Tag: World Wide Web

  • Deep Web,The Dark Side Of Internet Details

    Deep Web,The Dark Side Of Internet Details

    All of us know Internet.

    *Scroll down for Videos.

    The Deep Web Search browser.
    What is a Tor? How to preserve the anonymity?
    Tor is the acronym of “The onion router”, a system implemented to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers hiding user’s information eluding any activities of monitoring.
    As usually happen, the project was born in military sector, sponsored the US Naval Research Laboratory and from 2004 to 2005 it was supported by the Electronic Frontier Foundation.
    Actually the software is under development and maintenance of Tor Project. A user that navigate using Tor it’s difficult to trace ensuring his privacy because the data are encrypted multiple times passing through nodes, Tor relays, of the network.
    Connecting to the Tor network
    Imagine a typical scenario where Alice desire to be connected with Bob using the Tor network. Let’s see step by step how it is possible.
    She makes an unencrypted connection to a centralized directory server containing the addresses of Tor nodes. After receiving the address list from the directory server the Tor client software will connect to a random node (the entry node), through an encrypted connection. The entry node would make an encrypted connection to a random second node which would in turn do the same to connect to a random third Tor node. The process goes on until it involves a node (exit node) connected to the destination.
    Read more: http://thehackernews.com/2012/05/what-is-deep-web-first-trip-into-abyss.html#ixzz2ipKPzWY8
    Follow us: @TheHackersNews on Twitter | TheHackerNews on Facebook

    We are able to access them and the information is Indexed by Search Engines.

    We can access the information by relevant queries.

    This is a part of World Wide Web, www.

     

    There is another side to the world wide web where you can not normally access the information , but is still a part of the world wide web.

    This is called the Deepnet, the Invisible Web, the Undernet or the hidden Web.

    Then there is the dark Internet, the computers that can no longer be reached via Internet, or with a Darknet distributed filesharing network, which could be classified as a smaller part of the Deep Web.

    Mike Bergman, founder of BrightPlanet coined the phrase.

    He explained searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed.

    Most of the Web’s information is buried far down on dynamically generated sites, and standard search engines do not find it.

    Traditional search engines cannot “see” or retrieve content in the deep Web—those pages do not exist until they are created dynamically as the result of a specific search. As of 2001, the deep Web was several orders of magnitude larger than the surface Web.

    What the Deep Web is generally used for?

    1.For Drug Sales.

    2.For Hiring Contract Killers.

    3.Seeking Contract Killers.

    3.Sexual perversions.

    4.Drug Trafficking, Money Transfers.

    5.Child Trafficking.

    6.Human Trafficking.

    7.Mercenaries  recruitment and Advertisement.

    8,Also being used by some Intelligence Agencies for Dark Operations.

    Story:

    Hiring a hitman has never been easier. Nor has purchasing cocaine or heroin, nor even viewing horrific child pornography.

    Such purchases are now so easy, in fact, that they can all be done from the comfort of one’s home at the click of a button… and there’s almost nothing the police can do about it.

    This worrying development of the criminal black market is down entirely to the Deep Web – a seething matrix of encrypted websites – also known as Tor – that allows users to surf beneath the everyday internet with complete anonymity.

    And like The Silk Road, transactions are all made using the mysterious online currency Bitcoin. One site, whose name MailOnline has chosen not to publish, offers an assassination in the US or Canada for $10,000 and one in Europe for $12,000.

    ‘I do not know anything about you, you do not know anything about me,’ crows one self-styled assassin, according to The Daily Dot. ‘The desired victim will pass away. No one will ever know why or who did this. On top of that I always give my best to make it look like an accident or suicide.’

    Deepweb is buried in the Internet where prohibited activities take place.
    Ad in the Deep Web-Contract Killers.
    Mercenaries advertise in the Deep Web.
    DeepWeb advertisement by Mercenaries.

    THE DEEP WEB: WHAT IS TOR?

    Tor – short for The onion Router – is a seething matrix of encrypted websites that allows users to surf beneath the everyday internet with complete anonymity.

    It uses numerous layers of security and encryption to render users anonymous online.

    Normally, file sharing and internet browsing activity can be tracked by law enforcement through each user’s unique IP address that can be traced back to an individual computer.

    The Tor network on the Deep Web hides the IP address and the activity of the user.

