SlideShare una empresa de Scribd logo
1 de 24
The Deep Web
Visit www.seminarlinks.blogspot.in to Download
Surface Web
 The surface Web is that portion of the World Wide Web that is indexable by conventional search engines.
 It is also known as the Clearnet, the visible Web or indexable Web.
 Eighty-five percent of Web users use search engines to find needed information, but nearly as high a
percentage cite the inability to find desired information as one of their biggest frustrations.
 A traditional search engine sees only a small amount of the information that's available -- a measly 0.03 %
[source: OEDB].
Deep Web - Introduction
 The Deep Web is World Wide Web content that is not part of the Surface Web, which is indexed
by standard search engines.
 It is also called the Deepnet, Invisible Web or Hidden Web.
 Largest growing category of new information on the Internet.
 400-550X more public information than the Surface Web.
 Total quality 1000-2000X greater than the quality of the Surface Web.
History
 Jill Ellsworth used the term invisible Web in 1994 to refer to websites that were not registered
with any search engine.
 Mike Bergman cited a January 1996 article by Frank Garcia:
“It would be a site that's possibly reasonably designed, but they didn't bother to register it with
any of the search engines. So, no one can find them! You're hidden. I call that the invisible Web”.
 Another early use of the term Invisible Web was by Bruce Mount and Matthew B. Koll of Personal
Library Software in 1996.
 The first use of the specific term Deep Web, now generally accepted, occurred in the
aforementioned 2001 Bergman study.
How search engines work
 Search engines construct a database of the Web by using programs called spiders or Web crawlers
that begin with a list of known Web pages.
 The spider gets a copy of each page and indexes it, storing useful information that will let the page
be quickly retrieved again later.
 Any hyperlinks to new pages are added to the list of pages to be crawled.
 Eventually all reachable pages are indexed, unless the spider runs out of time or disk space.
 The collection of reachable pages defines the Surface Web.
How search engines work
Contents
 Dynamic Content
 Unlinked content
 Private Web
 Contextual Web
 Limited access content
 Non-Scripted content
 Non-HTML/text content;
 Dynamic content
• Dynamic pages which are returned in response to a submitted query or accessed only
through a form
• especially if open-domain input elements (such as text fields) are used
• such fields are hard to navigate without domain knowledge
 Unlinked Content
• Pages which are not linked to by other pages
• Which may prevent web crawling programs from accessing the content
• This content is referred to as pages without backlinks (or inlinks).
 Private Web: sites that require registration and login (password-protected resources).
 Contextual Web: pages with content varying for different access contexts (e.g., ranges
of client IP addresses or previous navigation sequence).
 Limited access content: sites that limit access to their pages in a technical way (e.g.,
using the Robots Exclusion Standard, CAPTCHAs, or no-cache Pragma HTTP headers which
prohibit search engines from browsing them and creating cached copies.
 Scripted content
pages that are only accessible through links produced by JavaScript as well as content
dynamically downloaded from Web servers via Flash or Ajax solutions.
 Non-HTML/text content
textual content encoded in multimedia (image or video) files or specific file formats not
handled by search engines.
Deep Potential
 The deep Web is an endless repository for a mind-reeling amount of information.
 It's powerful. It unleashes human nature in all its forms, both good and bad.
 There are engineering databases, financial information of all kinds, medical papers, pictures, illustrations ... the list
goes on, basically, forever.
 For example, construction engineers could potentially search research papers at multiple universities in order to
find the latest and greatest in bridge-building materials.
 Doctors could swiftly locate the latest research on a specific disease.
 The potential is unlimited. The technical challenges are daunting. That's the draw of the deep Web.
Shadow Land
 The deep Web may be a shadow land of untapped potential.
 The bad stuff, as always, gets most of the headlines.
 You can find illegal goods and activities of all kinds through the dark Web.
 That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic
animals, copyrighted media and anything else you can think of.
 Theoretically, you could even, say, hire a hit man to kill someone you don't like.
 But you won't find this information with a Google search.
