SlideShare a Scribd company logo
1 of 17
BY
by
VINODKUMAR
CONTENTS OF DEEP WEB
• INTRODUCTION
• WHAT IS DEEPWEB
• WHY IT IS USE
• WHO IT IS USE
• HOW IT IS USE & WHAT IS IT
• HOW IT IS WORK
• SAFETY PRECAUSIONS
• ADVANTAGES & DISADVANTAGES
• APPLICATIONS
• CONCLUSION
INTRODUCTION
• OUR INTERNET HAVING 1000 PETTA BYTES
• TOTALLY THESE INTERNET HAVING 2 LEVELS i.e.,
1.SURFACE WEB
2.DEEP WEB , DARK WEB
• SURFACE WEB is normal web i.e., our daily uses by
normal WEB browsers.
• DEEP WEB is the some legal and some illegal
• Deep web having the data of govt. & private business
information & sienctists ,journalists data etc..,
• DARK WEB is the part of the deep web
• Dark web also called darknet . In the darknet doneing
activities of totally ILLEGAL.
• That is hacking ,drugs ,crimes and other illegal activities
where done.
DEEP WEB
DEEPWEB IS 500X GREATER THAN THE
SURFACE WEB
• DEEP WEB HAVING ZETTABYTES OF MEMORY
• THAT MEMORY IS THE TOTALLY
INVISABLE
• THIS DEEPWEB IS NOT VIEW IN THE NORMAL
WEB BROWSERS AND NORMAL SEARCH ENGIENS
• BECAUSE SEARCH ENGINES NOT PERMISSION TO
VIEW THAT DEEPWEB AND IT’S WEBSITES
• DEEP WEB HAVING SAME AS SEARCH ENGINES
AND ALSO WEBSITES…
• WHY OUR SEARCH ENGINES NOT PERMIT TO SEE
THE DEEP WEB AND ITS WEBSITES.
• The deep web, invisible web, or hidden web are
parts of the World Wide Web whose contents are
not indexed by standard search engines i.e.,
• etc.,
• Because deep websites having dynamic pages i.e.,
in this pages having the data more personalized.
WHY IT IS USE
• DATA WILL BE MORE SECURE
• DATA WILL BE NOT VISIBLE TO OTHERS
• NOT ACCESS DATA USING BROWSERS
WITHOUT UR PERMISSION
WHO IT IS USE
• MAINLY USE OF THIS MILITARY PURPOSE
• SCIENTIST
• BUSINESS PERSONS
• POLICEMENS
• GOVT.(OVERAL WORLD)
HOW IT IS USE & WHAT IS IT
• USING OF DEEP WEB THE BROWSER IS
• Tor is an anonymously browsing network. TOR
is “The Onion Router,” because of the
technique it uses to provide anonymity. Onion
routing means that messages and
communication are encapsulated in layers of
encryption, like onion layers…..
HOW IT IS WORKS
Encrypted data is transmitted through a series of nodes and relays
to taking the data from the deep websites without knowing ur IP
address , and our location & ur details..
DARKNET BUSINESSES
• BASED ON THE BUYING & SELLING ACTIVIES FOR
MANY WEBSITES ARE IN THERE…
• I.e.,1.SILKROAD (DRUGS)
• 2. Nucleus Market Etc.,
• In the dark net business uses the currency of
BITCOINS
• BITCOIN VALUE IS VERY HIGH..
• 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY
SAFETY PRECAUSIONS
• 1. Don’t trust anyone out there in the deep web.
• 2. COVER your webcam using tape OR removing
it.
• 3. Never download any files or software from
deep web.
• 4. If you want some extra protection disable java
scripts
• 5. Don't use U torrent or any other torrenting
services while surfing on the deep web.
ADVANTAGES
1. Anonymity
2. Freedom to SEARCH
3. more Knowledge gain
4. you can publish & do any thing
5.You can’t fear
6.Open banned websites also.
DISADVANTAGES
• 1. The Deep Web doesn't work as smoothly
• 2.Slow compare to our normal browsers.
• 3.piracy is increases
• 4.hacking is fastly grown.
• 5.prison to Illegal activities
APPLICATIONS
• 1.MILITARY PURPOSE
• 2.SCIENCTISTS
• 3.JOURNALISTS
• 4. TO OPEN ANY BANNED SITES
• 5. ANONYMOUSLY
CONCLUSION
• DEEP WEB AND DARKWEB ARE HAVING
LARGE AMOUNT OF DATA.IF WE USE IT LEGAL
PURPOSE ONLY.BUT NOT ILLEGALLY PLZ…
• IF WE USE.. THAT IS DEPENDING UP ON YOUR
OWN RISK
Deepweb and darkweb vinodkumar ancha

More Related Content

What's hot

What's hot (20)

The dark web
The dark webThe dark web
The dark web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web
Dark webDark web
Dark web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark Web
Dark WebDark Web
Dark Web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Dark web
Dark webDark web
Dark web
 