    Most of the Web’s information is buried far down on dynamically generated sites, unable to be found or seen by traditional search engines – sites or pages don’t exist until created as the result of a specific search.

    An Internet search is like dragging a net across the surface of the sea – a great deal of information is caught, but a majority is deep and therefore missed.

    ‘I have gained endless experience(s) in this [sic] 7 years,’ he goes on. ‘It has changed me a lot. I don’t have any empathy for humans anymore.

    ‘This makes me the perfect professional for taking care of your problems and makes me better than other hitmen. If you pay enough I’ll do ANYTHING to the desired victim. If I say anything I mean anything.’

    Many of the sites even use slogans and marketing techniques that, if it weren’t for their macabre subject matter, could be as at home on the website of a legitimate retail website.

    ‘The best place to put your problems is in a grave,’ boasts one.

    Some even seem to offer others the chance to profit from their killing by allowing users to bet on when a victim will die by putting money in a pool. The closest guess takes home the pot.

    And while many appear every inch the cold-blooded killer one would expect from a gun-for-hire, there is also apparently the odd humanitarian hitman.

    ‘Killing is in most cases wrong, yes,’ writes one. ‘However, as this is an inevitable direction in the technological evolution, I would rather see it in the hands of me than somebody else.’

    ‘By providing it cheaply and accurately I hope that more immoral alternatives won’t be profitable or trusted enough. This should primarily be a tool for retribution.’

    Adding that murder should always be committed for ‘good reason’, he writes: ‘Bad reasons include doctors for performing abortions and Justin Bieber for making annoying music.

    How To Surf The Deepweb.

    You’ll need a browser named Tor. Open that up and get a new identity around every few minutes. The rest is up to you. I’d recommend checking out the Evil Wiki and learning about onion sites and seeing if you can find some links. That’s what I did the other night at least and found a bunch of weird shit. Like this one dude was selling “sex dolls” He cuts the legs and arms off children and abuses the shit out of them so they don’t feel pain. He pulls their teeth out so they can’t bite your you know what and so much more, so if that’s what interest you then go ahead, but honestly there isn’t really any reason to go to the “deep web”.

    Has The Deep-web Closed after busting of the Silk Road by the Deep Web?

    In an interesting post-mortem release by the creators of the defunct anonymous marketplaceAtlantis there is information that the former admins and users of the Silk Road are planning to resurrect the service. User RR writes: “We have SilkRoad v2.0 ready to launch and is now in its final testing stages. Our site has all the features of the original one and we have kept the same style of forum for your ease.”

    The new SilkRoad will be sending out anonymous invites to former vendors and then open to the Tor-using public soon after.

    The representatives of Atlantis write:

    From a quick scout around I’ve counted at least 5 publicly stated projects with the said aim of replacing becoming “Silk Road 2.0″ and many many more gathering info and building alliances.
    And this is what Law Enforcement is now parading as a victory? Over two years of investigation, millions of dollars spent and for what so a couple of armchair programmers can build it again in a few days while in the meantime vendors simply move to other site’s .

    Users are already planning ways to keep the new site secure. This includes the creation of something called BitWasp, an “open source, anonymous bitcoin marketplace specifically built for use in conjunction with Tor or I2P via the hidden services such as .onion websites and eepsites.”

    Sources:

    http://techcrunch.com/2013/10/04/deep-web-users-are-ready-to-launch-silk-road-2-0/

    http://www.reddit.com/r/deepweb/comments/1o7uaf/new_to_the_deepweb/

    http://www.dailymail.co.uk/news/article-2454735/The-disturbing-world-Deep-Web-contract-killers-drug-dealers-ply-trade-internet.html

    http://en.wikipedia.org/wiki/Deep_Web

    Image credit.http://unpromisedone.blogspot.in/2011/09/information-about-deep-web.html

    the above url has no API key

  • Anniversary of the First Image Uploaded on the Internet,To Day

     

    To day ,18,July 2012 , is the Twentieth Anniversary of the First Image uploaded on the Internet.

    This is the Image.

    First Imag on the net
    Les Horribles Cernettes,The First Image uploaded on the Internet

     

    “Every day millions of photos are uploaded to the Internet on countless blogs, Facebook, Flickr, Twitter, etc. But have you ever wondered what the very first image upload looked like? Well look no further, because the tech site Motherboard has done the digging for you.

