Skip to main content

why visiting darkweb is not too easy?

DARK WEB :

   
 Today we will talk about Dark-Web,  
the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content.

Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google, Bing or other search engines.
   

     The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals. 

Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion


REAL WORLD:

 If we talk about real world scenarios with dark web it's too complex for a beginner level guy to get this even lot of intermediate level guys can not find this on internet. 

You should have at least some knowledge about the cyber-security to get in this dark-web. Because in some cases these websites says you to hack their websites to get in this. 

So i recommend you to go with networking first if you are going to learn cyber-security and after completing this knowledge you can go ahead for Dark Web.

Generally a dark web link opens ones or two's in a month or sometimes in weeks, and also it will opens only for little bit time like only for 2 hours or 4 hours and maximum 6 hours. If a dark-web link is active since last 6 hours that means it's not a dark-web its a honeypot. This is because mostly dark-web sites are hosted on their own computer systems.

TOR BROWSER:

 
Tor browser using peer to peer networks and the name "Tor" can refer to several different components. It protects you by bouncing our communications around a distributed network of relays(broadcasts) run by volunteers of this web in all around the world. Basically Tor prevents somebody watching your Internet connection from learning what sites you visit and what kind of internet activities you are doing, and it also prevents the sites you visit from learning your physical location. And this anonymous broadcast is called the Tor network. We mostly use Tor browser as a tool to visit dark-web, which is developed by Firefox and we can say it is an extended or upgraded version of Firefox to use Dark-web as well as Deep-web it also fixes many privacy issues.


 

Thanks for reading this blog !!!!!!!!!!!!!!!!!


Comments

Post a Comment

Popular Posts

Types of operating systems

Today there are lot of operating systems in the internet but actually they are only based on these main operating systems. What we see on internet is that windows is an OS, Linux is an OS but actually it is not really true. These are true only in simple understanding but when we explore computers more then we see there are lot of types of operating systems available in the market. These are written below...... Batch Operating System Multi-programming OS. Time-sharing or multitasking operating systems Distributed operating System Network operating System Real Time operating System Hard real--time systems Soft real--time systems Batch operating system: These operating system can not interact directly with the computer. Batch processing is a technique in which an Operating System collects the programs and data together in a batch before processing starts.   Multi-programming OS: These type of OS are able to run multiple jobs simultaneously in the memory. For it, memory is considered a...

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re intera...

Programing Langauges HLL vs LLL

High Level Languages:      High level languages are abbreviated as HLL, these languages are too much similar to human language. These are more programmer friendly languages easy to code, debug and maintain. Actually they don't interact with the hardware , rather they focuses more on the complex arithmetic operations, optimal program efficiency and easiness in coding.      High level language requires a compilers or an interpreters to translate source code written in high level language to machine language. We can compile the source code written in HLL to multiple languages. Thus they are machine independent language. Advantages of HLL: It provides higher level of abstraction from machine languages. It is machine independent languages. Less error prone, easy to find debug errors. They provides the better programming productivity. Disadvantages of HLL:  Its take additional time to translate its code to machine code. HLL programmer are much slower than...

Basic Elements of Communication System(Networking)

A Communication is the process of transferring messages from one point to another. It is a very vital process in a network. When two networks are connected with each others they have to share data to each others so this process of communication system has three basic elements which are as follows - 1. A sender (source), which creates the message to be transmitted. 2. A medium, which carries the message, 3. A receiver (sink), which receives the message. Data communication is the function of transmitting data from one point to another. In this case, the sender and receiver are normally machines, in particular, computer devices (computers, terminals, peripheral devices like printers, plotters, disks, etc), and the transmission medium may be telephone lines, microwave links, satellite links, etc. However, the messages that are transmitted are only in data form, but not in voice conversations form. Hence, the electronic systems, which transfer data from one point to another, are called dat...

How to Hack Your Friends Screen Lock

Password Hacked:        Hello, friends, today we will discuss on a phishing page tool which can capture a device passcode. This is just a github tool and we will tell you how to use this, you can impress your friends using this tool and it is really not hard to use it.  You should only have an android device with termux app installed, or you can do this thing with your computer system also. Today i am only showing you how to do these things only with your android device. Please follow each steps carefully to get perfect run of this tool : First , open your play store on your android mobile phone and then search  TERMUX  and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute you have to on your network connection. type pkg update  then hit enter. Now type pkg upgrade  then it will automatically upgrade your envoirment. Then you have to ...