{"id":565,"date":"2019-09-14T13:27:02","date_gmt":"2019-09-14T12:27:02","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=565"},"modified":"2019-09-18T10:08:08","modified_gmt":"2019-09-18T09:08:08","slug":"the-deep-web","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/the-deep-web\/","title":{"rendered":"The Deep Web"},"content":{"rendered":"<p><strong><u>What is it?<\/u><\/strong><\/p>\n<ul>\n<li>\u0097World Wide Web content that is not part of the Surface Web and is indexed by search engines. Deep Web<\/li>\n<li>Most content that is not readily accessible using standard means (i.e. search engines).<\/li>\n<li>For example, web pages regarding private user accounts are in the deep web (Private Info).<\/li>\n<li>\u0097\u00a0The Deep Web is the majority of online content, estimated to be 400-550 times larger than the surface web.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-567 aligncenter\" src=\"http:\/\/zerothcode.com\/blog\/wp-content\/uploads\/2019\/09\/0_TDCuupQF8FVkWeeT.png\" alt=\"deep web\" width=\"877\" height=\"585\" srcset=\"https:\/\/zerothcode.com\/blog\/wp-content\/uploads\/2019\/09\/0_TDCuupQF8FVkWeeT.png 877w, https:\/\/zerothcode.com\/blog\/wp-content\/uploads\/2019\/09\/0_TDCuupQF8FVkWeeT-300x200.png 300w, https:\/\/zerothcode.com\/blog\/wp-content\/uploads\/2019\/09\/0_TDCuupQF8FVkWeeT-768x512.png 768w, https:\/\/zerothcode.com\/blog\/wp-content\/uploads\/2019\/09\/0_TDCuupQF8FVkWeeT-20x13.png 20w\" sizes=\"auto, (max-width: 877px) 100vw, 877px\" \/><\/p>\n<p><strong><u>Surface Web vs. Deep Web<\/u><\/strong><\/p>\n<p><strong>Surface Web\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n<ul>\n<li>\u0097\u00a0Entries are statically generated<\/li>\n<li>\u0097\u00a0Linked Content (web crawled)<\/li>\n<li>\u0097\u00a0Readily accessible through any browser or search engine unlike the Deep Web, which requires special search engines, browsers, and proxies to access.<\/li>\n<\/ul>\n<p><strong><u>Deep Web<\/u><\/strong><\/p>\n<ul>\n<li>\u0097\u00a0Entries are dynamically generated (submitted to a query or accessed via form).<\/li>\n<li>\u0097\u00a0Unlinked Content<\/li>\n<li>\u0097\u00a0Contextual Web<\/li>\n<li>\u0097\u00a0Private Web<\/li>\n<li>\u0097\u00a0Scripted Content<\/li>\n<li>\u0097\u00a0Non-HTML content<\/li>\n<li>\u0097\u00a0Limited Access Content (anti-robot protocols like CAPTCHA)<\/li>\n<\/ul>\n<p><strong><u>The Deep Web<\/u><\/strong><\/p>\n<ul>\n<li>\u0097\u00a0Requires a proxy or two (namely Tor) to access.<\/li>\n<li>\u0097\u00a0Contains most of the archived web pages of the 1990s Web that did not renew their domain names and such.<\/li>\n<li>\u0097\u00a0Government\/Business\/Collegiate Research.<\/li>\n<li>\u0097\u00a0Hackers\/Script Kiddies\/Virus Information.<\/li>\n<li>\u0097\u00a0Illegal and Obscene Content (CP, Gore, Suicides, etc.)<\/li>\n<\/ul>\n<p><strong><u>How to Access Safely<\/u><\/strong><\/p>\n<ul>\n<li>\u0097\u00a0Vertical and Split Searching<\/li>\n<li>\u0097\u00a0Proxies (namely Tor) and AV programs.<\/li>\n<li>\u0097\u00a0Turn off ALL plug ins before accessing (especially the shady parts).<\/li>\n<li>\u0097\u00a0If your computer has a webcam, remove or obstruct it.<\/li>\n<li>\u0097\u00a0Stay away from anything that looks remotely criminal or suggestive.<\/li>\n<li>\u0097\u00a0Use a safe, private\u00a0network connection (DO NOT USE THE IUP WIFI)<\/li>\n<\/ul>\n<p><strong><u>Tor:<\/u><\/strong><\/p>\n<p>-\u201d The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.\u201d \u2013\u00a0<a href=\"http:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.torproject.org<\/a><\/p>\n<p>-Tor is a network that supports onion routing; a way to help make your traffic anonymous. Because the Deep Web is compromised of information that doesn\u2019t show up on search engines, or has no domain name registry, you must know exactly where you are going to get there.<\/p>\n<p><strong><u>Currency of the Deep Web<\/u><\/strong><\/p>\n<p><strong><u>Bitcoins:<\/u><\/strong><\/p>\n<p><strong>&#8211;<\/strong>an\u00a0electronic cash\u00a0system using\u00a0peer-to-peer networking,\u00a0digital signatures\u00a0and\u00a0cryptographic proof\u00a0to enable irreversible payments between parties without relying on trust. Payments are issued and transferred by the\u00a0Bitcoin<em>\u00a0network<\/em>.<\/p>\n<p>-Participants begin using Bitcoin by first acquiring a Bitcoin wallet and one or more Bitcoin addresses. Bitcoin addresses are used for receiving Bitcoins, similar to how e-mail addresses are used for receiving e-mail.<\/p>\n<p>-In April 2012, 1 BTC traded at around $4.80. Taking into account the total number of Bitcoins in circulation, the market capitalization of the Bitcoin network stands at over 40 million USD<\/p>\n<p><strong><u>What Is Use of Dark-Web<\/u><\/strong><\/p>\n<ul>\n<li>Hire Hitman: \u00a0Dark web use as contract-killer site<\/li>\n<li>To Buy Drugs Online From Darknet Markets<\/li>\n<li>\u00a0 Buy drugs online dark web<\/li>\n<\/ul>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>reference site : https:\/\/www.wikipedia.org\/<\/p>\n<p>https:\/\/www.fileshare.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is it? \u0097World Wide Web content that is not part of the Surface Web and is indexed by search<\/p>\n","protected":false},"author":1,"featured_media":566,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[51],"tags":[159],"yst_prominent_words":[238,235,230,229,232,223,226,231,234,222,233,236,176,227,237,225,224,239,228],"class_list":["post-565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials","tag-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=565"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/565\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/566"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=565"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}