    In 1992, a picture of the parody band Les Horribles Cernettes, that was digitally altered in Photoshop, earned the distinction of becoming the first Web photo upload.So who are these ladies pictured in the image? The group of ladies were lab employees who worked for CERN, a research laboratory in Geneva where major discoveries have been made, including the project that started the World Wide Web, created by British computer scientist Tim Berners-Lee.

    Berners-Lee was looking to test a Web system that could support photos and asked IT developer Silvano de Gennaro to provide an image. De Gennaro chose an edited image of the ladies of Les Horribles Cernettes, whose nerdy song lyrics included the words “you say you love me but you never beep me.” Part of the reason the upload was so revolutionary was because the Internet was previously seen as a place for conducting serious business, not having fun.

    De Gennaro, who snapped the picture of the ladies for their next CD cover, never could have imagined the place it would have in history. “I didn’t know what the Web was,” he said later. “When history happens, you don’t know that you’re in it.”

    July 18 marks the photo upload’s 20th anniversary.”

    http://news.yahoo.com/blogs/trending-now/first-image-ever-uploaded-internet-170705499.html

     

  • SOPA-Senseless.Web page under SOPA and Text of the Bill..

    World wide web
    Image via Wikipedia

    Stop On-line Piracy Act is , to say the least is idiotic ,impractical and seems to have been designed at the behest of Corporations to safeguard their interests.

    SOPA is impractical as it is not possible to differentiate between original content and the pirated one, short of blocking the sites.

    Blocking of sites on the basis of perceived copy right issues is difficult as even Quotes from the original will be closed down.

    Those who really infringe copy right act will continue to go about under the guise of ‘quoting’

    It is all a question of interpretation.

    Being impractical ,it becomes idiotic.

    Do Shakespeare,History Books ,Text Books,Literature,Science papers of general importance,even for that matter News…qualify to be called Copy Righted?

    While the Corporations manoeuvre  to have the bill passed, what is at stake is the individual Freedom of Expression.

    Wiki leaks,Wikipedia,Wired.com,Reddit, Firefox are among others of the internet community to take the fight to the Capitol Hill.

    Time that this non sense is put an end to protect freedom of Expression,fie the greedy corporations,whose perceived losses on account of Online piracy is a pittance compared with the astronomical profits they have.

    Care must be excised to avoid piracy as it amounts to eating what one has spit out.”

    See the Link as to how the web will look like  if the SPOA comes into force.

    I suggest, instead of  closing sites to show our disapproval,we write more, say 5 pieces per Blogger on SOPA, to register out protest, signifying that Word can not be suppressed.

    http://thehackernews.com/2012/01/indian-bjp-politicians-bank-accounts.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Daily+Cyber+News+Updates%29

    When the powerful world of old media mobilized to win passage of an online antipiracy bill, it marshaled the reliable giants of K Street — the United States Chamber of Commerce, the Recording Industry Association of America and, of course, the motion picture lobby, with its new chairman, former SenatorChristopher J. Dodd, the Connecticut Democrat and an insider’s insider.

    Yet on Wednesday this formidable old guard was forced to make way for the new as Web powerhouses backed by Internet activists rallied opposition to the legislation through Internet blackouts and cascading criticism, sending an unmistakable message to lawmakers grappling with new media issues: Don’t mess with the Internet.

    As a result, the legislative battle over two once-obscure bills to combat the piracy of American movies, music, books and writing on the World Wide Web may prove to be a turning point for the way business is done in Washington. It represented a moment when the new economy rose up against the old.

    “I think it is an important moment in the Capitol,” said Representative Zoe Lofgren, Democrat of California and an important opponent of the legislation. “Too often, legislation is about competing business interests. This is way beyond that. This is individual citizens rising up.”

    It appeared by Wednesday evening that Congress would follow Bank of America, Netflix and Verizon as the latest institution to change course in the face of a netizen revolt.

