Dark wed

Dark wed
DARK WEB
 DarkWeb ,also known as deep web is the
hidden part of the web.
 The DarkWeb contains information that is
not searchable using the traditional search
engines such as google ,yahoo ,etc.
 DarkWebs are not indexed and therefore are
not tracable.
Dark wed
How Search Engines Work
 Uses Web crawler softwares called as spiders
to construct a database of the web.
 The spider gets a new copy of each pages
and index it.
 Eventually all reachable pages are indexed.
 The collection of reachable pages defines the
Surface web.
The Onion Router(TOR)
 Tor is a software that installs into your
browser and sets up the specific connections
you need to access dark websites.
 Critically it’s a free software for enabling
online anonymity and censorship resistance.
 UsingTor makes more difficult to trace
internet activity ,including visit to websites
,online posts ,instant messages,and other
communication forms.
CONTENTS FOUND ON DARK WEB
 Webpages with no links on them,
called disconnected pages.
 Password protected webpages.
 Webpages generated from database
 Dynamically generated webpages.
 Real-time content
 Webpages that require a
registration form to access.
Dark wed
Dark wed
Advantages
 Specialized content focus – large amounts
of information focused on an exact subject
 Contains information that might not be
available on the visible web
 Allows a user to find a precise answer to a
specific question
 Allows a user to find web pages from a
specific date or time
Dangers of the Dark Web
 If you decide to look into the DeepWeb on
your own volition, make sure to be careful
 DDoS attacks can happen.
 Be intelligent about what links you click.The
DeepWeb is a heaven for Hackers.
 If you don’t want to see any disturbing
images or content, simply browse as text-
only.
How to Access Safely
 Vertical and Split Searching
 Proxies (namelyTor) and AV programs.
 Turn off ALL plug ins before accessing
(especially the shady parts).
 If your computer has a webcam, remove or
obstruct it.
 Stay away from anything that looks remotely
criminal or suggestive.
 Use a safe, private network connection.
Dark wed
1 de 12

Recomendados

The Deep and Dark Web por
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark WebSwecha | స్వేచ్ఛ
27.6K visualizações22 slides
The Dark side of the Web por
The Dark side of the WebThe Dark side of the Web
The Dark side of the WebPaula Ripoll Cacho
3.3K visualizações12 slides
The dark web por
The dark webThe dark web
The dark webhellboytonmoy
2.7K visualizações21 slides
The Dark Web por
The Dark WebThe Dark Web
The Dark WebSuraj Jaundoo
3.8K visualizações8 slides
Deep web por
Deep webDeep web
Deep webAbu Kaisar
1.2K visualizações11 slides
Introduction To Dark Web por
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark WebAdityakumar Yadav
1.4K visualizações10 slides

Mais conteúdo relacionado

Mais procurados

Deep Web - what to do and what not to do por
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do Cysinfo Cyber Security Community
4.1K visualizações35 slides
The dark web por
The dark webThe dark web
The dark webBella M
8.6K visualizações6 slides
Journey To The Dark Web por
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
1.8K visualizações20 slides
Dark Web and Privacy por
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
4.1K visualizações44 slides
The Dark Web por
The Dark WebThe Dark Web
The Dark Webjamiecornista
11.7K visualizações6 slides
Deep web and dark web por
Deep web and dark webDeep web and dark web
Deep web and dark webVaishali Misra
899 visualizações17 slides

Mais procurados(20)

The dark web por Bella M
The dark webThe dark web
The dark web
Bella M8.6K visualizações
Journey To The Dark Web por MiteshWani
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
MiteshWani1.8K visualizações
Dark Web and Privacy por Brian Pichman
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman4.1K visualizações
The Dark Web por jamiecornista
The Dark WebThe Dark Web
The Dark Web
jamiecornista11.7K visualizações
Deep web and dark web por Vaishali Misra
Deep web and dark webDeep web and dark web
Deep web and dark web
Vaishali Misra899 visualizações
Dark and Deep web por Khaled Sany
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany5.3K visualizações
Dark net por Mudasser Afzal
Dark netDark net
Dark net
Mudasser Afzal1.4K visualizações
Dark web presentation por To Mal
Dark web presentationDark web presentation
Dark web presentation
To Mal5.5K visualizações
The Dark Web by Kenneth Yu por Kenny Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu484 visualizações
Dark web por Safwan Hashmi
Dark webDark web
Dark web
Safwan Hashmi2.2K visualizações
Investigating Using the Dark Web por Case IQ
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
Case IQ8K visualizações
Dark web por aakshidhingra
Dark webDark web
Dark web
aakshidhingra310 visualizações
Deep web and Dark web por Parvez Hossain
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
Parvez Hossain2.2K visualizações
The Dark Web por Connor Willer
The Dark WebThe Dark Web
The Dark Web
Connor Willer3.2K visualizações
Guide to dark web por Jspider - Noida
Guide to dark webGuide to dark web
Guide to dark web
Jspider - Noida723 visualizações
Dark web by Pranesh Kulkarni por PraneshKulkarni22
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
PraneshKulkarni22606 visualizações
The Dark Web por Jan Siy
The Dark WebThe Dark Web
The Dark Web
Jan Siy1.5K visualizações

