Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

DEEP WEB by Ajit.pptx

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Próximo SlideShare
DEEP WEB.pptx
DEEP WEB.pptx
Cargando en…3
×

Eche un vistazo a continuación

1 de 27 Anuncio
Anuncio

Más Contenido Relacionado

Más reciente (20)

Anuncio

DEEP WEB by Ajit.pptx

  1. 1. DEEP WEB MADE BY- AKHIL CHAUDHARY AJIT VERMA
  2. 2. World Wide Web Surface Web Deep Web Dark Web
  3. 3. URL Static Dynamic
  4. 4. THE SURFACE WEB Consists of webpages with static URL. Once detected, the URL is added to that search engine`s database and can become a result in a query or search of that search engine.
  5. 5. STATIC URL Persistent URL Can be detected by search engine crawler Content of the web page remains the same Can be changed hard coding HTML Example- The home page of google- www.google.co.in
  6. 6. DYNAMIC URL Result of a search in a website(precisely in database) It changes with the changes in the database It is generated on the basis of the query of the user Example- A search for the topic “Deep Web” in wikipedia
  7. 7. WHAT IS DEEP WEB? Hidden Web and Invisible Web It is inaccessible to ordinary search engines and consequently, to most users. Contains searchable databases that can only be reached by a direct query or a specialized search engine. This information is contained in dynamic webpages that are generated upon request to a database .It has no persistent or static URL.
  8. 8. EVOLUTION OF DEEP WEB Early Days: static html pages, crawlers can easily reach In mid-90’s: Introduction of dynamic pages, that are generated as a result of a query. In 1994: Jill Ellsworth used the term “Invisible Web” to refer to these websites. In 200: Bergman coined it as “Deep Web”
  9. 9. SIZE OF THE DEEP WEB 550 billion documents. 500 times the content of the Surface Web. An internet search typically searches 0.03% of available content.
  10. 10. DEEP WEB CONSISTS OF Searchable databases Downloadable files and spreadsheets Image and multi-media files Data sets Various file formats such as .pdf Lots of government information
  11. 11. DARK NET Network which is restricted access It is mainly used for illegal peer-to-peer file sharing Your identity is hidden
  12. 12. TOR The onion router or browser Access to the deep web It secures ur IP address
  13. 13. BITCOIN Encrypted money Anonymous transfer One can convert their money into Bitcoin using different sites.
  14. 14. CREDITS We would like to present our special thanks to our computer teacher Satheesh Sir Edited by- Akhil Chaudhary, Utsav Pathak and Ajit Verma

×