SlideShare a Scribd company logo
3
Most read
10
Most read
11
Most read
BY
by
VINODKUMAR
CONTENTS OF DEEP WEB
• INTRODUCTION
• WHAT IS DEEPWEB
• WHY IT IS USE
• WHO IT IS USE
• HOW IT IS USE & WHAT IS IT
• HOW IT IS WORK
• SAFETY PRECAUSIONS
• ADVANTAGES & DISADVANTAGES
• APPLICATIONS
• CONCLUSION
INTRODUCTION
• OUR INTERNET HAVING 1000 PETTA BYTES
• TOTALLY THESE INTERNET HAVING 2 LEVELS i.e.,
1.SURFACE WEB
2.DEEP WEB , DARK WEB
• SURFACE WEB is normal web i.e., our daily uses by
normal WEB browsers.
• DEEP WEB is the some legal and some illegal
• Deep web having the data of govt. & private business
information & sienctists ,journalists data etc..,
• DARK WEB is the part of the deep web
• Dark web also called darknet . In the darknet doneing
activities of totally ILLEGAL.
• That is hacking ,drugs ,crimes and other illegal activities
where done.
DEEP WEB
DEEPWEB IS 500X GREATER THAN THE
SURFACE WEB
• DEEP WEB HAVING ZETTABYTES OF MEMORY
• THAT MEMORY IS THE TOTALLY
INVISABLE
• THIS DEEPWEB IS NOT VIEW IN THE NORMAL
WEB BROWSERS AND NORMAL SEARCH ENGIENS
• BECAUSE SEARCH ENGINES NOT PERMISSION TO
VIEW THAT DEEPWEB AND IT’S WEBSITES
• DEEP WEB HAVING SAME AS SEARCH ENGINES
AND ALSO WEBSITES…
• WHY OUR SEARCH ENGINES NOT PERMIT TO SEE
THE DEEP WEB AND ITS WEBSITES.
• The deep web, invisible web, or hidden web are
parts of the World Wide Web whose contents are
not indexed by standard search engines i.e.,
• etc.,
• Because deep websites having dynamic pages i.e.,
in this pages having the data more personalized.
WHY IT IS USE
• DATA WILL BE MORE SECURE
• DATA WILL BE NOT VISIBLE TO OTHERS
• NOT ACCESS DATA USING BROWSERS
WITHOUT UR PERMISSION
WHO IT IS USE
• MAINLY USE OF THIS MILITARY PURPOSE
• SCIENTIST
• BUSINESS PERSONS
• POLICEMENS
• GOVT.(OVERAL WORLD)
HOW IT IS USE & WHAT IS IT
• USING OF DEEP WEB THE BROWSER IS
• Tor is an anonymously browsing network. TOR
is “The Onion Router,” because of the
technique it uses to provide anonymity. Onion
routing means that messages and
communication are encapsulated in layers of
encryption, like onion layers…..
HOW IT IS WORKS
Encrypted data is transmitted through a series of nodes and relays
to taking the data from the deep websites without knowing ur IP
address , and our location & ur details..
DARKNET BUSINESSES
• BASED ON THE BUYING & SELLING ACTIVIES FOR
MANY WEBSITES ARE IN THERE…
• I.e.,1.SILKROAD (DRUGS)
• 2. Nucleus Market Etc.,
• In the dark net business uses the currency of
BITCOINS
• BITCOIN VALUE IS VERY HIGH..
• 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY
SAFETY PRECAUSIONS
• 1. Don’t trust anyone out there in the deep web.
• 2. COVER your webcam using tape OR removing
it.
• 3. Never download any files or software from
deep web.
• 4. If you want some extra protection disable java
scripts
• 5. Don't use U torrent or any other torrenting
services while surfing on the deep web.
ADVANTAGES
1. Anonymity
2. Freedom to SEARCH
3. more Knowledge gain
4. you can publish & do any thing
5.You can’t fear
6.Open banned websites also.
DISADVANTAGES
• 1. The Deep Web doesn't work as smoothly
• 2.Slow compare to our normal browsers.
• 3.piracy is increases
• 4.hacking is fastly grown.
• 5.prison to Illegal activities
APPLICATIONS
• 1.MILITARY PURPOSE
• 2.SCIENCTISTS
• 3.JOURNALISTS
• 4. TO OPEN ANY BANNED SITES
• 5. ANONYMOUSLY
CONCLUSION
• DEEP WEB AND DARKWEB ARE HAVING
LARGE AMOUNT OF DATA.IF WE USE IT LEGAL
PURPOSE ONLY.BUT NOT ILLEGALLY PLZ…
• IF WE USE.. THAT IS DEPENDING UP ON YOUR
OWN RISK
Deepweb and darkweb vinodkumar ancha

