Preview

Deep Web

Powerful Essays
Open Document
Open Document
1413 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Deep Web
Deep Web
By Bill Morton

Did you know that when you Google “Red Wolves,” Google will only search pages that it has indexed, which is only about four percent of the total World Wide Web (Why Businesses Needs to Understand the Deep Web, 2013). The other ninety-six percent is known as the Deep Web, or Invisible Web. This unknown realm is known for housing terroristic communication, gun and drug trading, assignation bids, and even child pornography. But the Deep Web also holds private files for sharing and storing for business, academic, and personal use. Like typical websites, these pages are still encrypted and decrypted, but typical search engines will not have the websites private key needed to decrypt these pages therefor cannot be indexed. The Darknet is the specific part of the Deep Web that houses the illegal activity. This is mainly because it is ran by private networks link from peer-to-peer. It is suggested that when exploring this part of the web a user will need use a browser that will keep his/her location anonymous. The Onion Router, or Tor, is an example of such browser. (Tor: Overview, n.d.) How Tor achieves this by bouncing a connected computers IP address, which shows the location of where a user is connecting from, i.e. home, to volunteer nodes where it hides the IP address under many layers, like an onion. Why? Well this is a criminal underworld full of hackers and other cyber criminals. The Deep Web, as defined in Learning to Crawl the Deep Web, is the portion of the World Wide Web that is not a part of the surface web; in other words, web pages that is not indexed by search engines. Search engines usually use “crawler” to index web pages, following links, and repeat. This will continue until it has a large catalog of the internet. Though a vast majority of pages cannot be accessed by these crawlers. There can be several reasons for this; the page may not be linked, it may have a log-in page which crawlers

You May Also Find These Documents Helpful

  • Good Essays

    Lucent Technologies

    • 546 Words
    • 3 Pages

    Evaluate the asset, debt, and equity structure of Lucent Technologies, as well as trends and changes found on the common-size balance sheet.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Mba 6004 U3A1

    • 1121 Words
    • 5 Pages

    The invisible web is known to be enormous. In fact, “Bright Planet estimates the invisible, or deep, web as being 500 times bigger than the searchable, or surface, Web” (Boswell, 2011). It may be difficult to understand what that actually means, but just think about how large Google is for instance. The invisible web is 500 times larger than all search engines combined.…

    • 1121 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The article written by Caitlin Dewey in the Washington Post describes what the dark web contains and how the users and sites are anonymous using browsers like Tor. Using the browser to exchange, music, and illegal pornography even to advertise the torture of someone to be viewed as the act occurs is available but proof of such activity is nonexistent. Examination of the servers, web sites does not allow for verification that the darkest activities occur, just an urban legend Ms. Dewey…

    • 83 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little, Brown and Company, .…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Silk Road

    • 641 Words
    • 3 Pages

    Ross Ulbricht was arrested for creating the drug market “Silk Road”. Eric Marques was arrested for distributing child pornography on the Dark Net. Both of these men learned that the Dark Net is not anonymous. Ross Ulbricht and Eric Marques learned that the FBI has the power to do almost anything and if they want to find a suspect they will. The Dark Net has become more dangerous as the years go on. The Dark Net is used for a variety of illegal activities, including: hiring hitmen, purchasing and selling drugs, and viewing and uploading child pornography.…

    • 641 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the case of pornography and child abuse images, there is no doubt that the internet plays host to a large amount of legal and illegal material.…

    • 1127 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Google

    • 1140 Words
    • 5 Pages

    “I’m just going to Google it” is one of the most common phrases heard throughout high school and college campuses of today as a response to several unknown questions. Google is one of the most popular search engines of the Internet that is often referred to as the “Best Friend” of those who constantly rely on it for guidance. Since the emergence of the Internet, there has been a huge debate over whether or not Google and the Internet as a whole is hindering the human thought process. Nicholas Carr is one author that believes although Google may be our “Best Friend”, it is not necessarily good for the way that we are beginning to think. Carr outlines his argument on this subject in the article “Is Google Making Us Stupid?” and is challenged by a counter-argument by another author, Trent Batson.…

    • 1140 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The Internet is capable of many things but undoubtedly its main purpose is to provide the world with unlimited information. Rather than look something up in a book, today many people just ‘Google’ it, a phrase that was coined because of the dominance of Google as the world’s leading search engine. The vast amount of material on…

