Tag: IP address

  • Deep Web,The Dark Side Of Internet Details

    Deep Web,The Dark Side Of Internet Details

    All of us know Internet.

    *Scroll down for Videos.

    The Deep Web Search browser.
    What is a Tor? How to preserve the anonymity?
    Tor is the acronym of “The onion router”, a system implemented to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers hiding user’s information eluding any activities of monitoring.
    As usually happen, the project was born in military sector, sponsored the US Naval Research Laboratory and from 2004 to 2005 it was supported by the Electronic Frontier Foundation.
    Actually the software is under development and maintenance of Tor Project. A user that navigate using Tor it’s difficult to trace ensuring his privacy because the data are encrypted multiple times passing through nodes, Tor relays, of the network.
    Connecting to the Tor network
    Imagine a typical scenario where Alice desire to be connected with Bob using the Tor network. Let’s see step by step how it is possible.
    She makes an unencrypted connection to a centralized directory server containing the addresses of Tor nodes. After receiving the address list from the directory server the Tor client software will connect to a random node (the entry node), through an encrypted connection. The entry node would make an encrypted connection to a random second node which would in turn do the same to connect to a random third Tor node. The process goes on until it involves a node (exit node) connected to the destination.
    Read more: http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html#ixzz2ipKPzWY8
    Follow us: @TheHackersNews on Twitter | TheHackerNews on Facebook

    We are able to access them and the information is Indexed by Search Engines.

    We can access the information by relevant queries.

    This is a part of World Wide Web, www.

     

    There is another side to the world wide web where you can not normally access the information , but is still a part of the world wide web.

    This is called the Deepnet, the Invisible Web, the Undernet or the hidden Web.

    Then there is the dark Internet, the computers that can no longer be reached via Internet, or with a Darknet distributed filesharing network, which could be classified as a smaller part of the Deep Web.

    Mike Bergman, founder of BrightPlanet coined the phrase.

    He explained searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed.

    Most of the Web’s information is buried far down on dynamically generated sites, and standard search engines do not find it.

    Traditional search engines cannot “see” or retrieve content in the deep Web—those pages do not exist until they are created dynamically as the result of a specific search. As of 2001, the deep Web was several orders of magnitude larger than the surface Web.

    What the Deep Web is generally used for?

    1.For Drug Sales.

    2.For Hiring Contract Killers.

    3.Seeking Contract Killers.

    3.Sexual perversions.

    4.Drug Trafficking, Money Transfers.

    5.Child Trafficking.

    6.Human Trafficking.

    7.Mercenaries  recruitment and Advertisement.

    8,Also being used by some Intelligence Agencies for Dark Operations.

    Story:

    Hiring a hitman has never been easier. Nor has purchasing cocaine or heroin, nor even viewing horrific child pornography.

    Such purchases are now so easy, in fact, that they can all be done from the comfort of one’s home at the click of a button… and there’s almost nothing the police can do about it.

    This worrying development of the criminal black market is down entirely to the Deep Web – a seething matrix of encrypted websites – also known as Tor – that allows users to surf beneath the everyday internet with complete anonymity.

    And like The Silk Road, transactions are all made using the mysterious online currency Bitcoin. One site, whose name MailOnline has chosen not to publish, offers an assassination in the US or Canada for $10,000 and one in Europe for $12,000.

    ‘I do not know anything about you, you do not know anything about me,’ crows one self-styled assassin, according to The Daily Dot. ‘The desired victim will pass away. No one will ever know why or who did this. On top of that I always give my best to make it look like an accident or suicide.’

    Deepweb is buried in the Internet where prohibited activities take place.
    Ad in the Deep Web-Contract Killers.
    Mercenaries advertise in the Deep Web.
    DeepWeb advertisement by Mercenaries.

    THE DEEP WEB: WHAT IS TOR?

    Tor – short for The onion Router – is a seething matrix of encrypted websites that allows users to surf beneath the everyday internet with complete anonymity.

    It uses numerous layers of security and encryption to render users anonymous online.

    Normally, file sharing and internet browsing activity can be tracked by law enforcement through each user’s unique IP address that can be traced back to an individual computer.

    The Tor network on the Deep Web hides the IP address and the activity of the user.

    Most of the Web’s information is buried far down on dynamically generated sites, unable to be found or seen by traditional search engines – sites or pages don’t exist until created as the result of a specific search.

    An Internet search is like dragging a net across the surface of the sea – a great deal of information is caught, but a majority is deep and therefore missed.

