Deep Web And Dark Web

Improved Essays
The internet has so many advantages and the most important one involves acting as a source of information, but in spite of the many advantages there are many things involved in the internet that are not good, legal, or even visible. The information provided by browsers such as Google chrome and Firefox only provide surface information hence they are called the surface web (Bocij, 2013). The other information is referred to as the deep web and it is not easily searched because the sites have security and private measures. Inside the deep web there is dark web in which information is encrypted form and the users and owners are usually anonymous.
The Dark Web
Dark web is a term that is used to refer to a collection of websites that are publicly
…show more content…
Deep web is a term that is used to refer to all web pages that cannot be found using the search engines (Chen, 2012). So deep web includes user’s databases, dark web, pages behind pay walls and webmail pages. There are vast numbers of pages such as these ones that exist mainly for everyday reasons. Unlike what the news sites report the actual dark web accounts for less than 0.01 percent of the web and the deep web accounts for 90 percent of the web (Bocij, 2013). Dark internet is another term that is used to refer to websites, databases and networks that are unreachable through the internet. Data can be unreachable in this case due to technical reasons, or because the data is private or because it contains information that will be needed by a few people. The tabloids use the phrases deep web and dark web to refer to secret and unsafe online worlds. The dark internet is known by many people as a place where raw data is stored by scientists for …show more content…
The Tor browser bundle can be downloaded from the internet and it contains all the important and needed tools. Accessing the dark web involves running the downloaded file, choosing an extraction location, opening the folder and clicking on the start Tor Browser (Ortiz-Arroyo, 2013). It is recommended that a user should place a tape on the laptops webcam in order to keep prying eyes from watching or use a tinfoil hat depending on the intentions of the user on using the dark web. Accessing the dark web is easy but it is difficult to know what to search and unsafe sites such as the sites for selling guns and drugs and other worse sites can be just a click away. The dark web sites also like other sites usually fail from time to time mostly because of their dark nature. The dark web is not a bad site the reason as to why it is bad is because people can do their private things and remain anonymous and also the fact that law enforcement is not able to get a way into the web therefore this encourages criminal activities (Yang,

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    ISP: An Internet Service Provider is a company that provides you with services that provide you with the connection to the internet. The main services the company provides are: Broadband, TV and Phone. Here are some ISP’s: Virgin Media, Sky, BT and Talk Talk. Different companies offer different broadband speeds, Virgin Media provide speeds from 50Mb, 100Mb and 200Mb.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    An Analysis of Carr’s “Is Google Making Us Stupid” In the last 30 years, a wave of technological innovation has swept over the Earth, blanketing our cultures with Cell Phones, Microwaves, and the peculiar creation labeled simply, “The Internet”. Emerging to the public in the 1990’s, the Internet is a vast collection of databases stored all around the world, allowing anyone with a computer and access to the internet to view virtually anything you might want to learn about. However, even in its early age, the Internet displayed curious properties, as popular tech-cartoonist Scott Adams states,” In 1993, there were only a handful of Web sites you could access, such as the Smithsonian’s exhibit of gems. These pages were slow to load and crashed…

    • 1649 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Is Google Making USupid

    • 337 Words
    • 2 Pages

    Today’s world is built upon informative, connected networks that is the internet. The internet is simply an infinite database in which anyone that has a computer can access. Despite what some may argue, the internet is not making us stupid. Instead, the internet simply provides society with useful information at a stroke of a key.…

    • 337 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    It seems to seduce individuals into keep adventuring more into technology and the web; making it easier for others to manipulate and abuse those who are more naïve to the online world. “The average Chinese Web surfer cannot be sure that every idea or opinion he encounters in cyberspace genuinely reflects the views of its author. The government has created the 50 Cent Party, an army of online commentators that it pays for each blog entry or message-board post promoting the Chinese Communist Party’s line on sensitive subjects.” (Bremmer 45). Some communist countries like the Chinese, spy on their people in order to make sure they aren’t exposed to outside opinions.…

    • 1174 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Cold War: How the Icy Rivalry Gave Us Fiery Technology Throughout history, we have experienced many technological influences, inventions, and innovations, many of which have changed the world and how we live in it. Our modern era depends on new, cutting-edge technology, but few look back to the origin. Some people believe that war brings new technology, since war motivates. Whether in the form of a theory, weapon, tool, or all three, the Cold War stands true to this and but this and played a major part in the advancement of our modern technological society by developing instruments for space exploration, bringing the advent of the internet, and upgrading operational capabilities of the computer.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Facebook Vs Ehling

    • 759 Words
    • 4 Pages

    The advent of the internet and internet communications have brought about a wide range of unresolved questions about the issue of privacy. Many of these issues have only been addressed by the courts on a case-by-case basis; not much legal precedent has been developed that can be applied across the board. Therefore, everyone has to be mindful about their privacy when using the internet for any purpose. I am not surprised that the employers of Souza or Leone read their postings to Facebook and they should not be surprised either. They both willingly put the information out on the internet, which is a public medium.…

    • 759 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Net Neutrality Stays The internet is a tool people use every day to talk to people, play games, and do research. What if all the things people do and search on the internet were no longer secret. What would happen if the privacy of internet users were stripped away from them. Today people face fact that net neutrality will be removed, which means that everyone will lose privacy from their own internet providers.…

    • 1139 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    I believe that social networking has changed the way people interact in our society. So much caution has to be used when posting on the internet and not all people understand that. Those are the main issues in this section. There are examples of these problems explained in more than three essays in the chapter. Things like mood, job opportunities, positions on a team, and even acceptance into schools are altered because of carelessness on the internet.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The author uses her knowledge of the topic to further her own argument against it, and to ultimately scare her readers. Whether they are the older generations who did not grow up with the internet, or the younger generations that are unaware of the effects of their browsing history. Andrews knows her target audience and how to tailor her words to them, similar to news agencies choosing what to report to each user based on their history. This “weblining” that she discusses in her essay, she is guilty of herself (334). She rattles off buzzwords that, to a layperson, sound quite intimidating.…

    • 758 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Great Essays

    In M.Fawcett’s essay, Google Never Forgets: A Cautionary Tale, the author warns the readers to be extra careful of what you decide to post on the Internet. The Internet creates the digital equivalent of an unauthorized biography to record your thoughts, life experiences, as well as your embarrassing stories. With the strong search engine, Google records everything you put on the web including many years before. Having an online existence comes with many implications. There are types of services, media, social networks and details that can create an individual’s online existence.…

    • 1662 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Dell Theory

    • 1283 Words
    • 6 Pages

    The Dell Theory of conflict prevention introduces a massive industry of supply chains working together. Friedman’s theory starts off with introducing how the world works together and shows us how an entire global supply chain produces his Dell notebook. It is the fact that non-credible countries are getting involved in this industry of production that caused Friedman to propose his theory. The Dell Theory of Conflict Prevention argues that if two countries are working together there will not be a cause for war, but there are limitations to this statement. Limitations to the dell theory are mutant supply chains where destruction is unavoidable, and the fact that world conflict has turned more into wars between groups vs. nations rather than…

    • 1283 Words
    • 6 Pages
    Improved Essays