Destaque

Pod tren granada-1 por
Pod tren granada-1Pod tren granada-1
Pod tren granada-1CGT Correos-Granada
190 visualizações5 slides
Dampak pemanasan global por
Dampak pemanasan globalDampak pemanasan global
Dampak pemanasan globalHackmau5
1.3K visualizações16 slides
Graphic Design por
Graphic DesignGraphic Design
Graphic DesignBen Fayza
12.5K visualizações23 slides
The Dark web - Why the hidden part of the web is even more dangerous? por
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
22.1K visualizações32 slides
The Dark Net por
The Dark NetThe Dark Net
The Dark NetManabu Kobayashi
5.1K visualizações8 slides
Deep Web & Dark Web por
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark WebPaolo Vedorin
3.2K visualizações25 slides

Destaque(20)

Dampak pemanasan global por Hackmau5
Dampak pemanasan globalDampak pemanasan global
Dampak pemanasan global
Hackmau51.3K visualizações
Graphic Design por Ben Fayza
Graphic DesignGraphic Design
Graphic Design
Ben Fayza12.5K visualizações
The Dark web - Why the hidden part of the web is even more dangerous? por Pierluigi Paganini
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
Pierluigi Paganini22.1K visualizações
The Dark Net por Manabu Kobayashi
The Dark NetThe Dark Net
The Dark Net
Manabu Kobayashi5.1K visualizações
Deep Web & Dark Web por Paolo Vedorin
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
Paolo Vedorin3.2K visualizações
3D Modelig presentation (.ppt) 371 SE por guest1460e5
3D Modelig presentation (.ppt) 371 SE3D Modelig presentation (.ppt) 371 SE
3D Modelig presentation (.ppt) 371 SE
guest1460e521.6K visualizações
Darknet por Hiro Oshikawa
DarknetDarknet
Darknet
Hiro Oshikawa9.7K visualizações
3Com 3C905C-TX I por savomir
3Com 3C905C-TX I3Com 3C905C-TX I
3Com 3C905C-TX I
savomir39 visualizações
3Com 1695-010-000 6 por savomir
3Com 1695-010-000 63Com 1695-010-000 6
3Com 1695-010-000 6
savomir41 visualizações
Las etapas de formación del castellano por Julio Castañeda
Las etapas de formación del castellanoLas etapas de formación del castellano
Las etapas de formación del castellano
Julio Castañeda2.2K visualizações
Quy tắc an toàn khi dùng súng xiết bu lông Ingersoll Rand por Long Trump
Quy tắc an toàn khi dùng súng xiết bu lông Ingersoll RandQuy tắc an toàn khi dùng súng xiết bu lông Ingersoll Rand
Quy tắc an toàn khi dùng súng xiết bu lông Ingersoll Rand
Long Trump212 visualizações
My school - Gimnazjum im.ks. Stanisława Konarskiego by Beata Lichoń por magdajanusz
 My school - Gimnazjum im.ks. Stanisława Konarskiego by Beata Lichoń My school - Gimnazjum im.ks. Stanisława Konarskiego by Beata Lichoń
My school - Gimnazjum im.ks. Stanisława Konarskiego by Beata Lichoń
magdajanusz131 visualizações
S4 tarea4 alhem por mapilar99
S4 tarea4 alhemS4 tarea4 alhem
S4 tarea4 alhem
mapilar99169 visualizações
38141443 hak-asasi-kanak-kanak por umiefatiya
38141443 hak-asasi-kanak-kanak38141443 hak-asasi-kanak-kanak
38141443 hak-asasi-kanak-kanak
umiefatiya9.4K visualizações
Натуральные подарочные конфеты из орехов и сухофруктов с логотипом por Igor Prokhorov
Натуральные подарочные конфеты из орехов и сухофруктов с логотипомНатуральные подарочные конфеты из орехов и сухофруктов с логотипом
Натуральные подарочные конфеты из орехов и сухофруктов с логотипом
Igor Prokhorov258 visualizações
Daughters perfection por Arish Roy
Daughters perfectionDaughters perfection
Daughters perfection
Arish Roy215 visualizações
Estudio de rentabilidad para la creación de bar especialista en cocteles en ... por Freddy Alexis Velasco Otero
Estudio de rentabilidad para la creación  de bar especialista en cocteles en ...Estudio de rentabilidad para la creación  de bar especialista en cocteles en ...
Estudio de rentabilidad para la creación de bar especialista en cocteles en ...
Freddy Alexis Velasco Otero2.7K visualizações
Question 4 por abdinasir omar
Question 4Question 4
Question 4
abdinasir omar154 visualizações

