SlideShare a Scribd company logo
THE DEEPWEB
(also called the Deepnet, the Invisible Web,
the Darknet, the Undernet or the hidden Web)
WHAT IS THE DEEPWEB?
 The Deep Web is World Wide Web content that is
not part of the Surface Web, which is indexed by
standard search engines.
 The "visible web" is what you can find using general
web search engines. It's also what you see in
almost all subject directories. The "invisible web" is
what you cannot find using these types of browsers.
A KIND OF STORY ABOUT THE DEEPWEB
The first version of this web page was written in 2000, when this topic
was new and baffling to many web searchers. Since then, search
engines' crawlers and indexing programs have overcome many of
the technical barriers that made it impossible for them to find
"invisible" web pages.
These types of pages used to be invisible but can now be found in most
search engine results:
 Pages in non-HTML formats (pdf, Word, Excel, PowerPoint), now
converted into HTML.
 Script-based pages, whose URLs contain a ? or other script coding.
 Pages generated dynamically by other types of database software
(e.g., Active Server Pages, Cold Fusion). These can be indexed if
there is a stable URL somewhere that search engine crawlers can
find.
SIZE
Estimates based on extrapolations from a study
done at University of California, Berkeley in
2001,[3] speculate that the deep Web consists of
about 7,500 terabytes. More accurate estimates are
available for the number of resources in the deep
Web: research led by Microsoft and IBM detected
around 300,000 deep web sites in the entire Web in
2004,[4] and, according to Shestakov, around
14,000 deep web sites existed in the Russian part
of the Web in 2006.
HOW TO ACCESS TO THE DEEPWEB?
1. Before you can access any .onion sites and
search the Deep Web you will need to install the
Tor browser. The Tor browser will allow you to
reach these addresses.
2. Once Tor browser is installed you will be able
to access .onion addresses. You need to run the Tor
browser .exe which will launch the Vidalia control pannel
and connect you to the Tor network. Once that is
complete you ready to go to the Deep Web.
WHICH TYPES OF PAGES WILL YOU FIND IN
THE DEEPWEB?
How to make all kind of devices;
PENIS PANIC
SLIK ROAD
THE
HUMAN
EXPERIMENT
BUY CONG
THE HIDDEN WIKI
BITCOINS
 Bitcoin's design allows to
possess and to transfer value
anonymous. The coins can
be guarded in any computer
in the form of a file "purse",
or guarded by a third party
that offers the service of
storing this type of files. In
any of the cases, the bitcoins
can be sent by means of
Internet to anyone that has a
" Direction Bitcoin ".
1 bitcoin:
20 dollars
93.2 euros
The deepweb

More Related Content

What's hot

The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
To Mal
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
Nihal Ahmed
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
Melissa Pereira
 
Dark wed
Dark wedDark wed
Dark wed
AraVind Pillai
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
Claudine Impas
 
Deep Web
Deep WebDeep Web
Deep Web
AbishaiDas
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
Ali Saif Mirza
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
Melody Chiaoco
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
Case IQ
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
jamiecornista
 
Deep web
Deep webDeep web
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
Parvez Hossain
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leonDarwin de Leon
 

What's hot (20)

The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Dark wed
Dark wedDark wed
Dark wed
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 

Viewers also liked

Deep Web
Deep WebDeep Web
Deep WebSt John
 
Suzi presentation
Suzi presentationSuzi presentation
Suzi presentationsm91397
 
Web 2.0
Web 2.0Web 2.0
The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" Web
KAZAR Yassir
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
Eugene Kowalzki
 
Sangeetha seminar (1)
Sangeetha  seminar (1)Sangeetha  seminar (1)
Sangeetha seminar (1)
Sangeetha Mathew
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
Darwin de Leon
 
Deep web
Deep webDeep web
Deep Web
Deep WebDeep Web
Deep Web
Ahmed Khan
 
Deep web
Deep webDeep web
Deep web
ANKIT OJHA
 
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
Myeongun Ryu
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
Murray Security Services
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
Amber Horsburgh
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
Trend Micro
 
5G report
5G report5G report
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin
 

Viewers also liked (20)

Deep Web
Deep WebDeep Web
Deep Web
 
Suzi presentation
Suzi presentationSuzi presentation
Suzi presentation
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" Web
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
 
Sangeetha seminar (1)
Sangeetha  seminar (1)Sangeetha  seminar (1)
Sangeetha seminar (1)
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Deep web
Deep webDeep web
Deep web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web
Deep webDeep web
Deep web
 
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
[명우니닷컴] 인터넷과 딥웹 (Internet and DeepWeb
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
5G report
5G report5G report
5G report
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 

Similar to The deepweb

Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
Hareendran MG
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
Nitish Joshi
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
Arjith K Raj
 
Darknet
DarknetDarknet
Deep web
Deep webDeep web
Deep web
GauravPandey319
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
Damir Delija
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
Jon Kane
 
darkweb
darkwebdarkweb
darkweb
jojojostar
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
Muhammad Azeem Mazhar
 
HTML for beginners
HTML for beginnersHTML for beginners
HTML for beginners
Salahaddin University-Erbil
 
world wide web and its components and the related aspects
world wide web and its components and the related aspectsworld wide web and its components and the related aspects
world wide web and its components and the related aspects
PRAGALBH SHARMA
 
WWW and description of the web and the internet
WWW and description of the web and the internetWWW and description of the web and the internet
WWW and description of the web and the internet
PRAGALBH SHARMA
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
Nicholas Davis
 
Semantic web
Semantic webSemantic web
Semantic web
Tanvi Vahora
 
Presentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptxPresentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptx
mayurbokan
 
Web Browser
Web BrowserWeb Browser
Web Browser
Shreeram Goswami
 
Webtech
WebtechWebtech
Deep Web
Deep WebDeep Web
Deep Web
RahulPawar320
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
ismailwinofo
 
DEEP WEB by Ajit.pptx
DEEP WEB by Ajit.pptxDEEP WEB by Ajit.pptx
DEEP WEB by Ajit.pptx
AjitVerma49
 

Similar to The deepweb (20)

Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
darkweb
darkwebdarkweb
darkweb
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
HTML for beginners
HTML for beginnersHTML for beginners
HTML for beginners
 
world wide web and its components and the related aspects
world wide web and its components and the related aspectsworld wide web and its components and the related aspects
world wide web and its components and the related aspects
 
WWW and description of the web and the internet
WWW and description of the web and the internetWWW and description of the web and the internet
WWW and description of the web and the internet
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
Semantic web
Semantic webSemantic web
Semantic web
 
Presentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptxPresentation Deep Web Technology.pptx
Presentation Deep Web Technology.pptx
 
Web Browser
Web BrowserWeb Browser
Web Browser
 
Webtech
WebtechWebtech
Webtech
 
Deep Web
Deep WebDeep Web
Deep Web
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
 
DEEP WEB by Ajit.pptx
DEEP WEB by Ajit.pptxDEEP WEB by Ajit.pptx
DEEP WEB by Ajit.pptx
 

More from ALuna Ryssel

American holidays
American holidaysAmerican holidays
American holidays
ALuna Ryssel
 
What city is this
What city is thisWhat city is this
What city is this
ALuna Ryssel
 
Guess the age
Guess the ageGuess the age
Guess the age
ALuna Ryssel
 
Where are they from
Where are they fromWhere are they from
Where are they from
ALuna Ryssel
 
Riddles 6!!!
Riddles 6!!!Riddles 6!!!
Riddles 6!!!
ALuna Ryssel
 
What is the disease
What is the diseaseWhat is the disease
What is the disease
ALuna Ryssel
 
The parts of a speech
The parts of a speechThe parts of a speech
The parts of a speech
ALuna Ryssel
 
Riddles 5!!!
Riddles 5!!!Riddles 5!!!
Riddles 5!!!
ALuna Ryssel
 
Riddles 4!!!
Riddles 4!!!Riddles 4!!!
Riddles 4!!!
ALuna Ryssel
 
Riddles 2 !!!
Riddles 2 !!!Riddles 2 !!!
Riddles 2 !!!
ALuna Ryssel
 
Riddles 1 !!!
Riddles 1 !!!Riddles 1 !!!
Riddles 1 !!!
ALuna Ryssel
 
Inventions
InventionsInventions
Inventions
ALuna Ryssel
 
Group activity. what's in a first aid kit
Group activity. what's in a first aid kitGroup activity. what's in a first aid kit
Group activity. what's in a first aid kit
ALuna Ryssel
 
Christian bale
Christian baleChristian bale
Christian bale
ALuna Ryssel
 
Riddles 3!!!
Riddles 3!!!Riddles 3!!!
Riddles 3!!!
ALuna Ryssel
 

More from ALuna Ryssel (15)

American holidays
American holidaysAmerican holidays
American holidays
 
What city is this
What city is thisWhat city is this
What city is this
 
Guess the age
Guess the ageGuess the age
Guess the age
 
Where are they from
Where are they fromWhere are they from
Where are they from
 
Riddles 6!!!
Riddles 6!!!Riddles 6!!!
Riddles 6!!!
 
What is the disease
What is the diseaseWhat is the disease
What is the disease
 
The parts of a speech
The parts of a speechThe parts of a speech
The parts of a speech
 
Riddles 5!!!
Riddles 5!!!Riddles 5!!!
Riddles 5!!!
 
Riddles 4!!!
Riddles 4!!!Riddles 4!!!
Riddles 4!!!
 
Riddles 2 !!!
Riddles 2 !!!Riddles 2 !!!
Riddles 2 !!!
 
Riddles 1 !!!
Riddles 1 !!!Riddles 1 !!!
Riddles 1 !!!
 
Inventions
InventionsInventions
Inventions
 
Group activity. what's in a first aid kit
Group activity. what's in a first aid kitGroup activity. what's in a first aid kit
Group activity. what's in a first aid kit
 
Christian bale
Christian baleChristian bale
Christian bale
 
Riddles 3!!!
Riddles 3!!!Riddles 3!!!
Riddles 3!!!
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

The deepweb

  • 1. THE DEEPWEB (also called the Deepnet, the Invisible Web, the Darknet, the Undernet or the hidden Web)
  • 2. WHAT IS THE DEEPWEB?  The Deep Web is World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines.  The "visible web" is what you can find using general web search engines. It's also what you see in almost all subject directories. The "invisible web" is what you cannot find using these types of browsers.
  • 3. A KIND OF STORY ABOUT THE DEEPWEB The first version of this web page was written in 2000, when this topic was new and baffling to many web searchers. Since then, search engines' crawlers and indexing programs have overcome many of the technical barriers that made it impossible for them to find "invisible" web pages. These types of pages used to be invisible but can now be found in most search engine results:  Pages in non-HTML formats (pdf, Word, Excel, PowerPoint), now converted into HTML.  Script-based pages, whose URLs contain a ? or other script coding.  Pages generated dynamically by other types of database software (e.g., Active Server Pages, Cold Fusion). These can be indexed if there is a stable URL somewhere that search engine crawlers can find.
  • 4. SIZE Estimates based on extrapolations from a study done at University of California, Berkeley in 2001,[3] speculate that the deep Web consists of about 7,500 terabytes. More accurate estimates are available for the number of resources in the deep Web: research led by Microsoft and IBM detected around 300,000 deep web sites in the entire Web in 2004,[4] and, according to Shestakov, around 14,000 deep web sites existed in the Russian part of the Web in 2006.
  • 5.
  • 6.
  • 7. HOW TO ACCESS TO THE DEEPWEB? 1. Before you can access any .onion sites and search the Deep Web you will need to install the Tor browser. The Tor browser will allow you to reach these addresses.
  • 8. 2. Once Tor browser is installed you will be able to access .onion addresses. You need to run the Tor browser .exe which will launch the Vidalia control pannel and connect you to the Tor network. Once that is complete you ready to go to the Deep Web.
  • 9. WHICH TYPES OF PAGES WILL YOU FIND IN THE DEEPWEB? How to make all kind of devices;
  • 15. BITCOINS  Bitcoin's design allows to possess and to transfer value anonymous. The coins can be guarded in any computer in the form of a file "purse", or guarded by a third party that offers the service of storing this type of files. In any of the cases, the bitcoins can be sent by means of Internet to anyone that has a " Direction Bitcoin ". 1 bitcoin: 20 dollars 93.2 euros