 These kinds of Web sites require you to use special software, such as The Onion Router, more commonly known
as Tor.
The Onion Router (TOR)
 Tor is software that installs into your browser and sets up the specific connections you need to access dark
Web sites.
 Critically it is free software for enabling online anonymity and censorship resistance.
 Onion routing refers to the process of removing encryption layers from Internet communications, similar to
peeling back the layers of an onion.
 Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant
messages, and other communication forms", back to the user.
 It is intended to protect the personal privacy of users, as well as their freedom and ability to conduct
confidential business by keeping their internet activities from being monitored.
Cont…
 Instead of seeing domains that end in .com or .org, these hidden sites end in .onion.
 The most infamous of these onion sites was the now-defunct Silk Road, an online marketplace where
users could buy drugs, guns and all sorts of other illegal items.
 The FBI eventually captured Ross Ulbricht, who operated Silk Road, but copycat sites like Black Market
Reloaded are still readily available.
 Tor is the result of research done by the U.S. Naval Research Laboratory, which created Tor for political
dissidents and whistleblowers, allowing them to communicate without fear of reprisal.
 Tor was so effective in providing anonymity for these groups that it didn't take long for the criminally-
minded to start using it as well.
Silk Road Website
U.S. authorities shut down Silk after the
alleged owner of the site Ross William Ulbricht
was arrested.
Money-related transactions
 You may wonder how any money-related transactions can happen when sellers and buyers can't
identify each other.
 That's where Bitcoin comes in.
 Bitcoin, it's basically an encrypted digital currency.
 Like regular cash, Bitcoin is good for transactions of all kinds, and notably, it also allows for
anonymity; no one can trace a purchase, illegal or otherwise.
 When paired properly with TOR, it's perhaps the closest thing to a foolproof way to buy and sell on
the web.
The Brighter Side of Darkness
 The deep Web is home to alternate search engines, e-mail services, file storage, file sharing, social
media, chat sites, news outlets and whistleblowing sites, as well as sites that provide a safer meeting
ground for political dissidents and anyone else who may find themselves on the fringes of society.
 In an age where NSA-type surveillance is omnipresent and privacy seems like a thing of the past, the
dark Web offers some relief to people who prize their anonymity.
 Bitcoin may not be entirely stable, but it offers privacy, which is something your credit card company
most certainly does not.
 For citizens living in countries with violent or oppressive leaders, the dark Web offers a more secure way
to communicate with like-minded individuals.
Invisible Web Search Tools
• A List of Deep Web Search Engines – Purdue Owl’s Resources to Search the Invisible Web
• Art – Musie du Louvre
• Books Online – The Online Books Page
• Economic and Job Data – FreeLunch.com
• Finance and Investing – Bankrate.com
• General Research – GPO’s Catalog of US Government Publications
• Government Data – Copyright Records (LOCIS)
• International – International Data Base (IDB)
• Law and Politics – THOMAS (Library of Congress)
• Library of Congress – Library of Congress
• Medical and Health – PubMed
• Transportation – FAA Flight Delay Information
Future
 The lines between search engine content and the deep Web have begun to blur, as search services
start to provide access to part or all of once-restricted content.
 An increasing amount of deep Web content is opening up to free search as publishers and libraries
make agreements with large search engines.
 In the future, deep Web content may be defined less by opportunity for search than by access fees or
other types of authentication.
Conclusion
 The deep web will continue to perplex and fascinate everyone who uses the internet.
 It contains an enthralling amount of knowledge that could help us evolve technologically and as a
species when connected to other bits of information.
 And of course, its darker side will always be lurking, too, just as it always does in human nature.
 The deep web speaks to the fathomless, scattered potential of not only the internet, but the human
race, too.
References
 http://computer.howstuffworks.com/internet/basics/how-the-deep-web-
works5.htm
 http://oedb.org/ilibrarian/invisible-web/
 http://en.wikipedia.org/wiki/Deep_Web
 http://money.cnn.com/infographic/technology/what-is-the-deep-web/?iid=EL
 http://en.wikipedia.org/wiki/Surface_Web
Thank You
Visit www.seminarlinks.blogspot.in to Download

