Deepweb and darkweb vinodkumar ancha

Preview:

Citation preview

BY

by

VINODKUMAR

CONTENTS OF DEEP WEB• INTRODUCTION• WHAT IS DEEPWEB• WHY IT IS USE• WHO IT IS USE• HOW IT IS USE & WHAT IS IT• HOW IT IS WORK• SAFETY PRECAUSIONS• ADVANTAGES & DISADVANTAGES• APPLICATIONS• CONCLUSION

INTRODUCTION• OUR INTERNET HAVING 1000 PETTA BYTES• TOTALLY THESE INTERNET HAVING 2 LEVELS i.e., 1.SURFACE

WEB 2.DEEP WEB , DARK WEB

• SURFACE WEB is normal web i.e., our daily uses by normal WEB browsers.

• DEEP WEB is the some legal and some illegal• Deep web having the data of govt. & private business

information & sienctists ,journalists data etc..,• DARK WEB is the part of the deep web• Dark web also called darknet . In the darknet doneing

activities of totally ILLEGAL.• That is hacking ,drugs ,crimes and other illegal activities where

done.

DEEP WEB

DEEPWEB IS 500X GREATER THAN THE SURFACE WEB

• DEEP WEB HAVING ZETTABYTES OF MEMORY

• THAT MEMORY IS THE TOTALLY INVISABLE

• THIS DEEPWEB IS NOT VIEW IN THE NORMAL WEB BROWSERS AND NORMAL SEARCH ENGIENS

• BECAUSE SEARCH ENGINES NOT PERMISSION TO VIEW THAT DEEPWEB AND IT’S WEBSITES

• DEEP WEB HAVING SAME AS SEARCH ENGINES AND ALSO WEBSITES…

• WHY OUR SEARCH ENGINES NOT PERMIT TO SEE THE DEEP WEB AND ITS WEBSITES.

• The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines i.e.,

• etc.,

• Because deep websites having dynamic pages i.e., in this pages having the data more personalized.

WHY IT IS USE

• DATA WILL BE MORE SECURE• DATA WILL BE NOT VISIBLE TO OTHERS• NOT ACCESS DATA USING BROWSERS

WITHOUT UR PERMISSION

WHO IT IS USE

• MAINLY USE OF THIS MILITARY PURPOSE• SCIENTIST • BUSINESS PERSONS• POLICEMENS• GOVT.(OVERAL WORLD)

HOW IT IS USE & WHAT IS IT

• USING OF DEEP WEB THE BROWSER IS

• Tor is an anonymously browsing network. TOR is “The Onion Router,” because of the technique it uses to provide anonymity. Onion routing means that messages and communication are encapsulated in layers of encryption, like onion layers…..

HOW IT IS WORKS

Encrypted data is transmitted through a series of nodes and relays to taking the data from the deep websites without knowing ur IP address , and our location & ur details..

DARKNET BUSINESSES

• BASED ON THE BUYING & SELLING ACTIVIES FOR MANY WEBSITES ARE IN THERE…

• I.e.,1.SILKROAD (DRUGS)• 2. Nucleus Market Etc.,• In the dark net business uses the currency of

BITCOINS• BITCOIN VALUE IS VERY HIGH.. • 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY

SAFETY PRECAUSIONS

• 1. Don’t trust anyone out there in the deep web.• 2. COVER your webcam using tape OR removing it.• 3. Never download any files or software from deep

web.• 4. If you want some extra protection disable java

scripts • 5. Don't use U torrent or any other torrenting

services while surfing on the deep web.

ADVANTAGES

1. Anonymity2. Freedom to SEARCH3. more Knowledge gain4. you can publish & do any thing5.You can’t fear6.Open banned websites also.

DISADVANTAGES

• 1. The Deep Web doesn't work as smoothly• 2.Slow compare to our normal browsers.• 3.piracy is increases• 4.hacking is fastly grown.• 5.prison to Illegal activities

APPLICATIONS

• 1.MILITARY PURPOSE• 2.SCIENCTISTS• 3.JOURNALISTS• 4. TO OPEN ANY BANNED SITES• 5. ANONYMOUSLY

CONCLUSION

• DEEP WEB AND DARKWEB ARE HAVING LARGE AMOUNT OF DATA.IF WE USE IT LEGAL PURPOSE ONLY.BUT NOT ILLEGALLY PLZ…

• IF WE USE.. THAT IS DEPENDING UP ON YOUR OWN RISK

Recommended