    Legislation that just weeks ago had overwhelming bipartisan support and had provoked little scrutiny generated a grass-roots coalition on the left and the right. Wikipedia made its English-language content unavailable, replaced with a warning: “Right now, the U.S. Congress is considering legislation that could fatally damage the free and open Internet.” Visitors to Reddit found the site offline in protest. Google’s home page was scarred by a black swatch that covered the search engine’s label.

    http://www.nytimes.com/2012/01/19/technology/web-protests-piracy-bill-and-2-key-senators-change-course.html?_r=1&nl=todaysheadlines&emc=tha2

    SOPA Text.

    H.R.3261

    Stop Online Piracy Act (Introduced in House – IH)


    SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

      (a) Short Title- This Act may be cited as the `Stop Online Piracy Act’.
      (b) Table of Contents- The table of contents of this Act is as follows:
      Sec. 1. Short title; table of contents.
      Sec. 2. Savings and severability clauses.

    TITLE I–COMBATING ONLINE PIRACY

      Sec. 101. Definitions.
      Sec. 102. Action by Attorney General to protect U.S. customers and prevent U.S. support of foreign infringing sites.
      Sec. 103. Market-based system to protect U.S. customers and prevent U.S. funding of sites dedicated to theft of U.S. property.
      Sec. 104. Immunity for taking voluntary action against sites dedicated to theft of U.S. property.
      Sec. 105. Immunity for taking voluntary action against sites that endanger public health.
      Sec. 106. Guidelines and study.
      Sec. 107. Denying U.S. capital to notorious foreign infringers.

    TITLE II–ADDITIONAL ENHANCEMENTS TO COMBAT INTELLECTUAL PROPERTY THEFT

      Sec. 201. Streaming of copyrighted works in violation of criminal law.
      Sec. 202. Trafficking in inherently dangerous goods or services.
      Sec. 203. Protecting U.S. businesses from foreign and economic espionage.
      Sec. 204. Amendments to sentencing guidelines.
      Sec. 205. Defending intellectual property rights abroad.

    SEC. 2. SAVINGS AND SEVERABILITY CLAUSES.

      (a) Savings Clauses-
      (1) FIRST AMENDMENT- Nothing in this Act shall be construed to impose a prior restraint on free speech or the press protected under the 1st Amendment to the Constitution.
      (2) TITLE 17 LIABILITY- Nothing in title I shall be construed to enlarge or diminish liability, including vicarious or contributory liability, for any cause of action available under title 17, United States Code, including any limitations on liability under such title.
      (b) Severability- If any provision of this Act, or the application of the provision to any person or circumstance, is held to be unconstitutional, the other provisions or the application of the provision to other persons or circumstances shall not be affected thereby.

    TITLE I–COMBATING ONLINE PIRACY

    SEC. 101. DEFINITIONS.

      In this title:
      (1) DOMAIN NAME- The term `domain name’ has the meaning given that term in section 45 of the Lanham Act (15 U.S.C. 1127) and includes any subdomain designation using such domain name as part of an electronic address on the Internet to identify a unique online location.
      (2) DOMAIN NAME SYSTEM SERVER- The term `domain name system server’ means a server or other mechanism used to provide the Internet protocol address associated with a domain name.
      (3) DOMESTIC DOMAIN NAME- The term `domestic domain name’ means a domain name that is registered or assigned by a domain name registrar, domain name registry, or other domain name registration authority, that is located within a judicial district of the United States.
      (4) DOMESTIC INTERNET PROTOCOL ADDRESS- The term `domestic Internet Protocol address’ means an Internet Protocol address for which the corresponding Internet Protocol allocation entity is located within a judicial district of the United States.
      (5) DOMESTIC INTERNET SITE- The term `domestic Internet site’ means an Internet site for which the corresponding domain name or, if there is no domain name, the corresponding Internet Protocol address, is a domestic domain name or domestic Internet Protocol address.
      (6) FOREIGN DOMAIN NAME- The term `foreign domain name’ means a domain name that is not a domestic domain name.
      (7) FOREIGN INTERNET PROTOCOL ADDRESS- The term `foreign Internet Protocol address’ means an Internet Protocol address that is not a domestic Internet protocol address.
      (8) FOREIGN INTERNET SITE- The term `foreign Internet site’ means an Internet site that is not a domestic Internet site.
      (9) INCLUDING- The term `including’ means including, but not limited to.
      (10) INTELLECTUAL PROPERTY ENFORCEMENT COORDINATOR- The term `Intellectual Property Enforcement Coordinator’ means the Intellectual Property Enforcement Coordinator appointed under section 301 of the Prioritizing Resources and Organization for Intellectual Property Act of 2008 (15 U.S.C. 8111).
      (11) INTERNET- The term `Internet’ has the meaning given that term in section 5362(5) of title 31, United States Code.
      (12) INTERNET ADVERTISING SERVICE- The term `Internet advertising service’ means a service that for compensation sells, purchases, brokers, serves, inserts, verifies, clears, or otherwise facilitates the placement of an advertisement, including a paid or sponsored search result, link, or placement, that is rendered in viewable form for any period of time on an Internet site.
      (13) INTERNET PROTOCOL- The term `Internet Protocol’ means a protocol used for communicating data across a packet-switched internetwork using the Transmission Control Protocol/Internet Protocol, and includes any predecessor or successor protocol to such protocol.
      (14) INTERNET PROTOCOL ADDRESS- The term `Internet Protocol address’ means a numerical label that is assigned to each device that participates in a computer network that uses the Internet Protocol for communication.
      (15) INTERNET PROTOCOL ALLOCATION ENTITY- The term `Internet Protocol allocation entity’ means, with respect to a particular Internet Protocol address, the entity, local internet registry, or regional internet registry to which the smallest applicable block of Internet Protocol addresses containing that address is allocated or assigned by a local internet registry, regional internet registry, or other Internet Protocol address allocation authority, according to the applicable publicly available database of allocations and assignments, if any.
      (16) INTERNET SEARCH ENGINE- The term `Internet search engine’ means a service made available via the Internet that searches, crawls, categorizes, or indexes information or Web sites available elsewhere on the Internet and on the basis of a user query or selection that consists of terms, concepts, categories, questions, or other data returns to the user a means, such as a hyperlinked list of Uniform Resource Locators, of locating, viewing, or downloading such information or data available on the Internet relating to such query or selection.
      (17) INTERNET SITE- The term `Internet site’ means the collection of digital assets, including links, indexes, or pointers to digital assets, accessible through the Internet that are addressed relative to a common domain name or, if there is no domain name, a common Internet Protocol address.
      (18) LANHAM ACT- The term `Lanham Act’ means the Act entitled `An Act to provide for the registration and protection of trademarks used in commerce, to carry out the provisions of certain international conventions, and for other purposes’, approved July 5, 1946 (commonly referred to as the `Trademark Act of 1946′ or the `Lanham Act’).
      (19) NONAUTHORITATIVE DOMAIN NAME SERVER- The term `nonauthoritative domain name server’ means a server that does not contain complete copies of domains but uses a cache file that is comprised of previous domain name server lookups, for which the server has received an authoritative response in the past.
      (20) OWNER; OPERATOR- The terms `owner’ or `operator’, when used in connection with an Internet site, includes, respectively, any owner of a majority interest in, or any person with authority to operate, such Internet site.
      (21) PAYMENT NETWORK PROVIDER-
      (A) IN GENERAL- The term `payment network provider’ means an entity that directly or indirectly provides the proprietary services, infrastructure, and software to effect or facilitate a debit, credit, or other payment transaction.
      (B) RULE OF CONSTRUCTION- For purposes of this paragraph, a depository institution (as such term is defined under section 3 of the Federal Deposit Insurance Act) or credit union that initiates a payment transaction shall not be construed to be a payment network provider based solely on the offering or provision of such service.
      (22) SERVICE PROVIDER- The term `service provider’ means a service provider as defined in section 512(k)(1) of title 17, United States Code, that operates a nonauthoritative domain name system server.
      (23) U.S.-DIRECTED SITE- The term `U.S.-directed site’ means an Internet site or portion thereof that is used to conduct business directed to residents of the United States, or that otherwise demonstrates the existence of minimum contacts sufficient for the exercise of personal jurisdiction over the owner or operator of the Internet site consistent with the Constitution of the United States, based on relevant evidence that may include whether–
      (A) the Internet site is used to provide goods or services to users located in the United States;
      (B) there is evidence that the Internet site or portion thereof is intended to offer or provide–
      (i) such goods and services,
      (ii) access to such goods and services, or
      (iii) delivery of such goods and services,
      to users located in the United States;
      (C) the Internet site or portion thereof does not contain reasonable measures to prevent such goods and services from being obtained in or delivered to the United States; and
      (D) any prices for goods and services are indicated or billed in the currency of the United States.
      (24) UNITED STATES- The term `United States’ includes any commonwealth, possession, or territory of the United States

    http://thomas.loc.gov/cgi-bin/query/F?c112:1:./temp/~c112s5p8Nc:e1014:

  • Top Ten Myths about Technology.