    ‘I have gained endless experience(s) in this [sic] 7 years,’ he goes on. ‘It has changed me a lot. I don’t have any empathy for humans anymore.

    ‘This makes me the perfect professional for taking care of your problems and makes me better than other hitmen. If you pay enough I’ll do ANYTHING to the desired victim. If I say anything I mean anything.’

    Many of the sites even use slogans and marketing techniques that, if it weren’t for their macabre subject matter, could be as at home on the website of a legitimate retail website.

    ‘The best place to put your problems is in a grave,’ boasts one.

    Some even seem to offer others the chance to profit from their killing by allowing users to bet on when a victim will die by putting money in a pool. The closest guess takes home the pot.

    And while many appear every inch the cold-blooded killer one would expect from a gun-for-hire, there is also apparently the odd humanitarian hitman.

    ‘Killing is in most cases wrong, yes,’ writes one. ‘However, as this is an inevitable direction in the technological evolution, I would rather see it in the hands of me than somebody else.’

    ‘By providing it cheaply and accurately I hope that more immoral alternatives won’t be profitable or trusted enough. This should primarily be a tool for retribution.’

    Adding that murder should always be committed for ‘good reason’, he writes: ‘Bad reasons include doctors for performing abortions and Justin Bieber for making annoying music.

    How To Surf The Deepweb.

    You’ll need a browser named Tor. Open that up and get a new identity around every few minutes. The rest is up to you. I’d recommend checking out the Evil Wiki and learning about onion sites and seeing if you can find some links. That’s what I did the other night at least and found a bunch of weird shit. Like this one dude was selling “sex dolls” He cuts the legs and arms off children and abuses the shit out of them so they don’t feel pain. He pulls their teeth out so they can’t bite your you know what and so much more, so if that’s what interest you then go ahead, but honestly there isn’t really any reason to go to the “deep web”.

    Has The Deep-web Closed after busting of the Silk Road by the Deep Web?

    In an interesting post-mortem release by the creators of the defunct anonymous marketplaceAtlantis there is information that the former admins and users of the Silk Road are planning to resurrect the service. User RR writes: “We have SilkRoad v2.0 ready to launch and is now in its final testing stages. Our site has all the features of the original one and we have kept the same style of forum for your ease.”

    The new SilkRoad will be sending out anonymous invites to former vendors and then open to the Tor-using public soon after.

    The representatives of Atlantis write:

    From a quick scout around I’ve counted at least 5 publicly stated projects with the said aim of replacing becoming “Silk Road 2.0″ and many many more gathering info and building alliances.
    And this is what Law Enforcement is now parading as a victory? Over two years of investigation, millions of dollars spent and for what so a couple of armchair programmers can build it again in a few days while in the meantime vendors simply move to other site’s .

    Users are already planning ways to keep the new site secure. This includes the creation of something called BitWasp, an “open source, anonymous bitcoin marketplace specifically built for use in conjunction with Tor or I2P via the hidden services such as .onion websites and eepsites.”

    Sources:

    http://techcrunch.com/2013/10/04/deep-web-users-are-ready-to-launch-silk-road-2-0/

    http://www.reddit.com/r/deepweb/comments/1o7uaf/new_to_the_deepweb/

    http://www.dailymail.co.uk/news/article-2454735/The-disturbing-world-Deep-Web-contract-killers-drug-dealers-ply-trade-internet.html

    http://en.wikipedia.org/wiki/Deep_Web

    Image credit.http://unpromisedone.blogspot.in/2011/09/information-about-deep-web.html

    the above url has no API key

  • Silk Road, Online Drug Site, The Story.

    Drug was being sold deep Online at the site Silkroad in the Internet deep undercover.

    Gawker did a story.

    FBI  arrested the culprits and took the site down.

    This is how a Drug was  brought.

    ( Some time back I Posted a Story that Amazon was selling Drugs Online)

    Drug Online.
    Buying Drug Online.

     

    STEP 1 – DOWNLOAD A TOR CLIENT

    Tor isn’t just the tool of choice for Internet-savvy dissidents and Wikileakers: it’s also your passport to the underbelly of the web. It’s an ingenious little application that essentially masks a user’s IP address as different IP addresses, allowing you to switch your address whenever you so choose. It also allows you to access .onion sites, which make up the main topography of something called the Deep Web (which you can also refer to as Deepnet, the invisible Web, DarkNet, Undernet, or the hidden Web).

