SlideShare a Scribd company logo
BY
by
VINODKUMAR
CONTENTS OF DEEP WEB
• INTRODUCTION
• WHAT IS DEEPWEB
• WHY IT IS USE
• WHO IT IS USE
• HOW IT IS USE & WHAT IS IT
• HOW IT IS WORK
• SAFETY PRECAUSIONS
• ADVANTAGES & DISADVANTAGES
• APPLICATIONS
• CONCLUSION
INTRODUCTION
• OUR INTERNET HAVING 1000 PETTA BYTES
• TOTALLY THESE INTERNET HAVING 2 LEVELS i.e.,
1.SURFACE WEB
2.DEEP WEB , DARK WEB
• SURFACE WEB is normal web i.e., our daily uses by
normal WEB browsers.
• DEEP WEB is the some legal and some illegal
• Deep web having the data of govt. & private business
information & sienctists ,journalists data etc..,
• DARK WEB is the part of the deep web
• Dark web also called darknet . In the darknet doneing
activities of totally ILLEGAL.
• That is hacking ,drugs ,crimes and other illegal activities
where done.
DEEP WEB
DEEPWEB IS 500X GREATER THAN THE
SURFACE WEB
• DEEP WEB HAVING ZETTABYTES OF MEMORY
• THAT MEMORY IS THE TOTALLY
INVISABLE
• THIS DEEPWEB IS NOT VIEW IN THE NORMAL
WEB BROWSERS AND NORMAL SEARCH ENGIENS
• BECAUSE SEARCH ENGINES NOT PERMISSION TO
VIEW THAT DEEPWEB AND IT’S WEBSITES
• DEEP WEB HAVING SAME AS SEARCH ENGINES
AND ALSO WEBSITES…
• WHY OUR SEARCH ENGINES NOT PERMIT TO SEE
THE DEEP WEB AND ITS WEBSITES.
• The deep web, invisible web, or hidden web are
parts of the World Wide Web whose contents are
not indexed by standard search engines i.e.,
• etc.,
• Because deep websites having dynamic pages i.e.,
in this pages having the data more personalized.
WHY IT IS USE
• DATA WILL BE MORE SECURE
• DATA WILL BE NOT VISIBLE TO OTHERS
• NOT ACCESS DATA USING BROWSERS
WITHOUT UR PERMISSION
WHO IT IS USE
• MAINLY USE OF THIS MILITARY PURPOSE
• SCIENTIST
• BUSINESS PERSONS
• POLICEMENS
• GOVT.(OVERAL WORLD)
HOW IT IS USE & WHAT IS IT
• USING OF DEEP WEB THE BROWSER IS
• Tor is an anonymously browsing network. TOR
is “The Onion Router,” because of the
technique it uses to provide anonymity. Onion
routing means that messages and
communication are encapsulated in layers of
encryption, like onion layers…..
HOW IT IS WORKS
Encrypted data is transmitted through a series of nodes and relays
to taking the data from the deep websites without knowing ur IP
address , and our location & ur details..
DARKNET BUSINESSES
• BASED ON THE BUYING & SELLING ACTIVIES FOR
MANY WEBSITES ARE IN THERE…
• I.e.,1.SILKROAD (DRUGS)
• 2. Nucleus Market Etc.,
• In the dark net business uses the currency of
BITCOINS
• BITCOIN VALUE IS VERY HIGH..
• 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY
SAFETY PRECAUSIONS
• 1. Don’t trust anyone out there in the deep web.
• 2. COVER your webcam using tape OR removing
it.
• 3. Never download any files or software from
deep web.
• 4. If you want some extra protection disable java
scripts
• 5. Don't use U torrent or any other torrenting
services while surfing on the deep web.
ADVANTAGES
1. Anonymity
2. Freedom to SEARCH
3. more Knowledge gain
4. you can publish & do any thing
5.You can’t fear
6.Open banned websites also.
DISADVANTAGES
• 1. The Deep Web doesn't work as smoothly
• 2.Slow compare to our normal browsers.
• 3.piracy is increases
• 4.hacking is fastly grown.
• 5.prison to Illegal activities
APPLICATIONS
• 1.MILITARY PURPOSE
• 2.SCIENCTISTS
• 3.JOURNALISTS
• 4. TO OPEN ANY BANNED SITES
• 5. ANONYMOUSLY
CONCLUSION
• DEEP WEB AND DARKWEB ARE HAVING
LARGE AMOUNT OF DATA.IF WE USE IT LEGAL
PURPOSE ONLY.BUT NOT ILLEGALLY PLZ…
• IF WE USE.. THAT IS DEPENDING UP ON YOUR
OWN RISK
Deepweb and darkweb vinodkumar ancha
Ad

More Related Content

What's hot (20)

The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo
 
Dark wed
Dark wedDark wed
Dark wed
AraVind Pillai
 
Dark web
Dark webDark web
Dark web
Safwan Hashmi
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
university of Gujrat, pakistan
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
jitiyaashwin
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 
Darkweb
DarkwebDarkweb
Darkweb
Sateesh Gollapudi
 
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
Connor Willer
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
To Mal
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal
 
Dark net
Dark netDark net
Dark net
Mudasser Afzal
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
Jspider - Noida
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
MiteshWani
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
Andres Baravalle
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
RajanshumanPradhan2
 

Similar to Deepweb and darkweb vinodkumar ancha (20)

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh
 
Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark web
IkramUlhaq401878
 
Darkweb
DarkwebDarkweb
Darkweb
CHANDRESH PAL
 
Case Study on Dark Web:Insights, Risks & Security Measures
Case Study on Dark Web:Insights, Risks & Security MeasuresCase Study on Dark Web:Insights, Risks & Security Measures
Case Study on Dark Web:Insights, Risks & Security Measures
BNAWAZALIHASHMI
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
Arjith K Raj
 
Dark Web Presentation.pptx
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptx
AbhinavRaj219245
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
Ali Saif Mirza
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
Jeroen Baert
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
Japneet Singh
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
Bangladesh Network Operators Group
 
Dark web technology based ppt for power pt
Dark web technology based ppt for power ptDark web technology based ppt for power pt
Dark web technology based ppt for power pt
murug9700
 
Darknet
DarknetDarknet
Darknet
Rafel Ivgi
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
Tom Kranz
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
Nico Escalona
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
IbrahimSami14
 
The deep web
The deep webThe deep web
The deep web
Cole Yarto
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
JamalAmzil6
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh
 
Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark web
IkramUlhaq401878
 
Case Study on Dark Web:Insights, Risks & Security Measures
Case Study on Dark Web:Insights, Risks & Security MeasuresCase Study on Dark Web:Insights, Risks & Security Measures
Case Study on Dark Web:Insights, Risks & Security Measures
BNAWAZALIHASHMI
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
Arjith K Raj
 
Dark Web Presentation.pptx
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptx
AbhinavRaj219245
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
Ali Saif Mirza
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
Jeroen Baert
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
Japneet Singh
 
Dark web technology based ppt for power pt
Dark web technology based ppt for power ptDark web technology based ppt for power pt
Dark web technology based ppt for power pt
murug9700
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
Tom Kranz
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
IbrahimSami14
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
JamalAmzil6
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
Ad

Recently uploaded (19)

