Skip to main content

why visiting darkweb is not too easy?

DARK WEB :

   
 Today we will talk about Dark-Web,  
the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content.

Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google, Bing or other search engines.
   

     The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals. 

Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion


REAL WORLD:

 If we talk about real world scenarios with dark web it's too complex for a beginner level guy to get this even lot of intermediate level guys can not find this on internet. 

You should have at least some knowledge about the cyber-security to get in this dark-web. Because in some cases these websites says you to hack their websites to get in this. 

So i recommend you to go with networking first if you are going to learn cyber-security and after completing this knowledge you can go ahead for Dark Web.

Generally a dark web link opens ones or two's in a month or sometimes in weeks, and also it will opens only for little bit time like only for 2 hours or 4 hours and maximum 6 hours. If a dark-web link is active since last 6 hours that means it's not a dark-web its a honeypot. This is because mostly dark-web sites are hosted on their own computer systems.

TOR BROWSER:

 
Tor browser using peer to peer networks and the name "Tor" can refer to several different components. It protects you by bouncing our communications around a distributed network of relays(broadcasts) run by volunteers of this web in all around the world. Basically Tor prevents somebody watching your Internet connection from learning what sites you visit and what kind of internet activities you are doing, and it also prevents the sites you visit from learning your physical location. And this anonymous broadcast is called the Tor network. We mostly use Tor browser as a tool to visit dark-web, which is developed by Firefox and we can say it is an extended or upgraded version of Firefox to use Dark-web as well as Deep-web it also fixes many privacy issues.


 

Thanks for reading this blog !!!!!!!!!!!!!!!!!


Comments

Post a Comment

Popular Posts

PROGRAMMING LANGUAGES

  Today a programming language is very essential thing in technology market, everything is going to transform in digital world. We handle these digital things with lot of hardware and using programming language. Currently there are lot of programming languages arrived in market like Python, Java, Perl and many more. So today we will talk about what is programming language & how its works?   A programming language is the way to talk to a computer machine, generally we can not directly go to the computer and we can not say to the computer to do a specific task, Because a computer only understand the binary data . We need to program it or we can say we need to talk to the computer in computer language to give then computer will understand what we want with them. Generally we talk in different - different languages, so we can also communicate in different - different languages with a computer. Sometimes computer languages goes to complicated for a human being bu...

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re intera...

Some useful shortcuts of Libre Office Writer

Ctrl+A   Select All Ctrl+J    Justify Ctrl+D Double Underline Ctrl+E Centered Ctrl+F Find and Replace Ctrl+Shift+P Superscript Ctrl+L Align Left Ctrl+R Align Right Ctrl+Shift+B Subscript Ctrl+Y Redo last action Ctrl+0 (zero) Apply Default   paragraph style Ctrl+1 Apply Heading 1 paragraph style Ctrl+2 Apply Heading 2 paragraph style Ctrl+3 Apply Heading 3 paragraph style Ctrl+5 1.5 Line Spacing Ctrl+ Plus Key(+) Calculates the selected text and copies the result to the clipboard. Ctrl+Hyphen(-) Custom hyphens; hyphenation set by you. Ctrl+Shift+minus sign (-) Non-breaking dash (is not used for hyphenation) Ctrl+multiplication sign * (only on number pad) Run macro field Ctrl+Shift+Space Non-breaking spaces. Non-breaking spaces are not used for hyphenation and are not expanded if the text is justified. Shift+Enter Line break without paragraph change Ctrl+Enter Manual page break Ctrl+Shift+Enter Column break in multicolumnar texts Alt+Enter I...

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou...

Programing Langauges HLL vs LLL

High Level Languages:      High level languages are abbreviated as HLL, these languages are too much similar to human language. These are more programmer friendly languages easy to code, debug and maintain. Actually they don't interact with the hardware , rather they focuses more on the complex arithmetic operations, optimal program efficiency and easiness in coding.      High level language requires a compilers or an interpreters to translate source code written in high level language to machine language. We can compile the source code written in HLL to multiple languages. Thus they are machine independent language. Advantages of HLL: It provides higher level of abstraction from machine languages. It is machine independent languages. Less error prone, easy to find debug errors. They provides the better programming productivity. Disadvantages of HLL:  Its take additional time to translate its code to machine code. HLL programmer are much slower than...