    It’s part of the Internet, but it’s comprised of sites that aren’t indexed by search engines and take some fanaggling to find. Who uses the deep web? Mainly hackers, libertarians, and child pornographers – that and open-web enthusiasts, but mainly hackers, libertarians, and child pornographers. Some researchers believe it’s almost three times the size of the standard web. It’s like the Internet is an iceberg, and below the surface of the water are DIY Russian submarines with armed with digital missiles pointed at the world’s governments.

    Online Drug PurchaseD
    How To Buy Drug Online.

     

    The latest Twist is that a Top Heroin Dealer in the Silk Route was a FBI Informant.

    “The hits keep on coming in the Silk Road takedown. The latest twist in the story of the fall of the biggest drug market on the Dark Net is that one of its best-known dealers was busted and turned informant months ago,according to The Smoking Gun.

     

    http://gawker.com/silk-roads-most-famous-heroin-dealer-was-an-fbi-inform-1449655695

    http://motherboard.vice.com/blog/traveling-down-the-silkroad-to-buy-drugs-with-bitcoins

     

  • Internet Connectivity To Be denied on Monday 9 July 2012.

    “Monday, 9th of July, at 06:00 (MEZ) the temporary DNS-servers setup by FBIwill be shut down. But still there are still thousands of infected machines – one can wonder, what will happen to them, since malware which was constantly being used by cyber criminals to access confidential data from throughout the world.

    Where the Internet is stored
    Where the Internet is stored (Photo credit: debs)

    Computers in the internet have their own address – the IP-address. There are two versions:

    IPv4 which is a 32-bit address e.g. 195.122.169.23 and

    IPv6 which is a 128-bit address e.g. 2001:db8:85a3:8d3:1319:8a2e:370:7347

    In order to combat the DNS Changer and associated viruses from affecting more people/computers, the FBI has brought out a mechanism through which you can identify whether your computer system is affected by the DNS changer or not. There is also a deadline set by the FBI that is July 9 2012. By this date, computers infected with the DNS Changer will be denied internet access as the FBI might shut down temporary DNS Servers that are infected.

    There is no need to panic as the FBI has put up a robust virus scanning mechanism ( website) through which you can scan your computer and also remove the virus completely as the site also provides a step-by-step guide to remove the infection completely.

     

    What Happened:In November 2011, the FBI identified and located a ring of cyber criminals that had infected more than four million computers across the world with a Trojan known as DNSChanger.  DNSChanger infiltrated both personal and corporate PCs redirecting computers to a set of DNS servers which directed Web searches to malicious Web sites. Beginning in 2007, the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA. The thieves were able to manipulate Internet advertising to generate at least $14 million in illicit fees.This is called “clickjacking” which is a technique where infected users think they are clicking on one website but are actually redirected to the fraudsters advertisement websites so they can get the click revenue stream.

    http://www.varindia.com/FBI_Suspend-Internet-Connectivity.htm

     

    About a quarter-million computer users around the world are at risk of losing internet access on Monday because of malicious software at the heart of a hacking scam that US authorities shut down last November.

    Some blogs and news reports hyped the risk of an outage, warning of a potential ‘blackout’ and describing the Alureon malware as the ‘Internet Doomsday’ virus.

    Yet experts said only a tiny fraction of computer users were at risk, and internet providers would be on call to quickly restore service. They said they considered the threat to be small compared with more-prevalent viruses such as Zeus and SpyEye, which infect millions of PCs and are used to commit financial fraud.

    As of this week, about 245,000 computers worldwide were still infected by Alureon and its brethren, according to security firm Deteque. That included 45,355 computers in the United States.

    The viruses were designed to redirect internet traffic through rogue DNS servers controlled by criminals, according to the FBI. DNS servers are computer switchboards that direct web traffic.

    When authorities took down the rogue servers, a federal judge in New York ordered that temporary servers be kept in place while the victims’ machines were repaired. The temporary servers will shut down at 12:01 am EDT (0401 GMT) on Monday, which means the infected PCs that have not been fixed will no longer be able to connect to the internet.

    Some US internet providers, including AT&T and Time Warner Cable, have made temporary arrangements so that their customers will be able to access the internet using the address of the rogue DNS servers.

    http://articles.timesofindia.indiatimes.com/2012-07-06/internet/32565405_1_internet-providers-servers-internet-access

  • Google Warns of Virus Attack,May Lose Internet in July

    Virus attacks are not new.

    English: Symbolic image depicting the computer...
    English: Symbolic image depicting the computer virus Stuxnet (Photo credit: Wikipedia)

    But there seems to be n serious new threat lurking that has made Google to announce the threat publicly warning that people may lose internet connection in July 2012.

