SlideShare a Scribd company logo
1 of 13
DOYOU KNOW WHAT TYPE OF NET HACKERS USE ?
THE DARKNET
DARKNET
Dark Net, or Darknet, is an overlay system
within the internet which can only be accessed
through specialized software, authorization and
configuration.
In January 2021, German authorities reportedly
shut down Dark Market which was “probably the
largest illegal marketplace on the Darknet”.
WHAT ARE THE DIFFERENT PARTS OF THE INTERNET?
Some important network components are NIC, switch,
cable, hub, router, and modem.
 Depending on the type of network that we need to
install, some network components can also be removed.
For example, the wireless network does not require a
cable.
WHAT ARE THE DIFFERENT PARTS OF THE INTERNET?
Fiber optic cables. Lots and lots of fiber.
Routers. They look at the Internet traffic and direct it to the correct
fiber.
Dense Wavelength Division Multiplexers. These devices take the
traffic from many different fibers, re-encode it using different
wavelengths and transmits all of the resulting wavelengths down
the same fiber. At the opposite end, it separates wavelengths and
presents them on many different fibers.
Servers. Computers that provide services for you to talk to. This
includes the absolutely vital DNS servers that give us name to IP
address resolution.
People. Network engineers that fix it all when it breaks.
Tor Browser
For Android is the only official mobile browser
supported by the Tor Project, developers of the world's
strongest tool for privacy and freedom
How to get on the dark web?
Let's get this "dark web" nonsense out of the way
once and for all.
While it's true that some criminals use Tor to
commit crimes, criminals also use the regular internet
to commit crimes.
Bank robbers use getaway cars on public highways
to commit crimes.
We don't slander highways or the internet, because
that would be foolish.
Tor has tons of legitimate uses and is considered by
many a cornerstone of democracy today.
How to get on the dark web?
So when you hear people talking in scared whispers
about the “dark web” or the “deep web” or somesuch
nonsense, understand that there is a lot more going on
here than just "The Four Horsemen of the Infocalypse are
using computers in non-normative ways."
Anonymity online is not merely the bailiwick of
criminals and trolls.
THANKYOU

More Related Content

Similar to seminar PowerPoint Presentation.pptx

Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsBiagio Botticelli
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Chapter- 4.pptx
Chapter- 4.pptxChapter- 4.pptx
Chapter- 4.pptxKviskvis
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project ReportTiffany Graham
 
Computer networks
Computer networksComputer networks
Computer networksRohit Kori
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
types of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdftypes of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdfAjayKumar41134
 
An Analysis Of The Deep Web
An Analysis Of The Deep WebAn Analysis Of The Deep Web
An Analysis Of The Deep WebJoe Osborn
 

Similar to seminar PowerPoint Presentation.pptx (20)

Voip Security
Voip SecurityVoip Security
Voip Security
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
What is soho network
What is soho networkWhat is soho network
What is soho network
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Darknet
DarknetDarknet
Darknet
 
Chapter- 4.pptx
Chapter- 4.pptxChapter- 4.pptx
Chapter- 4.pptx
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
.Onion
.Onion.Onion
.Onion
 
Internate
InternateInternate
Internate
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
Computer networks
Computer networksComputer networks
Computer networks
 
Dw communication
Dw communicationDw communication
Dw communication
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
types of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdftypes of network_ A Comprehensive Guide.pdf
types of network_ A Comprehensive Guide.pdf
 
An Analysis Of The Deep Web
An Analysis Of The Deep WebAn Analysis Of The Deep Web
An Analysis Of The Deep Web
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

seminar PowerPoint Presentation.pptx

  • 1. DOYOU KNOW WHAT TYPE OF NET HACKERS USE ?
  • 3.
  • 4. DARKNET Dark Net, or Darknet, is an overlay system within the internet which can only be accessed through specialized software, authorization and configuration. In January 2021, German authorities reportedly shut down Dark Market which was “probably the largest illegal marketplace on the Darknet”.
  • 5. WHAT ARE THE DIFFERENT PARTS OF THE INTERNET? Some important network components are NIC, switch, cable, hub, router, and modem.  Depending on the type of network that we need to install, some network components can also be removed. For example, the wireless network does not require a cable.
  • 6. WHAT ARE THE DIFFERENT PARTS OF THE INTERNET? Fiber optic cables. Lots and lots of fiber. Routers. They look at the Internet traffic and direct it to the correct fiber. Dense Wavelength Division Multiplexers. These devices take the traffic from many different fibers, re-encode it using different wavelengths and transmits all of the resulting wavelengths down the same fiber. At the opposite end, it separates wavelengths and presents them on many different fibers. Servers. Computers that provide services for you to talk to. This includes the absolutely vital DNS servers that give us name to IP address resolution. People. Network engineers that fix it all when it breaks.
  • 7. Tor Browser For Android is the only official mobile browser supported by the Tor Project, developers of the world's strongest tool for privacy and freedom
  • 8.
  • 9.
  • 10.
  • 11. How to get on the dark web? Let's get this "dark web" nonsense out of the way once and for all. While it's true that some criminals use Tor to commit crimes, criminals also use the regular internet to commit crimes. Bank robbers use getaway cars on public highways to commit crimes. We don't slander highways or the internet, because that would be foolish. Tor has tons of legitimate uses and is considered by many a cornerstone of democracy today.
  • 12. How to get on the dark web? So when you hear people talking in scared whispers about the “dark web” or the “deep web” or somesuch nonsense, understand that there is a lot more going on here than just "The Four Horsemen of the Infocalypse are using computers in non-normative ways." Anonymity online is not merely the bailiwick of criminals and trolls.