The Dark Web And How To Access It

Contents

  • What’s the dark web
  • How to access the dark web
  • Installation of TOR browser – Windows and Kali
  • Finding onion websites

Dark Web

What is the dark web

In short, dark web is part of the web which requires special software to browse, and isn’t indexed by search engines. (More technical content is enclosed in <extra> tags ahead, and colored purple. Scroll through it if you just want to browse the dark web right away.)

Originally, the internet used telephone network for communication. My first internet connection was a “dial-up” connection which used the telephone network at my house to connect to my ISP. This is what an overlay network is, and in that case, internet was an overlay over the telephone network. Now, the reverse phenomenon can be seen, with people using the internet for voice calls (Voice over IP to be precise), and the telephone network is turning into an overlay over the internet.

How does knowing what an overlay network is help us? Well, to understand the dark web, we need to understand what the dark net is first.

The dark net is the opposite of clear-net. Clear-net is simply parts of the internet which are index-able by search engines. This means that search engine crawlers can read up the pages, understand what the content is, and return those pages when relevant search queries are made to the search engine. On the other hand, dark net can’t be indexed, and usually uses uncommon communication protocols, encryption, etc. to achieve that result. Here’s where overlay networks get relevant, all of dark net is an overlay network over the internet. Hence, while the Darknet and clear-net reside on the internet, Darknet still manages to be structurally different from the rest of the internet.

From the darknet, we move to the dark web, which is a subset of the dark net. While dark net consists of all sorts of stuff, from www pages to file transfer service and peer to peer connections, dark web only includes the world wide web pages of the dark net (Hence the change from the more encompassing term net in darknet to web in dark web).

What does it contain

  1. Child pornography and illegal drug markets – These are the two things which the dark web is most infamous for, and if you’ve heard about the dark web, it’s quite likely it in reference to either (or both) of these.
  2. Bitcoin services – Bitcoin is a Cryptocurrency, and considering the nature of activities that go on in the dark web, and the need for anonymity, it’s the most common form of payment for any service that you seek on the dark-web.
  3. Hackers for hire
  4. Carding forums
  5. Plenty of scam sites, phishing sites, etc.
  6. Terrorism
  7. Social media
  8. File sharing

However, the dark web, in general, consists mostly of file sharing, as shown by many studies. While the first few pointers in the list stand out in the crowd, they are not what the dark web is all about. PS: I make no guarantee about the accuracy of these stats.

Dark web statistics

Note : Using TOR is not illegal (in most countries) , but many of the things on the dark web are illegal. Despite the strongly encrypted communications and high level of anonymity, I’d like to suggest that you don’t access any illegal content of the site. This article is only meant to educate you about the presence of the dark web, as not knowing about it doesn’t mean it’ll cease to exist, and as someone interested in the field of computer security/hacking, you must know about the dark web.

How to Access the dark web

There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a url with .onion TLD (top level domain), which looks similar to the way the clear-net websites have .com, .org, .net, etc. TLD. Once you have TOR and find out the .onion address of a deep web site (hidden web site), you can simply enter it in the URL bar on TOR browser, and it’ll open, just as normal websites open in usual browsers.

If you read the previous boring section, you’d see that I mentioned how the darknet often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won’t go in much depth, but first look at a .onion URL suggests that it’s similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet’s DNS root, and hence, normal DNS servers can’t resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it’s own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can’t browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages. In other words, the server doesn’t know who the client is, and the client doesn’t know anything about where the server is.)

Install TOR

All required instructions can be found here, and I suggest you skip this section of the guide and use the  official page

(which has very very detailed instructions if you scroll down on that page)

Windows

Simply go to TOR Browser Download

page, and download and run the executable provided. No further instructions are needed as far as installation goes, since it’s quite similar to how you’d install regular software on windows.

Linux

Go to TOR Browser Download

page, and download the .tar.xz archive (according to your architecture, 64bit or 32bit). There is no installation procedure. Simply extract the archive (using GUI or using tar on terminal).