    Or is it a hoax like Y2 K?

    There is yet another virus threat Flame.

    ” Google plans to warn more than half a million users of a computer infection that may knock their computers off the Internet this summer.
    Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system will be shut down July 9 — killing connections for those people.
    The FBI has run an impressive campaign for months, encouraging people to visit a website that will inform them whether they’re infected and explain how to fix the problem. After July 9, infected users won’t be able to connect to the Internet.

    On Tuesday, May 22, Google announced it would throw its weight into the awareness campaign, rolling out alerts to users via a special message that will appear at the top of the Google search results page for users with affected computers, CNET reported.
    “We believe directly messaging affected users on a trusted site and in their preferred language will produce the best possible results,” wrote Google security engineer Damian Menscher in a post on the company’s security blog.
    “If more devices are cleaned and steps are taken to better secure the machines against further abuse, the notification effort will be well worth it,” he wrote.
    The challenge, and the reason for the awareness campaigns: Most victims don’t even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.
    Last November, when the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers, the agency realized this may become an issue.
    “We started to realize that we might have a little bit of a problem on our hands because … if we just pulled the plug on their criminal infrastructure and threw everybody in jail, the victims of this were going to be without Internet service,” said Tom Grasso, an FBI supervisory special agent. “The average user would open up Internet Explorer and get `page not found’ and think the Internet is broken.”
     http://www.foxnews.com/scitech/2012/05/25/google-warns-hundreds-thousands-may-lose-internet-in-july/#ixzz1wGeC156E

    “Long Arm of Scofflaw
    An online ad scam is having some unintended ramifications: The fix may prevent as many as 360,000 from getting online. Several sites will show if you’re infected:
    DNS Changer Working Group: can discern whether you’re infected and explain how to fix the problem.
    DNSChanger Eye Chart: if the site goes red, you’re in harm’s way. Green means clean.
    The FBI website: type in the IP address of your DNS server to find out if it is infected.
    Read more on how to stay safe

    Middle Eastern states were targeted and Iran ordered an emergency review of official computer installations after the discovery of a new virus, known as Flame.
    Experts said the massive malicious software was 20 times more powerful than other known cyber warfare programmes including the Stuxnet virus and could only have been created by a state.
    It is the third cyber attack weapon targeting systems in the Middle East to be exposed in recent years.
    Iran has alleged that the West and Israel are orchestrating a secret war of sabotage using yber warfare and targeted assassinations of its scientists as part of the dispute over its nuclear programme.
    Stuxnet attacked Iran’s nuclear programme in 2010, while a related programme, Duqu, named after the Star Wars villain, stole data.

    http://www.telegraph.co.uk/news/worldnews/middleeast/iran/9295938/Flame-worlds-most-complex-computer-virus-exposed.html

    Read On.

  • Google’s New Privacy Policy Information is A Bikini.

    Google‘s privacy Policy Information is like a Bikini,it coceals more than it reveals.

    Google wants to store your personal information for the Samaritan service of helping the Society such as identifying disease, correlating data and helping the Society run smoothly.

    Your Data  becomes anonymous after 9 months and IP address cookies are deleted after this period.

    You have the solemn assurances of Google on this.

    The Google also will not(?) share your information with any one including advertisers or market Researchers.

    Your information is stored only to serve you.

    Making our search algorithm better

    You’re about to go out for dinner and have to choose between two identical-looking restaurants on the same street. One is full, the other empty. You’ll probably choose the bustling restaurant, and when it comes to Google Search, we often use the same principle when selecting which results to give you. To bring you the most relevant results for each search query, we look at the usage patterns of millions of people using Google every day.

    It is by analyzing these search patterns via our logs data that our engineers are able to improve the search algorithms that determine the order in which our search results appear. If our engineers can see that people are consistently clicking on the top result for any given query, they know they are doing something right. If people are hitting “next page” or typing in another query, they know they’re not delivering the results that people are looking for, and can then take action to try and improve the search algorithms.

    Have you ever wondered what happens when you type your query into the Google search box and what data we store about that search?

    Let’s take a simple search like “cars.” When someone types the word “cars” into the Google search engine, the request gets sent from that user’s computer over the internet to our computers, which look for the right search results. Once our computers have found the results, they send these back to the user’s computer, all in a fraction of a second.

    We then store some data about this exchange: the search query (“cars”), the time and date it was typed, the IP address and cookie of the computer it was entered from, and its browser type and operating system. We refer to these records as our search logs, and most websites store records of visits to their site in a similar way.