    You must wait 15 seconds before rebooting your computer
    “I’d say 5 seconds is [OK],” Matos said, “but 15 seconds to be on the safe side. If you want peace of mind, then 15 seconds is OK, but it’s not a rule that’s set in stone.”

    Size matters (in megapixels)

    As photographer and self-described photography expert Ken Rockwell puts it, “sharpness depends more on your photographic skill than the number of megapixels, because most people’s sloppy technique or subject motion blurs the image more than the width of a microscopic pixel.


    You have to run your nickel-cadmium battery all the way down before you charge it

    Matos said that, ideally, we’d all run our batteries down all the way every time, but he acknowledged that’s not realistic for most people. So he nods to reality: “It’s recommended, so whenever possible…just let the battery drain completely before you charge it up.”

    Anything stored digitally will last longer than that on analog media

    And the same seems to be true of online recordings. “I think we’re assuming that if it’s on the Web, it’s going to be there forever,” Sam Brylawski, the co-author of a Library of Congress study on sound, told the AP. “That’s one of the biggest challenges.

    One part of the dilemma surrounding digital storage of audio and other important records, is that we’ve become trained to use such media given its ubiquity and its ease of use. “But the problem,” Brylawski told the AP, “is they must be constantly maintained and backed up by audio experts as technology changes. That requires active preservation, rather than simply placing files on a shelf.”

    Turning a computer on and off regularly is bad for it
    As well, he said, it’s recommended that if you’re going to be away from your computer for small periods of time, you let it go to sleep while you’re gone. But in any case, he said, a regular on/off pattern is definitely good for the computer, not bad.
    Macs are immune to viruses.

    This myth is one that is pushed relentlessly, both overtly and subtly, by Mac fans, and, of course, by Apple. Everyone knows that Windows machines are constantly being bombarded by malware and that keeping them secure is a never-ending task.

    But you rarely hear about such things from Mac users, and the common theory is that it’s because Apple’s computers are simply safe from being attacked.

    Your ISP is tracking everything you do

    Your ISP “is your local link to the worldwide computer network known as the Internet,” Dave Roos wrote on Get Stuff. Every page request you make and every e-mail you send must travel through your ISP’s routers first. It would seem, therefore, that your ISP has the power to scan and save every piece of data that flows through its system.”

    But before you get alarmed, Roos also wrote: “The truth is that it does have the power. Fortunately for us, it doesn’t have the money or the desire to archive every bit of information that comes its way. ISPs in the United States don’t routinely save the Web surfing histories and e-mail conversations of their users. It would simply be too expensive to save all of that data and the public outcry from privacy rights and civil liberties organizations would be deafening.”

    Girls don’t play video games

    Indeed, women and girls make up a very large bloc of gamers–they just are a little more quiet about it.

    “Girls and young women are a ‘pot of gold’ for the [video game] industry,” George VanHorn, a senior analyst at market research firm IBISWorldtold Reuters. “The gaming industry has market characteristics that many would die for.”

    Anything you delete from your hard drive is gone forever

    Given that we lay our lives bare on our computers–what with doing personal banking, storing family photos, researching our medical conditions, and so forth–it would be comforting to be able to believe that if we erase something on our computers, we don’t have to worry about that data being available to anyone who might want to access it later.

    Sadly, that would be a naive assumption. The truth is, it’s very difficult to permanently get rid of your data. And if you want to do so, you probably need to go get a drill.http://news.cnet.com/8301-13772_3-20026047-52.html#ixzz19qUL0Fem

    Related:

    Released this week, Zogby’s study found that 28 percent of those polled tagged broadband Internet as the one technology they can’t live without; e-mail came in second at 18 percent. Facebook was lower on the overall list at only 3 percent, but among the younger crowd (18-24), 15 percent said they can’t live without Facebook.
    http://news.cnet.com/8301-1023_3-20026405-93.html#ixzz19qVKp8hG