5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
Ad

Deepweb and darkweb vinodkumar ancha

  • 2. CONTENTS OF DEEP WEB • INTRODUCTION • WHAT IS DEEPWEB • WHY IT IS USE • WHO IT IS USE • HOW IT IS USE & WHAT IS IT • HOW IT IS WORK • SAFETY PRECAUSIONS • ADVANTAGES & DISADVANTAGES • APPLICATIONS • CONCLUSION
  • 3. INTRODUCTION • OUR INTERNET HAVING 1000 PETTA BYTES • TOTALLY THESE INTERNET HAVING 2 LEVELS i.e., 1.SURFACE WEB 2.DEEP WEB , DARK WEB • SURFACE WEB is normal web i.e., our daily uses by normal WEB browsers. • DEEP WEB is the some legal and some illegal • Deep web having the data of govt. & private business information & sienctists ,journalists data etc.., • DARK WEB is the part of the deep web • Dark web also called darknet . In the darknet doneing activities of totally ILLEGAL. • That is hacking ,drugs ,crimes and other illegal activities where done.
  • 4. DEEP WEB DEEPWEB IS 500X GREATER THAN THE SURFACE WEB
  • 5. • DEEP WEB HAVING ZETTABYTES OF MEMORY • THAT MEMORY IS THE TOTALLY INVISABLE • THIS DEEPWEB IS NOT VIEW IN THE NORMAL WEB BROWSERS AND NORMAL SEARCH ENGIENS • BECAUSE SEARCH ENGINES NOT PERMISSION TO VIEW THAT DEEPWEB AND IT’S WEBSITES • DEEP WEB HAVING SAME AS SEARCH ENGINES AND ALSO WEBSITES…
  • 6. • WHY OUR SEARCH ENGINES NOT PERMIT TO SEE THE DEEP WEB AND ITS WEBSITES. • The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines i.e., • etc., • Because deep websites having dynamic pages i.e., in this pages having the data more personalized.
  • 7. WHY IT IS USE • DATA WILL BE MORE SECURE • DATA WILL BE NOT VISIBLE TO OTHERS • NOT ACCESS DATA USING BROWSERS WITHOUT UR PERMISSION
  • 8. WHO IT IS USE • MAINLY USE OF THIS MILITARY PURPOSE • SCIENTIST • BUSINESS PERSONS • POLICEMENS • GOVT.(OVERAL WORLD)
  • 9. HOW IT IS USE & WHAT IS IT • USING OF DEEP WEB THE BROWSER IS • Tor is an anonymously browsing network. TOR is “The Onion Router,” because of the technique it uses to provide anonymity. Onion routing means that messages and communication are encapsulated in layers of encryption, like onion layers…..
  • 10. HOW IT IS WORKS Encrypted data is transmitted through a series of nodes and relays to taking the data from the deep websites without knowing ur IP address , and our location & ur details..
  • 11. DARKNET BUSINESSES • BASED ON THE BUYING & SELLING ACTIVIES FOR MANY WEBSITES ARE IN THERE… • I.e.,1.SILKROAD (DRUGS) • 2. Nucleus Market Etc., • In the dark net business uses the currency of BITCOINS • BITCOIN VALUE IS VERY HIGH.. • 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY
  • 12. SAFETY PRECAUSIONS • 1. Don’t trust anyone out there in the deep web. • 2. COVER your webcam using tape OR removing it. • 3. Never download any files or software from deep web. • 4. If you want some extra protection disable java scripts • 5. Don't use U torrent or any other torrenting services while surfing on the deep web.
  • 13. ADVANTAGES 1. Anonymity 2. Freedom to SEARCH 3. more Knowledge gain 4. you can publish & do any thing 5.You can’t fear 6.Open banned websites also.
  • 14. DISADVANTAGES • 1. The Deep Web doesn't work as smoothly • 2.Slow compare to our normal browsers. • 3.piracy is increases • 4.hacking is fastly grown. • 5.prison to Illegal activities
  • 15. APPLICATIONS • 1.MILITARY PURPOSE • 2.SCIENCTISTS • 3.JOURNALISTS • 4. TO OPEN ANY BANNED SITES • 5. ANONYMOUSLY
  • 16. CONCLUSION • DEEP WEB AND DARKWEB ARE HAVING LARGE AMOUNT OF DATA.IF WE USE IT LEGAL PURPOSE ONLY.BUT NOT ILLEGALLY PLZ… • IF WE USE.. THAT IS DEPENDING UP ON YOUR OWN RISK