SlideShare une entreprise Scribd logo
1  sur  24
The Deep Web
Visit www.seminarlinks.blogspot.in to Download
Surface Web
 The surface Web is that portion of the World Wide Web that is indexable by conventional search engines.
 It is also known as the Clearnet, the visible Web or indexable Web.
 Eighty-five percent of Web users use search engines to find needed information, but nearly as high a
percentage cite the inability to find desired information as one of their biggest frustrations.
 A traditional search engine sees only a small amount of the information that's available -- a measly 0.03 %
[source: OEDB].
Deep Web - Introduction
 The Deep Web is World Wide Web content that is not part of the Surface Web, which is indexed
by standard search engines.
 It is also called the Deepnet, Invisible Web or Hidden Web.
 Largest growing category of new information on the Internet.
 400-550X more public information than the Surface Web.
 Total quality 1000-2000X greater than the quality of the Surface Web.
History
 Jill Ellsworth used the term invisible Web in 1994 to refer to websites that were not registered
with any search engine.
 Mike Bergman cited a January 1996 article by Frank Garcia:
“It would be a site that's possibly reasonably designed, but they didn't bother to register it with
any of the search engines. So, no one can find them! You're hidden. I call that the invisible Web”.
 Another early use of the term Invisible Web was by Bruce Mount and Matthew B. Koll of Personal
Library Software in 1996.
 The first use of the specific term Deep Web, now generally accepted, occurred in the
aforementioned 2001 Bergman study.
How search engines work
 Search engines construct a database of the Web by using programs called spiders or Web crawlers
that begin with a list of known Web pages.
 The spider gets a copy of each page and indexes it, storing useful information that will let the page
be quickly retrieved again later.
 Any hyperlinks to new pages are added to the list of pages to be crawled.
 Eventually all reachable pages are indexed, unless the spider runs out of time or disk space.
 The collection of reachable pages defines the Surface Web.
How search engines work
Contents
 Dynamic Content
 Unlinked content
 Private Web
 Contextual Web
 Limited access content
 Non-Scripted content
 Non-HTML/text content;
 Dynamic content
• Dynamic pages which are returned in response to a submitted query or accessed only
through a form
• especially if open-domain input elements (such as text fields) are used
• such fields are hard to navigate without domain knowledge
 Unlinked Content
• Pages which are not linked to by other pages
• Which may prevent web crawling programs from accessing the content
• This content is referred to as pages without backlinks (or inlinks).
 Private Web: sites that require registration and login (password-protected resources).
 Contextual Web: pages with content varying for different access contexts (e.g., ranges
of client IP addresses or previous navigation sequence).
 Limited access content: sites that limit access to their pages in a technical way (e.g.,
using the Robots Exclusion Standard, CAPTCHAs, or no-cache Pragma HTTP headers which
prohibit search engines from browsing them and creating cached copies.
 Scripted content
pages that are only accessible through links produced by JavaScript as well as content
dynamically downloaded from Web servers via Flash or Ajax solutions.
 Non-HTML/text content
textual content encoded in multimedia (image or video) files or specific file formats not
handled by search engines.
Deep Potential
 The deep Web is an endless repository for a mind-reeling amount of information.
 It's powerful. It unleashes human nature in all its forms, both good and bad.
 There are engineering databases, financial information of all kinds, medical papers, pictures, illustrations ... the list
goes on, basically, forever.
 For example, construction engineers could potentially search research papers at multiple universities in order to
find the latest and greatest in bridge-building materials.
 Doctors could swiftly locate the latest research on a specific disease.
 The potential is unlimited. The technical challenges are daunting. That's the draw of the deep Web.
Shadow Land
 The deep Web may be a shadow land of untapped potential.
 The bad stuff, as always, gets most of the headlines.
 You can find illegal goods and activities of all kinds through the dark Web.
 That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic
animals, copyrighted media and anything else you can think of.
 Theoretically, you could even, say, hire a hit man to kill someone you don't like.
 But you won't find this information with a Google search.
 These kinds of Web sites require you to use special software, such as The Onion Router, more commonly known
as Tor.
The Onion Router (TOR)
 Tor is software that installs into your browser and sets up the specific connections you need to access dark
Web sites.
 Critically it is free software for enabling online anonymity and censorship resistance.
 Onion routing refers to the process of removing encryption layers from Internet communications, similar to
peeling back the layers of an onion.
 Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant
messages, and other communication forms", back to the user.
 It is intended to protect the personal privacy of users, as well as their freedom and ability to conduct
confidential business by keeping their internet activities from being monitored.
Cont…
 Instead of seeing domains that end in .com or .org, these hidden sites end in .onion.
 The most infamous of these onion sites was the now-defunct Silk Road, an online marketplace where
users could buy drugs, guns and all sorts of other illegal items.
 The FBI eventually captured Ross Ulbricht, who operated Silk Road, but copycat sites like Black Market
Reloaded are still readily available.
 Tor is the result of research done by the U.S. Naval Research Laboratory, which created Tor for political
dissidents and whistleblowers, allowing them to communicate without fear of reprisal.
 Tor was so effective in providing anonymity for these groups that it didn't take long for the criminally-
minded to start using it as well.
Silk Road Website
U.S. authorities shut down Silk after the
alleged owner of the site Ross William Ulbricht
was arrested.
Money-related transactions
 You may wonder how any money-related transactions can happen when sellers and buyers can't
identify each other.
 That's where Bitcoin comes in.
 Bitcoin, it's basically an encrypted digital currency.
 Like regular cash, Bitcoin is good for transactions of all kinds, and notably, it also allows for
anonymity; no one can trace a purchase, illegal or otherwise.
 When paired properly with TOR, it's perhaps the closest thing to a foolproof way to buy and sell on
the web.
The Brighter Side of Darkness
 The deep Web is home to alternate search engines, e-mail services, file storage, file sharing, social
media, chat sites, news outlets and whistleblowing sites, as well as sites that provide a safer meeting
ground for political dissidents and anyone else who may find themselves on the fringes of society.
 In an age where NSA-type surveillance is omnipresent and privacy seems like a thing of the past, the
dark Web offers some relief to people who prize their anonymity.
 Bitcoin may not be entirely stable, but it offers privacy, which is something your credit card company
most certainly does not.
 For citizens living in countries with violent or oppressive leaders, the dark Web offers a more secure way
to communicate with like-minded individuals.
Invisible Web Search Tools
• A List of Deep Web Search Engines – Purdue Owl’s Resources to Search the Invisible Web
• Art – Musie du Louvre
• Books Online – The Online Books Page
• Economic and Job Data – FreeLunch.com
• Finance and Investing – Bankrate.com
• General Research – GPO’s Catalog of US Government Publications
• Government Data – Copyright Records (LOCIS)
• International – International Data Base (IDB)
• Law and Politics – THOMAS (Library of Congress)
• Library of Congress – Library of Congress
• Medical and Health – PubMed
• Transportation – FAA Flight Delay Information
Future
 The lines between search engine content and the deep Web have begun to blur, as search services
start to provide access to part or all of once-restricted content.
 An increasing amount of deep Web content is opening up to free search as publishers and libraries
make agreements with large search engines.
 In the future, deep Web content may be defined less by opportunity for search than by access fees or
other types of authentication.
Conclusion
 The deep web will continue to perplex and fascinate everyone who uses the internet.
 It contains an enthralling amount of knowledge that could help us evolve technologically and as a
species when connected to other bits of information.
 And of course, its darker side will always be lurking, too, just as it always does in human nature.
 The deep web speaks to the fathomless, scattered potential of not only the internet, but the human
race, too.
References
 http://computer.howstuffworks.com/internet/basics/how-the-deep-web-
works5.htm
 http://oedb.org/ilibrarian/invisible-web/
 http://en.wikipedia.org/wiki/Deep_Web
 http://money.cnn.com/infographic/technology/what-is-the-deep-web/?iid=EL
 http://en.wikipedia.org/wiki/Surface_Web
Thank You
Visit www.seminarlinks.blogspot.in to Download

Contenu connexe

Plus de Seminar Links

Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Seminar Links
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)Seminar Links
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTSeminar Links
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTSeminar Links
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Seminar Links
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTSeminar Links
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTSeminar Links
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing TechniqueSeminar Links
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Seminar Links
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Seminar Links
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPTSeminar Links
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material pptSeminar Links
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military ApplicationsSeminar Links
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer scienceSeminar Links
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिSeminar Links
 

Plus de Seminar Links (20)

Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPT
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPT
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPT
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing Technique
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE)
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPT
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Dams PPT
Dams PPTDams PPT
Dams PPT
 
Bio mass Energy
Bio mass EnergyBio mass Energy
Bio mass Energy
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृति
 

Dernier

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Dernier (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

The Deep Web

  • 1. The Deep Web Visit www.seminarlinks.blogspot.in to Download
  • 2. Surface Web  The surface Web is that portion of the World Wide Web that is indexable by conventional search engines.  It is also known as the Clearnet, the visible Web or indexable Web.  Eighty-five percent of Web users use search engines to find needed information, but nearly as high a percentage cite the inability to find desired information as one of their biggest frustrations.  A traditional search engine sees only a small amount of the information that's available -- a measly 0.03 % [source: OEDB].
  • 3. Deep Web - Introduction  The Deep Web is World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines.  It is also called the Deepnet, Invisible Web or Hidden Web.  Largest growing category of new information on the Internet.  400-550X more public information than the Surface Web.  Total quality 1000-2000X greater than the quality of the Surface Web.
  • 4.
  • 5. History  Jill Ellsworth used the term invisible Web in 1994 to refer to websites that were not registered with any search engine.  Mike Bergman cited a January 1996 article by Frank Garcia: “It would be a site that's possibly reasonably designed, but they didn't bother to register it with any of the search engines. So, no one can find them! You're hidden. I call that the invisible Web”.  Another early use of the term Invisible Web was by Bruce Mount and Matthew B. Koll of Personal Library Software in 1996.  The first use of the specific term Deep Web, now generally accepted, occurred in the aforementioned 2001 Bergman study.
  • 6. How search engines work  Search engines construct a database of the Web by using programs called spiders or Web crawlers that begin with a list of known Web pages.  The spider gets a copy of each page and indexes it, storing useful information that will let the page be quickly retrieved again later.  Any hyperlinks to new pages are added to the list of pages to be crawled.  Eventually all reachable pages are indexed, unless the spider runs out of time or disk space.  The collection of reachable pages defines the Surface Web.
  • 8. Contents  Dynamic Content  Unlinked content  Private Web  Contextual Web  Limited access content  Non-Scripted content  Non-HTML/text content;
  • 9.
  • 10.  Dynamic content • Dynamic pages which are returned in response to a submitted query or accessed only through a form • especially if open-domain input elements (such as text fields) are used • such fields are hard to navigate without domain knowledge  Unlinked Content • Pages which are not linked to by other pages • Which may prevent web crawling programs from accessing the content • This content is referred to as pages without backlinks (or inlinks).
  • 11.  Private Web: sites that require registration and login (password-protected resources).  Contextual Web: pages with content varying for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence).  Limited access content: sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard, CAPTCHAs, or no-cache Pragma HTTP headers which prohibit search engines from browsing them and creating cached copies.
  • 12.  Scripted content pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flash or Ajax solutions.  Non-HTML/text content textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines.
