Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet138/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   134   135   136   137   138   139   140   141   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

The Dark Web Explained
There is the web, which basically is a term that denotes the existence of the
world wide web. On the other hand, however, exists a dark web. The dark
web is what you would consider being a zone beyond the safety of the
common respectable Google, Amazon and other websites. It is like a dark
room at the corner of a room and what is surprising even more is that there
is a bigger picture when it comes to the dark web, and this is known as the
deep web. The world of dark websites can be complicated, and this is why
we compile this chapter to enlighten you about the dark web. This chapter
tells you everything you need to know and helps you decide whether the
dark web is worth you take a visit or not.
Unlike the traditional web, the dark web exists on what is known as the
dark network and on the overlay network. These networks, just like the
normal web, use the internet but require configurations, software and in
other cases, some special software to access. This dark web does not end at
this as it is part of a larger platform that is known as the deep web .
The deep web is special because it is not indexed as a part of the web search
engines that are used in everyday life. Sometimes, the dark we are used
interchangeably albeit mistakenly to refers to the dark web. Examples of the
darknet include peer-to-peer networks which are small, to bigger, more
popular networks such as 12P, Tor and Ruffle. Surprisingly, the bigger
ventures are run either individuals or big, public organizations. As a user of
the regular network, you may refer to yourself simply as a user of the
network and may only designate the name dark web to websites such as
those described above. However, the people that use the dark web would


call the regular internet the clearnet. While this term may be unfamiliar, the
clearnet is simply the dark web user’s way of referring to the unencrypted
nature of the regular net. Below, we enter into a deeper discussion of the
dark web and what you can understand from it.
To access the dark web, you have to go through platforms such as Tor. You
may probably not know this if you are still new to the world of the dark
web, then it would be beneficial to know that Tor stands for The Onion
Ring. There is also the I2P which stands for the Invisible Internet Project.
Tor and other sites that are accessible from the Tor browser are accessible to
dark web users and are easily identifiable through the domain “onion.” Tor
is for anonymous access to the internet while I2P provides a different kind
of service, which is hosting sites anonymously. As such the location and
identities of darknet users remain unknown and untraceable mainly because
the encryption system is layered .
The encryption technology deployed by platforms such as intermediate
servers works to ensure anonymity and protection of the human identity.
The information transmitted is not decrypted by a node is subsequent which
is then leads to the exit node of the scheme. The node path is complicated,
and therefore, it is almost impossible for reproduction and decryption of the
information layer by layer. The high encryption level of the websites
prevents the internet protocol and geographical location, and thus users are
unable to get information from or about the host. Users within the network
can allow the users to blog, talk and exchange information confidentially
and in confidence.

Download 6,34 Mb.
1   ...   134   135   136   137   138   139   140   141   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish