DARK WEB
 DarkWeb ,also known as deep web is the
hidden part of the web.
 The DarkWeb contains information that is
not searchable using the traditional search
engines such as google ,yahoo ,etc.
 DarkWebs are not indexed and therefore are
not tracable.
How Search Engines Work
 Uses Web crawler softwares called as spiders
to construct a database of the web.
 The spider gets a new copy of each pages
and index it.
 Eventually all reachable pages are indexed.
 The collection of reachable pages defines the
Surface web.
The Onion Router(TOR)
 Tor is a software that installs into your
browser and sets up the specific connections
you need to access dark websites.
 Critically it’s a free software for enabling
online anonymity and censorship resistance.
 UsingTor makes more difficult to trace
internet activity ,including visit to websites
,online posts ,instant messages,and other
communication forms.
CONTENTS FOUND ON DARK WEB
 Webpages with no links on them,
called disconnected pages.
 Password protected webpages.
 Webpages generated from database
 Dynamically generated webpages.
 Real-time content
 Webpages that require a
registration form to access.
Advantages
 Specialized content focus – large amounts
of information focused on an exact subject
 Contains information that might not be
available on the visible web
 Allows a user to find a precise answer to a
specific question
 Allows a user to find web pages from a
specific date or time
Dangers of the Dark Web
 If you decide to look into the DeepWeb on
your own volition, make sure to be careful
 DDoS attacks can happen.
 Be intelligent about what links you click.The
DeepWeb is a heaven for Hackers.
 If you don’t want to see any disturbing
images or content, simply browse as text-
only.
How to Access Safely
 Vertical and Split Searching
 Proxies (namelyTor) and AV programs.
 Turn off ALL plug ins before accessing
(especially the shady parts).
 If your computer has a webcam, remove or
obstruct it.
 Stay away from anything that looks remotely
criminal or suggestive.
 Use a safe, private network connection.
Dark wed

Dark wed

  • 2.
    DARK WEB  DarkWeb,also known as deep web is the hidden part of the web.  The DarkWeb contains information that is not searchable using the traditional search engines such as google ,yahoo ,etc.  DarkWebs are not indexed and therefore are not tracable.
  • 4.
    How Search EnginesWork  Uses Web crawler softwares called as spiders to construct a database of the web.  The spider gets a new copy of each pages and index it.  Eventually all reachable pages are indexed.  The collection of reachable pages defines the Surface web.
  • 5.
    The Onion Router(TOR) Tor is a software that installs into your browser and sets up the specific connections you need to access dark websites.  Critically it’s a free software for enabling online anonymity and censorship resistance.  UsingTor makes more difficult to trace internet activity ,including visit to websites ,online posts ,instant messages,and other communication forms.
  • 6.
    CONTENTS FOUND ONDARK WEB  Webpages with no links on them, called disconnected pages.  Password protected webpages.  Webpages generated from database  Dynamically generated webpages.  Real-time content  Webpages that require a registration form to access.
  • 9.
    Advantages  Specialized contentfocus – large amounts of information focused on an exact subject  Contains information that might not be available on the visible web  Allows a user to find a precise answer to a specific question  Allows a user to find web pages from a specific date or time
  • 10.
    Dangers of theDark Web  If you decide to look into the DeepWeb on your own volition, make sure to be careful  DDoS attacks can happen.  Be intelligent about what links you click.The DeepWeb is a heaven for Hackers.  If you don’t want to see any disturbing images or content, simply browse as text- only.
  • 11.
    How to AccessSafely  Vertical and Split Searching  Proxies (namelyTor) and AV programs.  Turn off ALL plug ins before accessing (especially the shady parts).  If your computer has a webcam, remove or obstruct it.  Stay away from anything that looks remotely criminal or suggestive.  Use a safe, private network connection.