Más contenido relacionado

Más de Seminar Links

Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Seminar Links
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)Seminar Links
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTSeminar Links
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTSeminar Links
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Seminar Links
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTSeminar Links
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTSeminar Links
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing TechniqueSeminar Links
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Seminar Links
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Seminar Links
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPTSeminar Links
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material pptSeminar Links
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military ApplicationsSeminar Links
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer scienceSeminar Links
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिSeminar Links
 

Más de Seminar Links (20)

Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPT
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPT
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPT
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing Technique
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE)
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPT
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Dams PPT
Dams PPTDams PPT
Dams PPT
 
Bio mass Energy
Bio mass EnergyBio mass Energy
Bio mass Energy
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृति
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

The Deep Web

  • 1. The Deep Web Visit www.seminarlinks.blogspot.in to Download
  • 2. Surface Web  The surface Web is that portion of the World Wide Web that is indexable by conventional search engines.  It is also known as the Clearnet, the visible Web or indexable Web.  Eighty-five percent of Web users use search engines to find needed information, but nearly as high a percentage cite the inability to find desired information as one of their biggest frustrations.  A traditional search engine sees only a small amount of the information that's available -- a measly 0.03 % [source: OEDB].
  • 3. Deep Web - Introduction  The Deep Web is World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines.  It is also called the Deepnet, Invisible Web or Hidden Web.  Largest growing category of new information on the Internet.  400-550X more public information than the Surface Web.  Total quality 1000-2000X greater than the quality of the Surface Web.
  • 4.
  • 5. History  Jill Ellsworth used the term invisible Web in 1994 to refer to websites that were not registered with any search engine.  Mike Bergman cited a January 1996 article by Frank Garcia: “It would be a site that's possibly reasonably designed, but they didn't bother to register it with any of the search engines. So, no one can find them! You're hidden. I call that the invisible Web”.  Another early use of the term Invisible Web was by Bruce Mount and Matthew B. Koll of Personal Library Software in 1996.  The first use of the specific term Deep Web, now generally accepted, occurred in the aforementioned 2001 Bergman study.
  • 6. How search engines work  Search engines construct a database of the Web by using programs called spiders or Web crawlers that begin with a list of known Web pages.  The spider gets a copy of each page and indexes it, storing useful information that will let the page be quickly retrieved again later.  Any hyperlinks to new pages are added to the list of pages to be crawled.  Eventually all reachable pages are indexed, unless the spider runs out of time or disk space.  The collection of reachable pages defines the Surface Web.
  • 8. Contents  Dynamic Content  Unlinked content  Private Web  Contextual Web  Limited access content  Non-Scripted content  Non-HTML/text content;
  • 9.
  • 10.  Dynamic content • Dynamic pages which are returned in response to a submitted query or accessed only through a form • especially if open-domain input elements (such as text fields) are used • such fields are hard to navigate without domain knowledge  Unlinked Content • Pages which are not linked to by other pages • Which may prevent web crawling programs from accessing the content • This content is referred to as pages without backlinks (or inlinks).
  • 11.  Private Web: sites that require registration and login (password-protected resources).  Contextual Web: pages with content varying for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence).  Limited access content: sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard, CAPTCHAs, or no-cache Pragma HTTP headers which prohibit search engines from browsing them and creating cached copies.
  • 12.  Scripted content pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flash or Ajax solutions.  Non-HTML/text content textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines.
