#internetlayer
Explore tagged Tumblr posts
osintelligence · 2 years ago
Link
https://bit.ly/3ILc7wW - 🕸️ The infamous Dark Web, often linked with cybercrime and human abuse, was initially developed by the US military. It uses a network of encrypted websites, rendering both origin and content hard to trace. #DarkWeb #CyberSecurity 🌐 The Surface Web, which we access daily, is just a fraction of the Internet. The Deep Web, unindexed by search engines, houses services like cloud storage and online banking. An extreme layer of the Deep Web, ensuring high privacy, is the Dark Web. #InternetLayers 💻 The Dark Web operates via overlay networks accessible only through special software. These networks, called darknets, often used for file sharing, ensure privacy through multiple data relays and encryption, making tracking complex. #Darknet #InternetPrivacy 🔓 A popular system facilitating this is Tor (The Onion Router), initially developed by the US Naval Research Lab. Released under a free license, it protects data transmission through multiple encryption layers. #Tor #DataEncryption 🔦 Accessing the Dark Web is legal in most countries, and it serves various legitimate users such as government bodies and whistleblowers. However, its heightened privacy also makes it a hotspot for illegal activities and materials. #InternetFreedom #CyberCrime 🔑 Accessing the Dark Web requires specialized browsers like Tor. While these provide privacy, they may also invite suspicion from authorities, making careful usage paramount for online safety. #OnlineSecurity 💼 Despite its illicit side, the Dark Web hosts legal, ethical services. Encrypted email services like ProtonMail, whistleblowing platforms like SecureDrop, and uncensored access to platforms like Facebook make it valuable for privacy advocates. #LegalWebUses ⚠️ Despite its benefits, the Dark Web is linked with serious crime, making even legal users potential targets. While exploration is possible, one must remember its inherent risks.
1 note · View note
smartcherryposts · 7 years ago
Text
TCP IP Reference Model
Tumblr media
TCP IP Reference Model - Whenever A Computer Wants To Communicate With Another Computer, The Communication Between Those Two Computer's Should Be Good And Reliable.So We Can Guarantee That The Data Is Received Correctly.
Tumblr media
For Example When You Want To View A Web Page Or Download A File Or Look At Email You Would Expect The Web Page Intact In Order With Nothing Missing.
Tumblr media
Or If You Download A File,You Would Want Entire File To Be Downloaded With Missing Data In It.
Tumblr media
This Is Where TCP Comes In. TCP Stands For Transmission Control Protocol And This Is One Of Main Protocols Used In TCP IP Network.
Tumblr media
TCP Is Guarantee That All The Data Is Received And In Order. Because Without TCP There Some Of The Data Could Be Missing Or Out Of Order. Because If You View A Web page Without TCP Your Web Page Could Be All Messed Up.The Images Could Be Missing Or The Text Could Be Backwards And Out Of Order. Or If You Download A File, You Might Not Get The Entire File Or You Could Get A File Out Of Order Which Would Render The File Useless. So This Is Where TCP Comes In. TCP Is A Connection Oriented Protocol Which Basically Means  That It Must First Acknowledge A Session Between A Two Computers They Are Communicating. So The Two Computers Verify A Connection Before Any Communication Takes Place And It Does By Using A Three Way Hand Shake. So The First Step A Computer Will Send Message Called SYN. Then The Receiving Computer Send Back An Acknowledgement Message Telling The Sender That They Has Received The Message. And The Finally The Sender Computer Sends An Acknowledgement Message Back To The Receiver Computer.
Tumblr media
    Once This Has Taken Place Data Can Be Delivered.   And Another Important Thing To Remember About TCP Is That It Guarantees The Delivery Of The Data. So If The Data Packet Goes Straight And Doesn't Arrive Then TCP Will Resent It.  
IP Address (Internet Protocol Address)
Internet Protocol Address Is a Numerical Label Assigned To A Each Device(Computer Etc) Connected To Computer Network That Uses The Internet Protocol For Communication. An IP Address Sever Two Principle Functions : Host Or Network Interface Identification And Location Addressing. If You Understood Please Subscribe To My YouTube Channel And Share With Your Friends.   Smart CSE..!         Read the full article
0 notes