More Related Content

ODP
The Deep and Dark Web
PPTX
Deep Web - what to do and what not to do
PPTX
Dark web by Pranesh Kulkarni
PPTX
The Dark Web
PPTX
The dark web
PPTX
PPT ON DISCIPLINARY PROCEEDINGS_Rule 14_.pptx
PPTX
Dark net
PPTX
Deep and Dark Web
The Deep and Dark Web
Deep Web - what to do and what not to do
Dark web by Pranesh Kulkarni
The Dark Web
The dark web
PPT ON DISCIPLINARY PROCEEDINGS_Rule 14_.pptx
Dark net
Deep and Dark Web

What's hot (20)

PPTX
Journey To The Dark Web
PPTX
Dark wed
PPTX
Dark web by Claudine Impas
PPTX
PPT dark web
PPTX
The Dark side of the Web
PPTX
Introduction To Dark Web
PPTX
Dark web presentation
PPTX
Deep web and Dark web
PPTX
Dark web
PPTX
The Dark Web
PPTX
Cybersecurity and the DarkNet
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
Investigating Using the Dark Web
PPTX
The dark web
PDF
Deep Dark Web - How to get inside?
PPTX
Dark and Deep web
PPTX
Deep web
PPTX
The Dark Web
PPTX
Dark web
PPTX
Journey To The Dark Web
Dark wed
Dark web by Claudine Impas
PPT dark web
The Dark side of the Web
Introduction To Dark Web
Dark web presentation
Deep web and Dark web
Dark web
The Dark Web
Cybersecurity and the DarkNet
The Deep Web, TOR Network and Internet Anonymity
Investigating Using the Dark Web
The dark web
Deep Dark Web - How to get inside?
Dark and Deep web
Deep web
The Dark Web
Dark web
Ad

Similar to Deepweb and darkweb vinodkumar ancha (20)

PPTX
The Dark Web : Hidden Services
PDF
Team4_DeepDarkWeb the reality of dark web
PPT
Darkweb
PPTX
Case Study on Dark Web:Insights, Risks & Security Measures
PPT
Deep Web and TOR Browser
PPTX
Dark Web Presentation.pptx
PPTX
Deep web (amatuer level)
PPTX
Why We Need a Dark(er) Web
PPTX
Tor the onion router
PPTX
Darknet - Is this the future of Internet?
PPTX
Dark web technology based ppt for power pt
PPTX
Dark Web and Privacy
PDF
Darknet
PPTX
Demystifying the Dark Web
PPT
Dark net (escalona)
PPTX
Dark Side of the Net Lecture 4 TOR
PPTX
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
PPTX
The deep web
PPTX
Darkle Slideshow _ by Slidesgo.pptx
PPTX
Pichman privacy, the dark web, & hacker devices i school (1)
The Dark Web : Hidden Services
Team4_DeepDarkWeb the reality of dark web
Darkweb
Case Study on Dark Web:Insights, Risks & Security Measures
Deep Web and TOR Browser
Dark Web Presentation.pptx
Deep web (amatuer level)
Why We Need a Dark(er) Web
Tor the onion router
Darknet - Is this the future of Internet?
Dark web technology based ppt for power pt
Dark Web and Privacy
Darknet
Demystifying the Dark Web
Dark net (escalona)
Dark Side of the Net Lecture 4 TOR
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
The deep web
Darkle Slideshow _ by Slidesgo.pptx
Pichman privacy, the dark web, & hacker devices i school (1)
Ad

Recently uploaded (20)

PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
artificial intelligence overview of it and more
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Sims 4 Historia para lo sims 4 para jugar
PPT
tcp ip networks nd ip layering assotred slides
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Module 1 - Cyber Law and Ethics 101.pptx
presentation_pfe-universite-molay-seltan.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Slides PPTX World Game (s) Eco Economic Epochs.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
WebRTC in SignalWire - troubleshooting media negotiation
PptxGenJS_Demo_Chart_20250317130215833.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
artificial intelligence overview of it and more
RPKI Status Update, presented by Makito Lay at IDNOG 10
Design_with_Watersergyerge45hrbgre4top (1).ppt
Sims 4 Historia para lo sims 4 para jugar
tcp ip networks nd ip layering assotred slides
SASE Traffic Flow - ZTNA Connector-1.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx

Deepweb and darkweb vinodkumar ancha

  • 2. CONTENTS OF DEEP WEB • INTRODUCTION • WHAT IS DEEPWEB • WHY IT IS USE • WHO IT IS USE • HOW IT IS USE & WHAT IS IT • HOW IT IS WORK • SAFETY PRECAUSIONS • ADVANTAGES & DISADVANTAGES • APPLICATIONS • CONCLUSION
  • 3. INTRODUCTION • OUR INTERNET HAVING 1000 PETTA BYTES • TOTALLY THESE INTERNET HAVING 2 LEVELS i.e., 1.SURFACE WEB 2.DEEP WEB , DARK WEB • SURFACE WEB is normal web i.e., our daily uses by normal WEB browsers. • DEEP WEB is the some legal and some illegal • Deep web having the data of govt. & private business information & sienctists ,journalists data etc.., • DARK WEB is the part of the deep web • Dark web also called darknet . In the darknet doneing activities of totally ILLEGAL. • That is hacking ,drugs ,crimes and other illegal activities where done.
  • 4. DEEP WEB DEEPWEB IS 500X GREATER THAN THE SURFACE WEB
  • 5. • DEEP WEB HAVING ZETTABYTES OF MEMORY • THAT MEMORY IS THE TOTALLY INVISABLE • THIS DEEPWEB IS NOT VIEW IN THE NORMAL WEB BROWSERS AND NORMAL SEARCH ENGIENS • BECAUSE SEARCH ENGINES NOT PERMISSION TO VIEW THAT DEEPWEB AND IT’S WEBSITES • DEEP WEB HAVING SAME AS SEARCH ENGINES AND ALSO WEBSITES…
  • 6. • WHY OUR SEARCH ENGINES NOT PERMIT TO SEE THE DEEP WEB AND ITS WEBSITES. • The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines i.e., • etc., • Because deep websites having dynamic pages i.e., in this pages having the data more personalized.
  • 7. WHY IT IS USE • DATA WILL BE MORE SECURE • DATA WILL BE NOT VISIBLE TO OTHERS • NOT ACCESS DATA USING BROWSERS WITHOUT UR PERMISSION
  • 8. WHO IT IS USE • MAINLY USE OF THIS MILITARY PURPOSE • SCIENTIST • BUSINESS PERSONS • POLICEMENS • GOVT.(OVERAL WORLD)
  • 9. HOW IT IS USE & WHAT IS IT • USING OF DEEP WEB THE BROWSER IS • Tor is an anonymously browsing network. TOR is “The Onion Router,” because of the technique it uses to provide anonymity. Onion routing means that messages and communication are encapsulated in layers of encryption, like onion layers…..
  • 10. HOW IT IS WORKS Encrypted data is transmitted through a series of nodes and relays to taking the data from the deep websites without knowing ur IP address , and our location & ur details..
  • 11. DARKNET BUSINESSES • BASED ON THE BUYING & SELLING ACTIVIES FOR MANY WEBSITES ARE IN THERE… • I.e.,1.SILKROAD (DRUGS) • 2. Nucleus Market Etc., • In the dark net business uses the currency of BITCOINS • BITCOIN VALUE IS VERY HIGH.. • 1 BITCOIN = 65740 RUPEES IN INDAIN CURRENCY
  • 12. SAFETY PRECAUSIONS • 1. Don’t trust anyone out there in the deep web. • 2. COVER your webcam using tape OR removing it. • 3. Never download any files or software from deep web. • 4. If you want some extra protection disable java scripts • 5. Don't use U torrent or any other torrenting services while surfing on the deep web.
  • 13. ADVANTAGES 1. Anonymity 2. Freedom to SEARCH 3. more Knowledge gain 4. you can publish & do any thing 5.You can’t fear 6.Open banned websites also.
  • 14. DISADVANTAGES • 1. The Deep Web doesn't work as smoothly • 2.Slow compare to our normal browsers. • 3.piracy is increases • 4.hacking is fastly grown. • 5.prison to Illegal activities
  • 15. APPLICATIONS • 1.MILITARY PURPOSE • 2.SCIENCTISTS • 3.JOURNALISTS • 4. TO OPEN ANY BANNED SITES • 5. ANONYMOUSLY
  • 16. CONCLUSION • DEEP WEB AND DARKWEB ARE HAVING LARGE AMOUNT OF DATA.IF WE USE IT LEGAL PURPOSE ONLY.BUT NOT ILLEGALLY PLZ… • IF WE USE.. THAT IS DEPENDING UP ON YOUR OWN RISK