Just extract the archive and you’re good to go

Common for both Windows and Linux

Finding onion websites

Now that you have what looks like Mozilla Firefox running in front of you. You can simply enter normal URLs and enjoy surfing the web with privacy. However, we are here to browse the dark web, and we have no idea what to enter in the URL bar.

The solution is simple, just head over to the hidden wiki (clearnet link), and you’ll have a list of websites you can go to. Better yet, go to the dark web hidden wiki (link opens only on TOR), with an indexing of dark web websites. You are now surfing the dark web. This is the furthest I’m taking you, and from here on, you can go wherever you want. You can simply click URLs on the hidden wiki like you’d do on a regular browser, and the website would open. Regardless of what happens behind the scenes, the user experience from here on is what it’s like in the clear web (albeit a lot slower).

As far as finding websites is concerned, you are left with indexes of websites, such as the hidden wiki, and some search engines, which are nowhere as good as the clearnet search engines, which is, by design, the intention of the dark web.

The hidden wiki, link provided above
Torch search engine, the hidden wiki has a link to it, which can be opened directly on TOR

Conclusion

Go around, explore the place, don’t go anywhere illegal, don’t do anything illegal. Also, beware of scams, and don’t leave your personal information anywhere. Take a look at instructions on

how to be safe when using tor,  follow them properly, and you won’t face any troubles.

Source

Shadow Icons Looks Great With All Themes, Install in Ubuntu/Linux Mint – NoobsLab

Shadow icon theme is a new comer for Linux desktop, it looks beautiful with all kind of themes. It is meant to be modern clean and customizable, the primary color of this set most likely bluish and many apps icons are in round shape. So basically this theme is mixture of round and normal (square) shape icons, lets see where this theme will head in the future, it should choose shape what users asks. As creator mentioned this icon theme is his first so please bare any bugs or missing icons. You can report bugs or suggest new icons to include in this set via this link.

You can use Unity Tweak ToolGnome-tweak-tool

to change themes/icons.

shadow icons shadow icons
shadow icons shadow icons

Available for Ubuntu 18.04 Bionic/18.10/16.04 Xenial/14.04 Trusty/Linux Mint 19/18/17/other Ubuntu derivatives
To install Shadow Icons in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the terminal:
Note: The Places and mimetypes icons are round by default, if you want to replace them with Square Places and Mimetypes then run following commands:

If you want to revert back to Round Places then run following commands:

That’s it

Source

Creator of the World Wide Web is Creating a New Decentralized Web

Creator of the world wide web, Tim Berners-Lee has unveiled his plans to create a new decentralized web where the data will be controlled by the users.

Tim Berners-Lee is known for creating the world wide web, i.e., the internet you know today. More than two decades later, Tim is working to free the internet from the clutches of corporate giants and give the power back to the people via a decentralized web.

Berners-Lee was unhappy with the way ‘powerful forces’ of the internet handle data of the users for their own agenda. So he started working on his own open source project Solid “to restore the power and agency of individuals on the web.”

Solid changes the current model where users have to hand over personal data to digital giants in exchange for perceived value. As we’ve all discovered, this hasn’t been in our best interests. Solid is how we evolve the web in order to restore balance — by giving every one of us complete control over data, personal or not, in a revolutionary way.

Tim Berners-Lee is creating a decentralized web with open source project Solid

Basically, Solid is a platform built using the existing web where you create own ‘pods’ (personal data store). You decide where this pod will be hosted, who will access which data element and how the data will be shared through this pod.

Berners-Lee believes that Solid “will empower individuals, developers and businesses with entirely new ways to conceive, build and find innovative, trusted and beneficial applications and services.”

Developers need to integrate Solid into their apps and sites. Solid is still in the early stages so there are no apps for now but the project website claims that “the first wave of Solid apps are being created now.”

Berners-Lee has created a startup called Inrupt and has taken a sabbatical from MIT to work full-time on Solid and to take it “from the vision of a few to the reality of many.”