Similar a Dark wed

Invisible Web por
Invisible Web Invisible Web
Invisible Web Muhammad Azeem Mazhar
82 visualizações26 slides
Deep web por
Deep webDeep web
Deep webGauravPandey319
104 visualizações15 slides
Ali shahbazi khojasteh - deep web por
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli Shahbazi Khojasteh
383 visualizações34 slides
Dark Web.pptx por
Dark Web.pptxDark Web.pptx
Dark Web.pptxSoumen Debgupta
4 visualizações78 slides
Darkweb por
DarkwebDarkweb
DarkwebCHANDRESH PAL
148 visualizações14 slides
Deep Web por
Deep WebDeep Web
Deep WebRahulPawar320
6 visualizações2 slides

Similar a Dark wed(20)

Deep web por GauravPandey319
Deep webDeep web
Deep web
GauravPandey319104 visualizações
Ali shahbazi khojasteh - deep web por Ali Shahbazi Khojasteh
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh383 visualizações
Dark Web.pptx por Soumen Debgupta
Dark Web.pptxDark Web.pptx
Dark Web.pptx
Soumen Debgupta4 visualizações
Darkweb por CHANDRESH PAL
DarkwebDarkweb
Darkweb
CHANDRESH PAL148 visualizações
Deep Web por RahulPawar320
Deep WebDeep Web
Deep Web
RahulPawar3206 visualizações
Darknet (Chua, Maris) por Maris Chua
Darknet (Chua, Maris)Darknet (Chua, Maris)
Darknet (Chua, Maris)
Maris Chua436 visualizações
Dark web by Claudine Impas por Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
Claudine Impas769 visualizações
Spooky Halloween IT Security Lecture -- The Deep Web por Nicholas Davis
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
Nicholas Davis504 visualizações
Cybersecurity, Hacking, and Privacy por Nicholas Davis
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
Nicholas Davis1.1K visualizações
Cyber crime- a case study por Shubh Thakkar
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar1.2K visualizações
Darkle Slideshow _ by Slidesgo.pptx por JamalAmzil6
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
JamalAmzil624 visualizações
Deep and Dark web por Nihal Ahmed
Deep and Dark webDeep and Dark web
Deep and Dark web
Nihal Ahmed180 visualizações
Introduction to Deep Web por IRJET Journal
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
IRJET Journal30 visualizações
Pichman privacy, the dark web, & hacker devices i school (1) por Stephen Abram
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram199 visualizações
Deep Web por AbishaiDas
Deep WebDeep Web
Deep Web
AbishaiDas177 visualizações
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh19 visualizações

Último

Network Source of Truth and Infrastructure as Code revisited por
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
52 visualizações45 slides
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
144 visualizações12 slides
Ransomware is Knocking your Door_Final.pdf por
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
90 visualizações46 slides
The Role of Patterns in the Era of Large Language Models por
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
80 visualizações65 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
153 visualizações59 slides
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
181 visualizações19 slides

Último(20)

Network Source of Truth and Infrastructure as Code revisited por Network Automation Forum
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum52 visualizações
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp90 visualizações
The Role of Patterns in the Era of Large Language Models por Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li80 visualizações
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 visualizações
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue181 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 visualizações
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 visualizações
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue por ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue176 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 visualizações
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 visualizações
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 visualizações
Business Analyst Series 2023 - Week 4 Session 7 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 visualizações
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 visualizações
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum50 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 visualizações
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 visualizações
The Power of Heat Decarbonisation Plans in the Built Environment por IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 visualizações
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 visualizações

Dark wed

  • 2. DARK WEB  DarkWeb ,also known as deep web is the hidden part of the web.  The DarkWeb contains information that is not searchable using the traditional search engines such as google ,yahoo ,etc.  DarkWebs are not indexed and therefore are not tracable.
  • 4. How Search Engines Work  Uses Web crawler softwares called as spiders to construct a database of the web.  The spider gets a new copy of each pages and index it.  Eventually all reachable pages are indexed.  The collection of reachable pages defines the Surface web.
  • 5. The Onion Router(TOR)  Tor is a software that installs into your browser and sets up the specific connections you need to access dark websites.  Critically it’s a free software for enabling online anonymity and censorship resistance.  UsingTor makes more difficult to trace internet activity ,including visit to websites ,online posts ,instant messages,and other communication forms.
  • 6. CONTENTS FOUND ON DARK WEB  Webpages with no links on them, called disconnected pages.  Password protected webpages.  Webpages generated from database  Dynamically generated webpages.  Real-time content  Webpages that require a registration form to access.
  • 9. Advantages  Specialized content focus – large amounts of information focused on an exact subject  Contains information that might not be available on the visible web  Allows a user to find a precise answer to a specific question  Allows a user to find web pages from a specific date or time
  • 10. Dangers of the Dark Web  If you decide to look into the DeepWeb on your own volition, make sure to be careful  DDoS attacks can happen.  Be intelligent about what links you click.The DeepWeb is a heaven for Hackers.  If you don’t want to see any disturbing images or content, simply browse as text- only.
  • 11. How to Access Safely  Vertical and Split Searching  Proxies (namelyTor) and AV programs.  Turn off ALL plug ins before accessing (especially the shady parts).  If your computer has a webcam, remove or obstruct it.  Stay away from anything that looks remotely criminal or suggestive.  Use a safe, private network connection.