SlideShare uma empresa Scribd logo
DARK NETDARK NET
1
Preparad by: Jangezkhan Arif khamu
Group ‘B’
3th
Stage
University of Duhok
College of science
Computer Department
PRESENTATION
Contents Of Deep webContents Of Deep web
2
• Introduction .
• How can open or go inside the tor ?
• History .
• what is inside the Dark Net ?
• Ones who visited Dark net , what is their purpose ?
• How work results perform ?
• What Should suffix of the websites inside dark net ?
• Bitcoin .
• Conclusion .
Dark net ... Is a place to kill and material of
Anesthetic, and hacking..... etc.
The Internet is not only Google, Facebook, Yahoo Instagram,
YouTube, Amazon, and others, so when writing this report a
number of sites reached more than one billion and one hundred and
forty-four million.
All sites only 4% deals with online business made of, now the
question here is, what about 96% of the site and the latest work in
where?
3
Introduction
4
In the world on a wide range of Internet you from that only 4%
of the work you see and fall dramatically, but somewhere else
there, although they say the Web drop out of this dark network
(deep web, web-dim), here this side of the second work and 96%
of the Internet.
Introduction
How can open or go inside the tor?How can open or go inside the tor?
• Of course, you can not go deep inside the Internet using
Google Chrome, Firefox, Opera, Safari, etc. but you need to
use the Tor project, this Tor project is not private, everyone
can use it.
5
Now let know what is (TOR) project?
•Tor is free software for enabling anonymous communication. The name is derived from an
acronym for the original software project name "The Onion Router". Tor directs Internet
traffic through a free, worldwide, volunteer overlay network consisting of more than seven
thousand relays to conceal a user's location and usage from anyone conducting network
surveillance or traffic analysis.
• The core principle of Tor, "onion routing", was developed
in the mid-1990s by the United States Naval Research
Laboratory employees, mathematician Paul Syverson,
and computer scientists Michael G. Reed and David
Goldschlag, with the purpose of protecting U.S.
intelligence communications online. Onion routing was
further developed by DARPA in 1997.
6
History
what is inside the Dark Net?what is inside the Dark Net?
1.Used for Hack.
2.sell all kind of weapon.
3.Business with human, especially the child.
4.buy video and erotic graphics.
5.Buy of document in secret .
6.buy and sell of program computer and mobile with
cheaper price.
7
Ones who visited Dark net , what is their purpose?Ones who visited Dark net , what is their purpose?
According to after statistical of official of tor project,
rate as such :
1.The rate of 15. 4% is private to buy any of the material of Anesthetic.
2.The rate of 9% buy and of program.
3.The rate of 5. 6% for hack peoples (you pay money and personal you are
applicant to hack hem).
4.The rate of 4. 24 % for host and domain.
5.The rate of 3. 70% for engine .
It stay is private deal with human and kill peoples and
erotic aggression.. Etc.
8
How work results perform?How work results perform?
9
All people inside Dark net,
unknown person,
It mean no one knows their
identity,
No murder request and no the
murderer know each other,
but first aspect request to kill or
buy material.
What Should suffix of the websites inside dark net?What Should suffix of the websites inside dark net?
• Of course that normal suffix or domain is org, info, net, edu,.
Etc,
• but on dark net all of them should be end with (onion).
• Most of the code of project net written by (python) language.
10
BitcoinBitcoin
What is bitcoin?
•Money is online and There is no Relationship with any country
and any bank, by Unknown named (Satoshi Nakamoto) and in
13`October 2008 outed.
11
The value of bitcoin is:
•Earlier each bitcoin value 150$,
•But now each bitcoin value more than 7000$.
How is this money get ?
•Become coin based on several equation of mathematics of institution, so that
money with hand blame on, it is necessary to get this money, you need to solve
the equation in a minimum period.
• The end talks my all side knows what
happening inside the internet, and
understand that internet not just
Facebook and chat, but there is world
else and we not know.
12
Conclusion
13
Question ?
Any
14
FORFOR
ATTENTIOATTENTIO

Mais conteúdo relacionado

Mais procurados

Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
Marco Balduzzi
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
John Liu
 
Deep web
Deep webDeep web
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
Manabu Kobayashi
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
Darwin de Leon
 
Deep web
Deep webDeep web
Deep web
V C
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
Case IQ
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
Pierluigi Paganini
 
Darknet
DarknetDarknet
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
Melody Chiaoco
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
Andrew Delamarter
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
Bangladesh Network Operators Group
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
Paige Rasid
 

Mais procurados (20)

Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Darknet
DarknetDarknet
Darknet
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Deep web
Deep webDeep web
Deep web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 

Semelhante a Dark Net

Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
Jack Maynard
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal
 
An Analysis Of The Deep Web
An Analysis Of The Deep WebAn Analysis Of The Deep Web
An Analysis Of The Deep Web
Joe Osborn
 
Dark Web
Dark WebDark Web
Dark Web
KunalDas889957
 
Dark net
Dark netDark net
Dark net
Mudasser Afzal
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
Viral Parmar
 
Dark web
Dark webDark web
Dark web
Safwan Hashmi
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
Arjith K Raj
 
Darknet
DarknetDarknet
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
Kenneth Carnesi, JD
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
KeshavBhardwaj19
 

Semelhante a Dark Net (20)

Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
An Analysis Of The Deep Web
An Analysis Of The Deep WebAn Analysis Of The Deep Web
An Analysis Of The Deep Web
 
Dark Web
Dark WebDark Web
Dark Web
 
Dark net
Dark netDark net
Dark net
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Dark web
Dark webDark web
Dark web
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Darknet
DarknetDarknet
Darknet
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Mais de jangezkhan

Google
GoogleGoogle
Google
jangezkhan
 
Process concept
Process conceptProcess concept
Process concept
jangezkhan
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)
jangezkhan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
jangezkhan
 
Using Serious Games to Train Evacuation Behavior
Using Serious Games to Train Evacuation BehaviorUsing Serious Games to Train Evacuation Behavior
Using Serious Games to Train Evacuation Behavior
jangezkhan
 
HTTP
HTTPHTTP
Kinect
KinectKinect
Kinect
jangezkhan
 
Chemistry
ChemistryChemistry
Chemistry
jangezkhan
 

Mais de jangezkhan (8)

Google
GoogleGoogle
Google
 
Process concept
Process conceptProcess concept
Process concept
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Using Serious Games to Train Evacuation Behavior
Using Serious Games to Train Evacuation BehaviorUsing Serious Games to Train Evacuation Behavior
Using Serious Games to Train Evacuation Behavior
 
HTTP
HTTPHTTP
HTTP
 
Kinect
KinectKinect
Kinect
 
Chemistry
ChemistryChemistry
Chemistry
 

Último

Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
184804
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
7sd8fier
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
kecekev
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
n0tivyq
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
contactproperweb2014
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
Knight Moves
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
qo1as76n
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
Febless Hernane
 
Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
millarj46
 
20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf
ameli25062005
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
qo1as76n
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
GOWSIKRAJA PALANISAMY
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
7sd8fier
 
Research 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdfResearch 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdf
ameli25062005
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
Techno Merch
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
Virtual Real Design
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
pmgdscunsri
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
peuce
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
9a93xvy
 

Último (20)

Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
 
Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
 
20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
 
Research 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdfResearch 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdf
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
 

Dark Net

  • 1. DARK NETDARK NET 1 Preparad by: Jangezkhan Arif khamu Group ‘B’ 3th Stage University of Duhok College of science Computer Department PRESENTATION
  • 2. Contents Of Deep webContents Of Deep web 2 • Introduction . • How can open or go inside the tor ? • History . • what is inside the Dark Net ? • Ones who visited Dark net , what is their purpose ? • How work results perform ? • What Should suffix of the websites inside dark net ? • Bitcoin . • Conclusion .
  • 3. Dark net ... Is a place to kill and material of Anesthetic, and hacking..... etc. The Internet is not only Google, Facebook, Yahoo Instagram, YouTube, Amazon, and others, so when writing this report a number of sites reached more than one billion and one hundred and forty-four million. All sites only 4% deals with online business made of, now the question here is, what about 96% of the site and the latest work in where? 3 Introduction
  • 4. 4 In the world on a wide range of Internet you from that only 4% of the work you see and fall dramatically, but somewhere else there, although they say the Web drop out of this dark network (deep web, web-dim), here this side of the second work and 96% of the Internet. Introduction
  • 5. How can open or go inside the tor?How can open or go inside the tor? • Of course, you can not go deep inside the Internet using Google Chrome, Firefox, Opera, Safari, etc. but you need to use the Tor project, this Tor project is not private, everyone can use it. 5 Now let know what is (TOR) project? •Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.
  • 6. • The core principle of Tor, "onion routing", was developed in the mid-1990s by the United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997. 6 History
  • 7. what is inside the Dark Net?what is inside the Dark Net? 1.Used for Hack. 2.sell all kind of weapon. 3.Business with human, especially the child. 4.buy video and erotic graphics. 5.Buy of document in secret . 6.buy and sell of program computer and mobile with cheaper price. 7
  • 8. Ones who visited Dark net , what is their purpose?Ones who visited Dark net , what is their purpose? According to after statistical of official of tor project, rate as such : 1.The rate of 15. 4% is private to buy any of the material of Anesthetic. 2.The rate of 9% buy and of program. 3.The rate of 5. 6% for hack peoples (you pay money and personal you are applicant to hack hem). 4.The rate of 4. 24 % for host and domain. 5.The rate of 3. 70% for engine . It stay is private deal with human and kill peoples and erotic aggression.. Etc. 8
  • 9. How work results perform?How work results perform? 9 All people inside Dark net, unknown person, It mean no one knows their identity, No murder request and no the murderer know each other, but first aspect request to kill or buy material.
  • 10. What Should suffix of the websites inside dark net?What Should suffix of the websites inside dark net? • Of course that normal suffix or domain is org, info, net, edu,. Etc, • but on dark net all of them should be end with (onion). • Most of the code of project net written by (python) language. 10
  • 11. BitcoinBitcoin What is bitcoin? •Money is online and There is no Relationship with any country and any bank, by Unknown named (Satoshi Nakamoto) and in 13`October 2008 outed. 11 The value of bitcoin is: •Earlier each bitcoin value 150$, •But now each bitcoin value more than 7000$. How is this money get ? •Become coin based on several equation of mathematics of institution, so that money with hand blame on, it is necessary to get this money, you need to solve the equation in a minimum period.
  • 12. • The end talks my all side knows what happening inside the internet, and understand that internet not just Facebook and chat, but there is world else and we not know. 12 Conclusion

Notas do Editor

  1. Percent