If you are interested in Solid, learn how to create apps or contribute to the project in your own way. Of course, it will take a lot of effort to build and drive the broad adoption of Solid so every bit of contribution will count to the success of a decentralized web.

Do you think a decentralized web will be a reality? What do you think of decentralized web in general and project Solid in particular?

About Abhishek Prakash

I am a professional software developer, and founder of It’s FOSS. I am an avid Linux lover and Open Source enthusiast. I use Ubuntu and believe in sharing knowledge. Apart from Linux, I love classic detective mysteries. I’m a huge fan of Agatha Christie’s work.

Source

Download KDE Frameworks Linux 5.51.0

KDE Frameworks is an open source and free software project distributed as part of the KDE desktop environment and designed to provide developers with a collection of tools and libraries for developing powerful applications for the KDE Plasma graphical environment, built using the Qt5 framework.

Includes the code base of almost all KDE apps

The software includes the code base of almost all KDE applications, with well-defined abilities and dependencies, providing high-level functionality like menus and toolbars, file access and spell checking. The great thing about it is that all the tools and libraries are available as separate downloads.

Introducing the Qt Addons

The libraries comprised in this the KDE Frameworks project are distributed as independent and cross-platform modules, called Qt Addons. They’re available to Qt and KDE developers alike, as well as to all who want to accelerate, simplify and reduce the cost of Qt development on any platform.

Building KDE Frameworks

KDE Framework has been successfully tested on a wide range of GNU/Linux distributions, including Debian, Ubuntu, Arch Linux, Fedora and openSUSE. To build it, you will need to install the Qt5 framework, as well as various other essential libraries and tools that are listed on the project’s homepage at https://community.kde.org/Frameworks/Building.

Under the hood

Most of the tools and libraries included in the KDE Frameworks project are written in the C++ programming language. You will need to have a recent GCC compiler, Git and the latest kdesrc-build package. Detailed installation instructions can be found by accessing the above link. It should also work on other GNU/Linux operating systems if all the dependencies are installed.

KDE library KDE framework KDE development KDE Framework Frameworks Development

Source

Visit SUSE @ SAP TechEd Barcelona 2018

Save the date for the following presentations:

Deployment Options for the Digital Core from SAP (lecture session): The digital core from SAP covers the crown jewels of your company’s data. But what are the available deployment options?
Wednesday, October 24 | 15:45 | Session ID: OPP203

Practical Architecture for SAP Data Hub on Premise (lecture session): Teams from Lenovo, SUSE, and SAP worked on a unified architectural vision and joint engineering effort to create a reference architecture for the SAP Data Hub solution. Learn about this integrated solution built on selected, proven-to-work components. A flexible building-block approach helps ensure high scalability, from proof of concept to large production implementations. Best practices from SAP, SUSE, and Lenovo are built into the solution for high availability, flexibility, and performance.
Tuesday, October 23 | 17:15 | Session ID: DAT224

Shattering SAP HANA limits with IBM Power Systems (lecture session): This session will highlight the latest best-practices from SAP HANA customers that have achieved unprecedented levels of performane using TDI 5.0 and IBM Power Systems. We will also cover latest IBM POWER9 technology that help clients deploy SAP HANA in a flexible, resilient and scalable infrastructure.
Tuesday, October 23rd | 11:00 | Session ID: EXP215

You will also find us there:

The Latest & Greatest in Open Source – SUSE Solutions for SAP Infrastructure
Wednesday, October 24 | 16:00 | HPE Booth #27

Building resilient SAP landscapes with SUSE on Microsoft Azure

Tuesday, October 23 |18:00 | Microsoft booth #28Thursday, October 25|16:30

Activities on SUSE booth

Protera answers your questions about your SAP migration
Tuesday, October 23 | 14:30

And there are prizes to win

You’ll also be able to play the TUX RACER Game for a chance to win daily prizes!