    Here’s what a typical log entry at Google looks like:

    123.45.67.89 - 25/Aug/2011 10:15:32 - http://www.google.com/search?q=cars - Chrome 2.0.0.7; Windows NT 5.1 - 740674ce2123e969

    But what does this all mean?

    IP address:
    123.45.67.89 is the IP address assigned to the user’s computer by his or her service provider. Just like other websites, when you ask Google for a page (a search results page, for example), we use your computer’s IP address to ensure that we get the right results back to the right computer.It’s important to remember that IP addresses don’t say exactly where an individual user is, or who they are. In fact, some Internet Service Providers (ISPs) give users a different IP address every time they log onto the web. The most Google can tell about a user from his computer’s IP address is that user’s general location (for example, Boston) and possibly the ISP they use to connect to the Internet. Only the ISP (who actually controls the user’s account) can match an individual with an IP address.
    Time and date:
    25/Aug/2011 10:15:32 is the date and time the user typed the query into Google.
    Search query:
    http://www.google.com/search?q=cars is the search query, in this case “cars.”
    Browsers and operating systems:
    Chrome 2.0.0.7; Windows NT 5.1 is the browser and operating system being used.
    Cookie:
    740674ce2123a969 is the unique cookie ID assigned to a browser the first time a user visits Google. Like an IP address, a cookie doesn’t tell Google who a user actually is or where they live – it only identifies a computer. You can delete these cookies at any time in your computer’s browser.

    Time limits on data retention

    We anonymize IP addresses after 9 months and alter the cookie numbers in our logs permanently after 18 months. This breaks the link between the search query and the computer it was entered from and is similar to the way in which credit card receipts replace digits with hash marks to improve customer security.

    Here is what an IP address could look like in our logs after 9 months: 123.45.67.XXX. After 18 months, the cookie will be replaced by a newly-generated cookie number.

    Google was the first major search engine to announce time limits on the retention of logs data, and we’re pleased that others in the industry have followed our lead.

    Just like cookies in the offline world, online cookies don’t last forever. Google cookies expire after two years. Additionally, Google has always allowed people to use its services without cookies (though this may mean losing the use of some features or functions of particular products).

    Why we store search logs

    We use search logs for many purposes, for example, to keep our services secure, develop new features that make search faster and more relevant, and even to predict outbreaks of disease.Learn more

    It’s good to know what’s stored in a search log when you search on Google. Read the next topic: How ads are targeted by Google.

    https://www.google.com/goodtoknow/data-on-google/search-logs/

    Some of the things we learn from how people search can be useful for communities all over the world.

    Disease

    Imagine that somewhere in a remote place a man goes to Google and types in [fever]. Seconds later somebody nearby searches for [muscle ache]. And when more and more people from the same region start doing a similar search, it’s likely that something’s up.

    Sometimes general patterns of search behavior match up closely to things happening in the offline world. When those correlations are strong, it can be possible to use spikes in a particular search to understand real-world behavior more quickly than traditional methods can notice a change. Using the aggregated searches of millions of people, we can help spot flu outbreaks or changes in economic conditions, giving professionals more time—and better information—to make decisions.

    In 2008, we found that some search terms are good indicators of actual flu activity. It turns out that traditional flu surveillance systems take between one and two weeks to collect and release surveillance data. But Google search queries can be counted automatically very quickly. By making our flu estimates available each day, Google Flu Trends can provide an early-warning system for outbreaks of influenza. We have used the same insight to look at patterns of other diseases and have created an early warning system for dengue fever.

    It’s important to remember that Google Flu Trends can never be used to identify individual users because we rely on anonymized, aggregated counts of how often certain search queries occur each week. We rely on millions of search queries over time, and the patterns we observe in the data are only meaningful across large populations of Google search users.

    Economics

    By studying the way people search, we can also pick up on other important trends, like changes in the economic climate. For example, the Bank of England tracks search trends related to consumer behavior in the United Kingdom. By watching out for changes in demand for goods, mortgages and concerns about inflation, the Bank hopes to improve the speed of economic reporting and the responsiveness of fiscal decision making.

    Google Correlate

    Because we believe there are so many things that can be learned from aggregated search activities, we’ve introduced Google Correlate. This allows researchers to upload their own data series and see a list of search terms whose popularity best corresponds with real-world trends.

    It’s good to know how search data can enable us to help society. Read the next theme: How you can manage your data online

    https://www.google.com/goodtoknow/data-on-google/helping-society/

     

    If the above video is unavaiable her  please follow Link below.

    http://www.youtube.com/watch?v=KGghlPmebCY