  • 13. Deep Potential  The deep Web is an endless repository for a mind-reeling amount of information.  It's powerful. It unleashes human nature in all its forms, both good and bad.  There are engineering databases, financial information of all kinds, medical papers, pictures, illustrations ... the list goes on, basically, forever.  For example, construction engineers could potentially search research papers at multiple universities in order to find the latest and greatest in bridge-building materials.  Doctors could swiftly locate the latest research on a specific disease.  The potential is unlimited. The technical challenges are daunting. That's the draw of the deep Web.
  • 14. Shadow Land  The deep Web may be a shadow land of untapped potential.  The bad stuff, as always, gets most of the headlines.  You can find illegal goods and activities of all kinds through the dark Web.  That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted media and anything else you can think of.  Theoretically, you could even, say, hire a hit man to kill someone you don't like.  But you won't find this information with a Google search.  These kinds of Web sites require you to use special software, such as The Onion Router, more commonly known as Tor.
  • 15. The Onion Router (TOR)  Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites.  Critically it is free software for enabling online anonymity and censorship resistance.  Onion routing refers to the process of removing encryption layers from Internet communications, similar to peeling back the layers of an onion.  Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages, and other communication forms", back to the user.  It is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored.
  • 16. Cont…  Instead of seeing domains that end in .com or .org, these hidden sites end in .onion.  The most infamous of these onion sites was the now-defunct Silk Road, an online marketplace where users could buy drugs, guns and all sorts of other illegal items.  The FBI eventually captured Ross Ulbricht, who operated Silk Road, but copycat sites like Black Market Reloaded are still readily available.  Tor is the result of research done by the U.S. Naval Research Laboratory, which created Tor for political dissidents and whistleblowers, allowing them to communicate without fear of reprisal.  Tor was so effective in providing anonymity for these groups that it didn't take long for the criminally- minded to start using it as well.
  • 17. Silk Road Website U.S. authorities shut down Silk after the alleged owner of the site Ross William Ulbricht was arrested.
  • 18. Money-related transactions  You may wonder how any money-related transactions can happen when sellers and buyers can't identify each other.  That's where Bitcoin comes in.  Bitcoin, it's basically an encrypted digital currency.  Like regular cash, Bitcoin is good for transactions of all kinds, and notably, it also allows for anonymity; no one can trace a purchase, illegal or otherwise.  When paired properly with TOR, it's perhaps the closest thing to a foolproof way to buy and sell on the web.
  • 19. The Brighter Side of Darkness  The deep Web is home to alternate search engines, e-mail services, file storage, file sharing, social media, chat sites, news outlets and whistleblowing sites, as well as sites that provide a safer meeting ground for political dissidents and anyone else who may find themselves on the fringes of society.  In an age where NSA-type surveillance is omnipresent and privacy seems like a thing of the past, the dark Web offers some relief to people who prize their anonymity.  Bitcoin may not be entirely stable, but it offers privacy, which is something your credit card company most certainly does not.  For citizens living in countries with violent or oppressive leaders, the dark Web offers a more secure way to communicate with like-minded individuals.
  • 20. Invisible Web Search Tools • A List of Deep Web Search Engines – Purdue Owl’s Resources to Search the Invisible Web • Art – Musie du Louvre • Books Online – The Online Books Page • Economic and Job Data – FreeLunch.com • Finance and Investing – Bankrate.com • General Research – GPO’s Catalog of US Government Publications • Government Data – Copyright Records (LOCIS) • International – International Data Base (IDB) • Law and Politics – THOMAS (Library of Congress) • Library of Congress – Library of Congress • Medical and Health – PubMed • Transportation – FAA Flight Delay Information
  • 21. Future  The lines between search engine content and the deep Web have begun to blur, as search services start to provide access to part or all of once-restricted content.  An increasing amount of deep Web content is opening up to free search as publishers and libraries make agreements with large search engines.  In the future, deep Web content may be defined less by opportunity for search than by access fees or other types of authentication.
  • 22. Conclusion  The deep web will continue to perplex and fascinate everyone who uses the internet.  It contains an enthralling amount of knowledge that could help us evolve technologically and as a species when connected to other bits of information.  And of course, its darker side will always be lurking, too, just as it always does in human nature.  The deep web speaks to the fathomless, scattered potential of not only the internet, but the human race, too.
  • 23. References  http://computer.howstuffworks.com/internet/basics/how-the-deep-web- works5.htm  http://oedb.org/ilibrarian/invisible-web/  http://en.wikipedia.org/wiki/Deep_Web  http://money.cnn.com/infographic/technology/what-is-the-deep-web/?iid=EL  http://en.wikipedia.org/wiki/Surface_Web