 

Share with friends and colleagues on social media

Source

New Video Applications Will Represent Majority of Edge Traffic by 2020, Survey Finds

In an effort to identify early edge applications, we recently partnered with IHS Markit to interview edge thought leaders representing major telcos, manufacturers, MSOs, equipment vendors, and chip vendors that hail from open source, startups, and large corporations from all over the globe. The survey revealed that edge application deployments are still young but they will require new innovation and investment requiring open source.

The research investigated not only which applications will run on the edge, but also deployment timing, revenue potential and existing and expected barriers and difficulties of deployment. Presented onsite at ONS Europe by IHS Markit analyst Michael Howard, the results represent an early look at where organizations are headed in their edge application journeys.

Key findings which were presented onstage at ONS Europe by IHS analyst Michael Howard, indicate:

Video and other big-bandwidth applications and connected things that move drive top services, expected revenue.

92 percent of respondents cite video (which includes 360 video and venue) as the top edge application, with even more deployments planned long-term; and video is expected to represent 82 percent of edge traffic by 2020. Autonomous vehicles, Augmented Reality/Virtual Reality (AR/VR), Industrial Internet of Things (IIOT) and Gaming follow video as top services driving edge applications.

Deployment timelines for Edge applications depend on cost and technology advancement.

Not surprisingly, early edge deployments will come as extensions to existing technology, such as IIOT, IOT, surveillance, gaming and smart cities. Longer-term deployments, however, will require additional technological innovation, inventions and/or widespread investments as even a single edge compute location is complex. To meet these requirements, ecosystems will need to collaboratively leverage open source and open standards among business partners to address many of these concerns.

Top barriers to edge application deployments include costs and technology

Given the current interest in edge, it’s not a surprise that many apps go into early deployment; however, most of these early deployments experience only limited or contained rollout. To get to full employment will take years and much investment in many areas including development of new software, and how to manage, monitor, operate and controls from hundreds to tens of thousands of edge locations.

In sum, the IHS research shows that while edge applications are top of mind among networking providers across sectors and there are already many edge applications in limited or contained deployments there is still much technological progress to be made before full deployments are seen. Still, interest is high and many organizations will be looking to initially justify deployments by cost savings, with plans for more revenue-generating applications taking the lead once edge compute is deployed. Technical advancements and organizational complexities need to be solved before edge applications can be deployed, with open source and open standards expected to play a strong role in collaborative efforts to accelerate deployments at the edge.

We look forward to participating in industry efforts to accelerate edge application development and deployments over time, helping to shape tomorrow’s networks and the way we consume information. Additional details on this research study, via Michael Howard’s slide presentation, will be available in the coming weeks.

Source

Debian Linux 9.4 released and here is how to upgrade it

The Debian GNU/Linux project has released an updated version of its stable Linux distribution Debian 9 (“stretch”). You must upgrade to get corrections for security problem as this version made a few adjustments for the severe issue found in Debian version 9.3. Debian is a Unix-like (Linux distro) operating system and a distribution of Free Software. It is mainly maintained and updated through the work of many users who volunteer their time and effort. The Debian Project was first announced in 1993 by Ian Murdock.

More about Debian Linux 9.4 released

From the release note:

Please note that the point release does not constitute a new version of Debian 9 but only updates some of the packages included. There is no need to throw away old stretch media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won’t have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by pointing the package management system at one of Debian’s many HTTP mirrors.

How to upgrade Debian 9 from version 9.3 to 9.4

The procedure is as follows. First, note down the current version:

$ lsb_release -a
$ uname -mrs Sample outputs:

No LSB modules are available.
Distributor ID: Debian
Description: Debian GNU/Linux 9.3 (stretch)
Release: 9.3
Codename: stretch

Upgrade the system

Type the following apt-get command/apt command to upgrade your system:

$ sudo apt-get update
$ sudo apt-get dist-upgradeDebian Linux 9.4 released

Finally reboot the Linux system:
$ sudo reboot

Verification

Verify that upgrade went smoothly:

$ uname -mrs
$ lsb_release -a
$ dmesg | egrep -i ‘err|warn|critical’
$ sudo tail -f /var/log/myappDebian version 9.4 running on my laptop

The installer has been updated to include the fixes incorporated into stable by the point release. You can download updated ISO for full installation too. This stable update added important package corrections and security enhancements to the system. Happy upgrades!