  • 13. Deep Potential  The deep Web is an endless repository for a mind-reeling amount of information.  It's powerful. It unleashes human nature in all its forms, both good and bad.  There are engineering databases, financial information of all kinds, medical papers, pictures, illustrations ... the list goes on, basically, forever.  For example, construction engineers could potentially search research papers at multiple universities in order to find the latest and greatest in bridge-building materials.  Doctors could swiftly locate the latest research on a specific disease.  The potential is unlimited. The technical challenges are daunting. That's the draw of the deep Web.
  • 14. Shadow Land  The deep Web may be a shadow land of untapped potential.  The bad stuff, as always, gets most of the headlines.  You can find illegal goods and activities of all kinds through the dark Web.  That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted media and anything else you can think of.  Theoretically, you could even, say, hire a hit man to kill someone you don't like.  But you won't find this information with a Google search.  These kinds of Web sites require you to use special software, such as The Onion Router, more commonly known as Tor.
  • 15. The Onion Router (TOR)  Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites.  Critically it is free software for enabling online anonymity and censorship resistance.  Onion routing refers to the process of removing encryption layers from Internet communications, similar to peeling back the layers of an onion.  Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages, and other communication forms", back to the user.  It is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored.
  • 16. Cont…  Instead of seeing domains that end in .com or .org, these hidden sites end in .onion.  The most infamous of these onion sites was the now-defunct Silk Road, an online marketplace where users could buy drugs, guns and all sorts of other illegal items.  The FBI eventually captured Ross Ulbricht, who operated Silk Road, but copycat sites like Black Market Reloaded are still readily available.  Tor is the result of research done by the U.S. Naval Research Laboratory, which created Tor for political dissidents and whistleblowers, allowing them to communicate without fear of reprisal.  Tor was so effective in providing anonymity for these groups that it didn't take long for the criminally- minded to start using it as well.
  • 17. Silk Road Website U.S. authorities shut down Silk after the alleged owner of the site Ross William Ulbricht was arrested.
  • 18. Money-related transactions  You may wonder how any money-related transactions can happen when sellers and buyers can't identify each other.  That's where Bitcoin comes in.  Bitcoin, it's basically an encrypted digital currency.  Like regular cash, Bitcoin is good for transactions of all kinds, and notably, it also allows for anonymity; no one can trace a purchase, illegal or otherwise.  When paired properly with TOR, it's perhaps the closest thing to a foolproof way to buy and sell on the web.
  • 19. The Brighter Side of Darkness  The deep Web is home to alternate search engines, e-mail services, file storage, file sharing, social media, chat sites, news outlets and whistleblowing sites, as well as sites that provide a safer meeting ground for political dissidents and anyone else who may find themselves on the fringes of society.  In an age where NSA-type surveillance is omnipresent and privacy seems like a thing of the past, the dark Web offers some relief to people who prize their anonymity.  Bitcoin may not be entirely stable, but it offers privacy, which is something your credit card company most certainly does not.  For citizens living in countries with violent or oppressive leaders, the dark Web offers a more secure way to communicate with like-minded individuals.
  • 20. Invisible Web Search Tools • A List of Deep Web Search Engines – Purdue Owl’s Resources to Search the Invisible Web • Art – Musie du Louvre • Books Online – The Online Books Page • Economic and Job Data – FreeLunch.com • Finance and Investing – Bankrate.com • General Research – GPO’s Catalog of US Government Publications • Government Data – Copyright Records (LOCIS) • International – International Data Base (IDB) • Law and Politics – THOMAS (Library of Congress) • Library of Congress – Library of Congress • Medical and Health – PubMed • Transportation – FAA Flight Delay Information
  • 21. Future  The lines between search engine content and the deep Web have begun to blur, as search services start to provide access to part or all of once-restricted content.  An increasing amount of deep Web content is opening up to free search as publishers and libraries make agreements with large search engines.  In the future, deep Web content may be defined less by opportunity for search than by access fees or other types of authentication.
  • 22. Conclusion  The deep web will continue to perplex and fascinate everyone who uses the internet.  It contains an enthralling amount of knowledge that could help us evolve technologically and as a species when connected to other bits of information.  And of course, its darker side will always be lurking, too, just as it always does in human nature.  The deep web speaks to the fathomless, scattered potential of not only the internet, but the human race, too.
  • 23. References  http://computer.howstuffworks.com/internet/basics/how-the-deep-web- works5.htm  http://oedb.org/ilibrarian/invisible-web/  http://en.wikipedia.org/wiki/Deep_Web  http://money.cnn.com/infographic/technology/what-is-the-deep-web/?iid=EL  http://en.wikipedia.org/wiki/Surface_Web