SlideShare a Scribd company logo

Research in the deep web

An brief overview of research in the deep web.

1 of 26
Download to read offline
RESEARCH INTHE
DEEPWEB
Outline
■ The SurfaceWebVS the Deep Web
■ DeepWeb vs DarkWeb
■ How to get deeper
■ DarkWeb access
■ Tools
SurfaceWeb
Anything that can be indexed by a
typical search engine.
Research in the deep web
Research in the deep web
Research in the deep web

Recommended

More Related Content

What's hot (20)

Deep web
Deep webDeep web
Deep web
 
Dark web
Dark webDark web
Dark web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
The dark web
The dark webThe dark web
The dark web
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Dark Web
Dark WebDark Web
Dark Web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Deep web
Deep webDeep web
Deep web
 
Darkweb
DarkwebDarkweb
Darkweb
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 

Viewers also liked

Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSForgeRock
 
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنسما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنسmosab elhag
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
The dark net illescas ecommer_k32
The dark net illescas ecommer_k32The dark net illescas ecommer_k32
The dark net illescas ecommer_k32Zach Illescas
 
The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" WebKAZAR Yassir
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...Eugene Kowalzki
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 

Viewers also liked (20)

Deep web
Deep webDeep web
Deep web
 
Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Deep Web
Deep WebDeep Web
Deep Web
 
Subject liaison model
Subject liaison modelSubject liaison model
Subject liaison model
 
Teaching Innovation at Georgia Tech
Teaching Innovation at Georgia TechTeaching Innovation at Georgia Tech
Teaching Innovation at Georgia Tech
 
ACRL statistical literacy
ACRL statistical literacyACRL statistical literacy
ACRL statistical literacy
 
UAH information literacy
UAH information literacyUAH information literacy
UAH information literacy
 
Charleston poster session
Charleston poster sessionCharleston poster session
Charleston poster session
 
The collective
The collectiveThe collective
The collective
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
 
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنسما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
The dark net illescas ecommer_k32
The dark net illescas ecommer_k32The dark net illescas ecommer_k32
The dark net illescas ecommer_k32
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" Web
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 

Similar to Research in the deep web

Similar to Research in the deep web (20)

Darknet
DarknetDarknet
Darknet
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
 
.Onion
.Onion.Onion
.Onion
 
Understanding The Basis Of The Dark Web
Understanding The Basis Of The Dark WebUnderstanding The Basis Of The Dark Web
Understanding The Basis Of The Dark Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Deep web
Deep webDeep web
Deep web
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Dark web
Dark webDark web
Dark web
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Deep web
Deep webDeep web
Deep web
 

More from Seth Porter, MA, MLIS

Georgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceGeorgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceSeth Porter, MA, MLIS
 
Program evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIGProgram evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIGSeth Porter, MA, MLIS
 
Georgia Tech teaching best practices
Georgia Tech teaching best practices Georgia Tech teaching best practices
Georgia Tech teaching best practices Seth Porter, MA, MLIS
 
Accessing government statistical information online
Accessing government statistical information onlineAccessing government statistical information online
Accessing government statistical information onlineSeth Porter, MA, MLIS
 
Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...Seth Porter, MA, MLIS
 
Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016Seth Porter, MA, MLIS
 
Green, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacyGreen, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacySeth Porter, MA, MLIS
 
Human cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learningHuman cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learningSeth Porter, MA, MLIS
 
Economics introduction and data access
Economics introduction and data accessEconomics introduction and data access
Economics introduction and data accessSeth Porter, MA, MLIS
 
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...Seth Porter, MA, MLIS
 
Space, Place, and Information Literacy
Space, Place, and Information LiteracySpace, Place, and Information Literacy
Space, Place, and Information LiteracySeth Porter, MA, MLIS
 
Education policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My CapstoneEducation policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My CapstoneSeth Porter, MA, MLIS
 

More from Seth Porter, MA, MLIS (20)

Georgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceGeorgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year Experience
 
GT1000 training IL
GT1000 training ILGT1000 training IL
GT1000 training IL
 
Program evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIGProgram evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIG
 
Ib workshop
Ib workshopIb workshop
Ib workshop
 
Georgia Tech teaching best practices
Georgia Tech teaching best practices Georgia Tech teaching best practices
Georgia Tech teaching best practices
 
Accessing government statistical information online
Accessing government statistical information onlineAccessing government statistical information online
Accessing government statistical information online
 
Engaging Design and Learning
Engaging Design and LearningEngaging Design and Learning
Engaging Design and Learning
 
Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...
 
Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016
 
USG teaching & Learning Conference
USG teaching & Learning ConferenceUSG teaching & Learning Conference
USG teaching & Learning Conference
 
Introduction to Nvivo
Introduction to NvivoIntroduction to Nvivo
Introduction to Nvivo
 
Green, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacyGreen, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacy
 
Human cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learningHuman cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learning
 
Instruction bootcamp
Instruction bootcampInstruction bootcamp
Instruction bootcamp
 
Graduate introduction INTA
Graduate introduction INTAGraduate introduction INTA
Graduate introduction INTA
 
Economics introduction
Economics introductionEconomics introduction
Economics introduction
 
Economics introduction and data access
Economics introduction and data accessEconomics introduction and data access
Economics introduction and data access
 
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
 
Space, Place, and Information Literacy
Space, Place, and Information LiteracySpace, Place, and Information Literacy
Space, Place, and Information Literacy
 
Education policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My CapstoneEducation policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My Capstone
 

Recently uploaded

2.22.24 Black Nationalism and the Nation of Islam.pptx
2.22.24 Black Nationalism and the Nation of Islam.pptx2.22.24 Black Nationalism and the Nation of Islam.pptx
2.22.24 Black Nationalism and the Nation of Islam.pptxMaryPotorti1
 
Personal Branding Exploration- Anny Love
Personal Branding Exploration- Anny LovePersonal Branding Exploration- Anny Love
Personal Branding Exploration- Anny Loveaslove5
 
SOCIAL JUSTICE LESSON ON CATCH UP FRIDAY
SOCIAL JUSTICE LESSON ON CATCH UP FRIDAYSOCIAL JUSTICE LESSON ON CATCH UP FRIDAY
SOCIAL JUSTICE LESSON ON CATCH UP FRIDAYGloriaRamos83
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaFaheema Hasan
 
Group_Presentation_Gun_Island_Amitav_Ghosh.pptx
Group_Presentation_Gun_Island_Amitav_Ghosh.pptxGroup_Presentation_Gun_Island_Amitav_Ghosh.pptx
Group_Presentation_Gun_Island_Amitav_Ghosh.pptxPooja Bhuva
 
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTSA TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTSDr.M.Geethavani
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
Organic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional GroupsOrganic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional GroupsDr.M.Geethavani
 
Plant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptxPlant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptxAKSHAYMAGAR17
 
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...Nguyen Thanh Tu Collection
 
Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Sue Beckingham
 
Persuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of PersuasionPersuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of PersuasionCorinne Weisgerber
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasAlexandraSwartzwelde
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
skeletal system complete details with joints and its types
skeletal system complete details with joints and its typesskeletal system complete details with joints and its types
skeletal system complete details with joints and its typesMinaxi patil. CATALLYST
 
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdfAynouraHamidova
 
DISCOURSE: TEXT AS CONNECTED DISCOURSE
DISCOURSE:   TEXT AS CONNECTED DISCOURSEDISCOURSE:   TEXT AS CONNECTED DISCOURSE
DISCOURSE: TEXT AS CONNECTED DISCOURSEMYDA ANGELICA SUAN
 
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in GhanaDecision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in GhanaPrince Armah, PhD
 
Data Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdfData Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdfChristalin Nelson
 

Recently uploaded (20)

2.22.24 Black Nationalism and the Nation of Islam.pptx
2.22.24 Black Nationalism and the Nation of Islam.pptx2.22.24 Black Nationalism and the Nation of Islam.pptx
2.22.24 Black Nationalism and the Nation of Islam.pptx
 
Personal Branding Exploration- Anny Love
Personal Branding Exploration- Anny LovePersonal Branding Exploration- Anny Love
Personal Branding Exploration- Anny Love
 
ThinkTech 2024 Prelims- U25 BizTech Quiz by Pragya
ThinkTech 2024 Prelims- U25 BizTech Quiz by PragyaThinkTech 2024 Prelims- U25 BizTech Quiz by Pragya
ThinkTech 2024 Prelims- U25 BizTech Quiz by Pragya
 
SOCIAL JUSTICE LESSON ON CATCH UP FRIDAY
SOCIAL JUSTICE LESSON ON CATCH UP FRIDAYSOCIAL JUSTICE LESSON ON CATCH UP FRIDAY
SOCIAL JUSTICE LESSON ON CATCH UP FRIDAY
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic Leukemia
 
Group_Presentation_Gun_Island_Amitav_Ghosh.pptx
Group_Presentation_Gun_Island_Amitav_Ghosh.pptxGroup_Presentation_Gun_Island_Amitav_Ghosh.pptx
Group_Presentation_Gun_Island_Amitav_Ghosh.pptx
 
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTSA TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
A TEXTBOOK OF INTELLECTUAL ROPERTY RIGHTS
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
Organic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional GroupsOrganic Synthesis and Estimation of Functional Groups
Organic Synthesis and Estimation of Functional Groups
 
Plant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptxPlant Genetic Resources, Germplasm, gene pool - Copy.pptx
Plant Genetic Resources, Germplasm, gene pool - Copy.pptx
 
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
GIÁO ÁN TIẾNG ANH GLOBAL SUCCESS LỚP 11 (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) N...
 
Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...Digital Footprints to Career Pathways - Building a Strong Professional Online...
Digital Footprints to Career Pathways - Building a Strong Professional Online...
 
Persuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of PersuasionPersuasive Speaking and Means of Persuasion
Persuasive Speaking and Means of Persuasion
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in Canvas
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
skeletal system complete details with joints and its types
skeletal system complete details with joints and its typesskeletal system complete details with joints and its types
skeletal system complete details with joints and its types
 
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
11 CI SINIF SINAQLARI - 5-2023-Aynura-Hamidova.pdf
 
DISCOURSE: TEXT AS CONNECTED DISCOURSE
DISCOURSE:   TEXT AS CONNECTED DISCOURSEDISCOURSE:   TEXT AS CONNECTED DISCOURSE
DISCOURSE: TEXT AS CONNECTED DISCOURSE
 
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in GhanaDecision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
Decision on Curriculum Change Path: Towards Standards-Based Curriculum in Ghana
 
Data Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdfData Modeling - Entity Relationship Diagrams-1.pdf
Data Modeling - Entity Relationship Diagrams-1.pdf
 

Research in the deep web

  • 2. Outline ■ The SurfaceWebVS the Deep Web ■ DeepWeb vs DarkWeb ■ How to get deeper ■ DarkWeb access ■ Tools
  • 3. SurfaceWeb Anything that can be indexed by a typical search engine.
  • 7. DeepWeb ■ Quality content is 1,000 to 2,000 times greater than surface web ■ 95% of DeepWeb is accessible to public (no fees or subscription required) ■ The deep web is the internet that has not been indexed by commercial search engines such as Google and Yahoo!.These search engines send out crawlers or spiders to index and catalog available web sites, but the vast majority of the internet, 500X the surface net, includes many of the best resources which are not indexed by these search engines. Such as: – Unlinked pages:Spiders can’t find web pages that are not linked to others. – Private intranets and web pages, password protected and more. – Non HTML content: e.g., content rich, lots of different file type – Library & Government Databases -How StuffWorks.com
  • 8. Types of deep web ■ InvisibleWeb: Material that can be, but is not included in search engine results. EG: new material added and not yet picked up. ■ PrivateWeb: Sites intentionally excluded from search engine results. Ex: password protected ■ Subscriptions websites & databases: ESPN Insider, (Library Databases) Proquest databases, EbscoHost. -How StuffWorks.com
  • 9. How to get deeper ■ Directories – http://www.dmoz.org/ ■ Specialized Search Engines – http://biznar.com/biznar/desktop/en/search.html – http://www.wolframalpha.com/ – http://archive.org/web/web.php ■ Academic Databases – Jstor – Science Direct ■ Specialized Databases – https://www.archives.gov/ ■ GovernmentWebsites – https://www.data.gov/ – https://www.govinfo.gov/
  • 10. The DarkWeb ■ The Dark web: An area of the web which information is hidden deep and anonymously. ■ The DarkWeb then is a small portion of the DeepWeb that has been intentionally hidden and is inaccessible through standard web browsers.
  • 11. "The deepWeb may be a shadow land of untapped potential, but with a bit of skill and some luck, you can illuminate a lot of valuable information that many people worked to archive. On the dark Web, where people purposely hide information, they'd prefer it if you left the lights off. The dark Web is a bit like the Web's id. It's private. It's anonymous. It's powerful. It unleashes human nature in all its forms, both good and bad. The bad stuff, as always, gets most of the headlines.You can find illegal goods and activities of all kinds through the dark Web.That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted media and anything else you can think of.Theoretically, you could even, say, hire a hit man to kill someone you don't like. But you won't find this information with a Google search.These kinds ofWeb sites require you to use special software, such asThe Onion Router, more commonly known asTor. Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites.Critically,Tor is an encrypted technology that helps people maintain anonymity online. It does this in part by routing connections through servers around the world, making them much harder to track." -How StuffWorks.com
  • 13. “Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.This set of volunteer relays is called the Tor network (Tor Project)”
  • 14. HowTor works ■ TheTor network is a volunteer-operated servers that individuals use to improve privacy and security. ■ Tor connects through masked virtual links instead of a direct connection. ■ Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis (How StuffWorks).
  • 15. The Onion Router “Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion.The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination.When the final layer is decrypted, the message arrives at its destination.The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes” (Tor (anonymity network)
  • 16. Hidden Service “Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. UsingTor "rendezvous points," otherTor users can connect to these hidden services, each without knowing the other's network identity (Tor project).”
  • 24. Why ■ Privacy – Protect from traffic analysis ■ Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. – Personal Privacy from government privacy abuse – Identity thieves – Unscrupulous marketers – Protect communication from corporations – Skirt censorship ■ Whistleblowing & news leaks – Chinese journalist communicate onTor
  • 25. Tips ■ 1.) Don’t Download anything. ■ 2.) Don’t go to illegal sites (Duh). ■ 3.) Never pay with any credit card. ■ 4.) However, if you are going to use it because of personal privacy concerns, also be aware of the dangerous e.g., illegal material, viruses, and slow websites!
  • 26. References ■ How the DeepWebWorks: http://computer.howstuffworks.com/internet/basics/how-the-deep-web-works.htm ■ Who usesTor: https://www.torproject.org/about/torusers.html.en ■ Tor (anonymity network) https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29