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

Source

Linux System Logs and the Syslog Standard

Most Popular

Recent Linux Articles

Topics

Arch Linux
careers
CentOS
cheat sheet
Cloud
Command Line
Debian
Desktop
Fedora
File System
FTP
Gentoo
Installation
jobs
Linux
Linux Mint
Mageia
MySQL
Nginx
OpenSuse
Programming
Python
RedHat
SCP
Server
Shell Scripting
Slackware
SSH
text editor
Ubuntu
Vagrant
Video
vim
VirtualBox
Web Hosting
Windows

Linux Cheat Sheet Download

Enter your email address below to download this Linux command line cheat sheet in an easy-to-read and ready-to-print format.

Source

LMDE 3 “Cindy” Cinnamon released! – The Linux Mint Blog

The team is proud to announce the release of LMDE 3 “Cindy” Cinnamon Edition.

LMDE 3 Cindy

LMDE is a Linux Mint project and it stands for “Linux Mint Debian Edition”. Its main goal is for the Linux Mint team to see how viable our distribution would be and how much work would be necessary if Ubuntu was ever to disappear. LMDE aims to be as similar as possible to Linux Mint, but without using Ubuntu. The package base is provided by Debian instead.

There are no point releases in LMDE. Other than bug fixes and security fixes Debian base packages stay the same, but Mint and desktop components are updated continuously. When ready, newly developed features get directly into LMDE, whereas they are staged for inclusion on the next upcoming Linux Mint point release.

Important info:

The release notes provide important information about known issues, as well as explanations, workarounds and solutions.

To read the release notes, please visit:

Release Notes for LMDE 3

System requirements:

  • 1GB RAM (2GB recommended for a comfortable usage).
  • 15GB of disk space (20GB recommended).
  • 1024×768 resolution (on lower resolutions, press ALT to drag windows with the mouse if they don’t fit in the screen).

Notes:

  • The 64-bit ISO can boot with BIOS or UEFI.
  • The 32-bit ISO can only boot with BIOS.
  • The 64-bit ISO is recommended for all modern computers (Almost all computers sold since 2007 are equipped with 64-bit processors).

Upgrade instructions:

Announcements will be made shortly with instructions on how to upgrade from LMDE 2.

If you are running the BETA, perform a system snapshot and use the Update Manager to apply available updates.

Download links:

Here are the download links for the 64-bit ISO:

A 32-bit ISO image is also available at https://www.linuxmint.com/download_all.php.

Integrity and authenticity checks:

Once you have downloaded an image, please verify its integrity and authenticity.

Anyone can produce fake ISO images, it is your responsibility to check you are downloading the official ones.

Enjoy!

We look forward to receiving your feedback. Thank you for using Linux Mint and have a lot of fun with this new release!

Post navigation

Source

How to Disable Root SSH Login on Linux ?

One of the biggest security holes you could open on your server is to allow directly

logging in as root through ssh, because any cracker can attempt to brute force

your root password and potentially get access to your system if they can figure out your password.

It’s much better to have a separate account that you regularly use and simply

sudo to root when necessary. Before we begin, you should make sure that

you have a regular user account and that you can su or sudo to root from it.

To fix this problem, we’ll need to edit the sshd_config file, which is the main configuration

file for the sshd service. The location will sometimes be different, but it’s usually in /etc/ssh/.

Open the file up while logged on as root.

$ vi /etc/ssh/sshd_config

Find this section in the file, containing the line with “PermitRootLogin” in it.

#LoginGraceTime 5m
#PermitRootLogin no
#StrictModes yes
#MaxAuthTries 6

Make the line look like this to disable logging in through ssh as root. Uncomment that line

PermitRootLogin no

Now you’ll need to restart the sshd service:

/etc/init.d/sshd restart

Now nobody can brute force your root login, at least.

Source

WP2Social Auto Publish Powered By : XYZScripts.com