNT OF DATA.IF WE USE IT LEGAL PURPOSE ONLY.BUT NOT ILLEGALLY PLZ…
• IF WE USE.. THAT IS DEPENDING UP ON YOUR OWN RISK