Skip to main content

What is Surface Web, Deep Web and Dark Web


         Ladies and Gentlemen, in daily life we are surfing internet for various purpose. Nowadays Internet has become an integral of everyone’s life. But do you know the internet you are using in daily life is the smallest part of the internet and the another largest part of the internet that you might be not using. In this article I’m gonna clear all the things about internet so this article till the end.
         The largest part of internet which doesn’t appear on google. And that can be accessed by those who have the direct link or authentications of that part to access. In fact internet is divided into three parts.
In fact Internet is divided into three parts.


  • Surface Web

  • Deep Web

  • Dark Web



SURFACE WEB:




         Surface web is the piece of www(world wide web) which is easily available for all common internet users and which can be accessed by all the search engines, anywhere anytime without any special permissions.
It the section we are using in our daily life like Social Networking sites, Online Shopping sites or whatever you search on google and it comes in search results. These websites are come under the surface web section of internet.
         It is the upper most layer of internet. But do you know this whole surface web is only 4% of the total internet.



DEEP WEB:




        It the lower most layer of internet. Deep web is also known as hidden web, which is not displayed in any search engine. It is the section of internet where all the confidential data of the internet is been stored.
         The normal user can’t access it easily, if you want to access the data on the deep web then you need a special URL for the special site, the special address for a special server and also with this you need to have the special permission or authentication that you are eligible for access this particular information.
         The data present on deep web that can be of anyone. For example, this data can be of any company, bank, organization or government. It includes the very important data like important researchers, secrete data on the companies, bank details, secrete projects of government and most of secrete files that are not revealable for everyone.
         In fact we also need the Deep Web because we also need to store some private data on internet that we want to share across the globe but only with the few people. For example, if any company want to share some data with their employees only then the company will give the URL of that web page where the particular data is saved and to access that data the company will provide the login ID and password with the help of this the employees of that particular company could access that file or data.
         Your social media accounts login information or hidden information are also included in deep web. So the deep web is simply the section of internet which you can’t access without any permission.




DARK WEB:



 
        Dark web is the smallest part of Deep web which is the very dangerous part of the internet.
It the deepest layer of the internet which is present in the lower level of the deep web.
        The pages which are not indexed in the search engine and most of people don’t have the address of such pages. Only the people know the addresses of such pages who do work on the dark web. Drugs dealing, hiring shooters(hitman), pornography, Human trafficking like any of illegal work is done on dark web.
         Is the black section of internet where you can do anything on the internet. You can’t find it on google search engine. For accessing dark web the special browser is needed i.e Tor browser. The Tor browsers contains various VPNs and it searches anything in duckduckgo.com search engine.
Dark web is totally illegal thing and you can be arrested by police. If you are surfing dark web the other people surfing dark web can also hack you system and can access your data also.


         It is important to have lots of information about this world of technology but our responsibility is to use this only in legal way not illegally. Then and only then it’s helpful for us, our society and our government.

Comments

Popular posts from this blog

CREATE AN ANTIVIRUS USING COMMAND PROMPT

In this article we are going to create an antivirus using simply a notepad. It will delete all simple micro viruses in your system. Type the following code into Notepad: @ echo off echo off turn off the active virus taskkill / F / IM  virus1.exe / IM  virus2.exe echo Deleting all of viruses based on size for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA "%% a" echo deleting hidden virus echo for drive c and subfolders for / R C: \%% a in (*. doc.exe) do del "%% a" echo for drive d an d subfolders for / R D: \%% a in (*. doc.exe) do del "%% a" echo Unhide Documentcd / d c: \ echo for drive C and subfolders *. doc attribHSA / S cd / d d: \ echo for drive D an d subfolders *. doc attribHSA / S exit Here, text in green is alert message and text in red are the program that your system will search for those and delete these files. Now, Save the file with .bat extension , For example antivirus.bat. then go

What Actually Black Hat Hackers, White Hat Hackers & Gray Hat Hackers Are?

       We all are aware from the term hacking and one who perform this activity is called as hackers. Basically hackers is a skilled computer expert who uses their knowledge (technical) to break the security or just to overcome a security problem.          There are three types of hacke rs in the world. Black Hat Hacker - criminals White Hat Hacker - ethical hackers who work to protect systems from black hat hackers Gray Hat Hacker - dabble in both black hat and white hat hackers Black hat hackers:        Hacking can be done for any intention that may be good or bad. The Black hat hackers performs hacking for bad intention. They do hacking unethically. These types of hackers usually hack systems for following gains: Personal Gain- for example stealing personal data like credit card number, harvesting personal information for sale to identity thieves etc. Destroy Data – black hat hackers are very dangerous that if