Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
EXPLORING THE DEEP WEB
Transcript of EXPLORING THE DEEP WEB
EXPLORING THE DEEP WEB
LSP 401 GENERAL ENGLISH
The Deep Web
by : Aina Nabila Ahmad - 114162
& Disadvantages of
the Deep Web.
+ All information that cannot be accessed via a normal browser.
+ Also called Deepnet, DarkNet, Undernet, or the Hidden Web.
THE DEEP WEB
Programs that search documents for specified keywords or phrases
and returns a list of documents where the keywords were found.
HOW SEARCH ENGINES WORK?
* Uses a spider program to fetch as many webpages as possible
* A program called an indexer then reads these webpages and creates an index, storing the URL and important content of webpage
* Each search engine has its own ranking algorithm that returns results based on their relevance to the user’s specified keywords or phrases
THE INVISIBLE WEB
Everything not found by a search engine’s spider program is part of the invisible web
Most webpages on the internet are not indexed by search engines
Some experts estimate that as much as 75% of the entire internet is invisible web content
Starts by searching heavily used servers and the most popular web pages.
Visits all the links found in the webpages it reads and sends them to the search engine’s indexer in a process called web crawling, which continues automatically.
To be discovered, a webpage must be static and linked to other pages.
All pages that are indexed by a search engine’s spider programs are known as the visible web.
LECTURER : Miss Amreet Kaur
ADVANTANGES ON INVISIBLE WEB CONTENT
Specialized content focus – large amounts of information focused on an exact subject
Contains information that might not be available on the visible web
Allows a user to find a precise answer to a specific question
Allows a user to find webpages from a specific date or time
SO WHAT IS ACTUALLY ON THE DEEP WEB AND HOW DO WE GET THERE?
Deep Web (layer two)
- Content that is only available through specialized anonymizing software (Tor). This includes anonymity networks and darknets (anonymous P2P). This are is a sort of safe- haven for speech and content which has been banned from the surface web.
- examples: Anonymous chat / imageboards. CP, drugs, illegal transactions, weapons, DRM removal software, pirated software/media/ books, black markets.
GUIDED JOURNEY TO THE DEEP WEB
The deep web is vast, as we covered before, and most is private. Here we will go through some examples of websites on the Deep Web, how the various resources the Deep Web encompasses (not all entirely legal).
THE HIDDEN WIKI
TorDir (BLACK MARKET)
Silk Road (Anonymous Market Place
DANGERS OF THE DEEP WEB
Exploring the Deep Web can be dangerous. Always think twice before clicking any returned search links. Because no ruling authority regulates the Deep Web, users enjoy complete anonymity and may partake in illegal activities such as trading copyrighted materials, selling narcotics, circulating child pornography and negotiating for other criminal acts. Exploring a search engine's results may lead you into the Internet's darkest corners, leaving you vulnerable to nefarious characters and sites designed to spread malware or hack your computer.
DISADVANTAGES OF THE DEEP WEB
Deep Web search engines tend to be slower than standard search engines.
Deep Web searches should be reserved for serious, painstaking research, not for simple questions and basic Web surfing.
May also return sensitive personal information from normally restricted databases, creating ethical dilemmas and leaving individuals susceptible to fraud and identity theft.