Dark wed
Dark wedDark wed
Dark wed
 

Similar to Deepweb and darkweb vinodkumar ancha

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webIkramUlhaq401878
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
Dark Web Presentation.pptx
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptxAbhinavRaj219245
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion routerJapneet Singh
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxJamalAmzil6
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 

Similar to Deepweb and darkweb vinodkumar ancha (20)

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark web
 
Darkweb
DarkwebDarkweb
Darkweb
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Dark Web Presentation.pptx
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptx
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Darknet
DarknetDarknet
Darknet
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
The deep web
The deep webThe deep web
The deep web
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Darknet
DarknetDarknet
Darknet
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 

Recently uploaded

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Internet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxInternet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxErYashwantJagtap
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (17)

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Internet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxInternet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Deepweb and darkweb vinodkumar ancha

  • 2. CONTENTS OF DEEP WEB • INTRODUCTION • WHAT IS DEEPWEB • WHY IT IS USE • WHO IT IS USE • HOW IT IS USE & WHAT IS IT • HOW IT IS WORK • SAFETY PRECAUSIONS • ADVANTAGES & DISADVANTAGES • APPLICATIONS • CONCLUSION
  • 3. INTRODUCTION • OUR INTERNET HAVING 1000 PETTA BYTES • TOTALLY THESE INTERNET HAVING 2 LEVELS i.e., 1.SURFACE WEB 2.DEEP WEB , DARK WEB • SURFACE WEB is normal web i.e., our daily uses by normal WEB browsers. • DEEP WEB is the some legal and some illegal • Deep web having the data of govt. & private business information & sienctists ,journalists data etc.., • DARK WEB is the part of the deep web • Dark web also called darknet . In the darknet doneing activities of totally ILLEGAL. • That is hacking ,drugs ,crimes and other illegal activities where done.
  • 4. DEEP WEB DEEPWEB IS 500X GREATER THAN THE SURFACE WEB
  • 5. • DEEP WEB HAVING ZETTABYTES OF MEMORY • THAT MEMORY IS THE TOTALLY INVISABLE • THIS DEEPWEB IS NOT VIEW IN THE NORMAL WEB BROWSERS AND NORMAL SEARCH ENGIENS • BECAUSE SEARCH ENGINES NOT PERMISSION TO VIEW THAT DEEPWEB AND IT’S WEBSITES • DEEP WEB HAVING SAME AS SEARCH ENGINES AND ALSO WEBSITES…
  • 6. • WHY OUR SEARCH ENGINES NOT PERMIT TO SEE THE DEEP WEB AND ITS WEBSITES. • The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines i.e., • etc., • Because deep websites having dynamic pages i.e., in this pages having the data more personalized.
  • 7. WHY IT IS USE • DATA WILL BE MORE SECURE • DATA WILL BE NOT VISIBLE TO OTHERS • NOT ACCESS DATA USING BROWSERS WITHOUT UR PERMISSION
  • 8. WHO IT IS USE • MAINLY USE OF THIS MILITARY PURPOSE • SCIENTIST • BUSINESS PERSONS • POLICEMENS • GOVT.(OVERAL WORLD)
  • 9. HOW IT IS USE & WHAT IS IT • USING OF DEEP WEB THE BROWSER IS • Tor is an anonymously browsing network. TOR is “The Onion Router,” because of the technique it uses to provide anonymity. Onion routing means that messages and communication are encapsulated in layers of encryption, like onion layers…..
  • 10. HOW IT IS WORKS Encrypted data is transmitted through a series of nodes and relays to taking the data from the deep websites without knowing ur IP address , and our location & ur details..
  • 11. DARKNET BUSINESSES • BASED ON THE BUYING & SELLING ACTIVIES FOR MANY WEBSITES ARE IN THERE… • I.e.,1.SILKROAD (DRUGS) • 2. Nucleus Market Etc., • In the dark net business uses the currency of BITCOINS • BITCOIN VALUE IS VERY HIGH.. • 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY
  • 12. SAFETY PRECAUSIONS • 1. Don’t trust anyone out there in the deep web. • 2. COVER your webcam using tape OR removing it. • 3. Never download any files or software from deep web. • 4. If you want some extra protection disable java scripts • 5. Don't use U torrent or any other torrenting services while surfing on the deep web.
  • 13. ADVANTAGES 1. Anonymity 2. Freedom to SEARCH 3. more Knowledge gain 4. you can publish & do any thing 5.You can’t fear 6.Open banned websites also.
  • 14. DISADVANTAGES • 1. The Deep Web doesn't work as smoothly • 2.Slow compare to our normal browsers. • 3.piracy is increases • 4.hacking is fastly grown. • 5.prison to Illegal activities
  • 15. APPLICATIONS • 1.MILITARY PURPOSE • 2.SCIENCTISTS • 3.JOURNALISTS • 4. TO OPEN ANY BANNED SITES • 5. ANONYMOUSLY
  • 16. CONCLUSION • DEEP WEB AND DARKWEB ARE HAVING LARGE AMOUNT OF DATA.IF WE USE IT LEGAL PURPOSE ONLY.BUT NOT ILLEGALLY PLZ… • IF WE USE.. THAT IS DEPENDING UP ON YOUR OWN RISK