    • 1113 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Google

    • 768 Words
    • 4 Pages

    Without a doubt the United States was brutal during their 14 years in the Vietnam War. There were times when our soldiers were commanded to shoot Vietnam civilians. Our second source tells us that they killed mostly women and children. Perhaps there were times when American soldiers could not tell a Viet Cong sniper apart from a civilian, but either way, there were around 5,000 civilians killed by the United States. There are a lot of veterans who have served in American wars who suffer from PTSD after they get home from battle. Post-traumatic stress disorder could be brought on by high intensity while a soldier is in battle, seeing a fellow soldier die, shooting enemies, and it is evident that shooting civilians can cause it as well. Veterans can get aggressive if their settings at home give them a flashback of a bad memory of war. A lot of soldiers such as veteran Bob Kerrey regret killing civilians and they have had to live with it for the past forty years. There are questions to whether or not the Americans are war criminals for killing these Vietnam civilians.…

    • 768 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computers are a wondrous invention. From their very infancy in World War II, they have enabled man to defeat his fellow man in cryptographic war, they have been used to sequence the human genome and so many previously impossible things. However, we are entering an age where computers and technology have become almost indistinguishable from our everyday lives in a myriad of forms like Facebook ,Snapchat, and Instagram, and we must, as a culture, make a decision on how far we are willing to let technology and those who wield it enter our lives. The Circle by Dave Eggers is a poignant warning of the possible dangers of technology and power gone rampant. The novel concerns an extremely influential internet search corporation known as The Circle whose de facto monopoly on internet searches and online advertising has granted them tremendous wealth and power over governments, companies and public opinion .…

    • 792 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is Your Information Safe?

    • 1575 Words
    • 7 Pages

    window to get into your house. He doesn't hold a gun to your head, nor does he…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    War on drugs

    • 873 Words
    • 4 Pages

    The site has been in secrecy ever since it was founded in February 2011. Smart pc users in Long Island and New York City residents are using this site and have contributed to the $30 million in annual sales. Silk Road’s jackpot business has opened a new front in the battle against illegal drugs in which dealers and consumers use sophisticated technology to hide their where beings and defy laws after 40 years ago when President Nixon declared a “war on dugs”.…

    • 873 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unfortunately, the internet has not always been used for pleasantries and to make research easier. The internet was originally used for a much more important purpose. The internet began in the 1960’s as a US military initiative to create secure communications in time of conflict. By sending data transmissions from one computer to another in stages it ensured that if any link in the chain was destroyed by enemy action, there would be other paths, through other computers, to the same destination the information would still arrive. This also insured the enemy would not be able to intercept the entire message. From here the internet has found its way to civilian life, and daily use. (Oxford: Elsevier Science & Technology, 2010)…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Dawn of The net

    • 399 Words
    • 1 Page

    The dawn of the net is a more or less 20 minutes show that illustrates the process or the sequence involving the internet. As I watched the show, I was really amazed how the internet works, how the message was being send and what the computer usually do whenever there are unacceptable websites. The show usually more on what is inside the computer. Through this, I was able to know the warriors of the net and they are the TCP packet or known as Transfer Control Protocol, the ICMP or Internet Control Message Protocol, the UDP, Router, Ping of death, and Router Switch. The Transfer Control Protocol looks like the bus where the information is being packed. The Router is programmable memory. The router's switch on the other hand is more specific of the destination of the packet. The Ping of death in the computer refers to the police that captures the hacker and destroys the unacceptable sites. The process involving is a little bit long.Whenever the user types something in the website, the information is packed and it is already called as the TCP packet. the TCP packet is the labeled and the address is being placed and it will be send to the Router. The Router sends the TCP packet into the Router Switch which guides it to the network interface and it will be received by the proxy or sometimes referred to as the mailman. It is then that the TCP packet is being opened and its contents are checked. If the contents of the TCP packet consist of sites that are unacceptable just like pornographic sites it is destroyed. After this, the firewall will chose what TCP packets can come inside. There would be few that will be remained to enter the spider web. After the spider web, it will be received again by the firewall wherein the TCP packet is then categorized into 80 or 25. The packet would be destroyed if it does not fall into either 80 or 25. After this it will go to the proxy server where it would be open and unpacked. And lastly, the information is being send back to you. It…

    • 399 Words
    • 1 Page
    Good Essays

Related Topics