Posts by Category: Deep Web Research

The Invisible Internet Project (I2P)

April 01, 2015

The Invisible Internet Project (I2P)
https://geti2p.net/en/

The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P. I2P is an anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person.No network can be “perfectly anonymous”. The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review. I2P is available on desktops, embedded systems (like the Raspberry Pi) and Android phones. Help spread the word! Features include: 1) Email: Integrated web mail interface, plugin for serverless email; 2) Web browsing: Anonymous websites, gateways to and from the public Internet; 3) Blogging and forums: Blogging and Syndie plugins; 4) Website hosting: Integrated anonymous web server; 5) Real-time chat: Instant messaging and IRC clients; 6) File sharing: ED2K and Gnutella clients, integrated BitTorrent client; and 7) Decentralized file storage: Tahoe-LAFS distributed filesystem plugin. This will be added to Privacy Resources Subject Tracer™. This will be added to Deep Web Research and Discovery Resources 2015 white paper. This will be added to the tools section of Research Resources Subject Tracer™ Information Blog.

1469 views

An Up-To-Date Layman’s Guide To Accessing The Deep Web

March 23, 2015

An Up-To-Date Layman’s Guide To Accessing The Deep Web
http://www.fastcolabs.com/3026989/an-up-to-date-laymans-guide-to-accessing-the-deep-web

A nice article and guide about accessing the deep web by Jenna Kagel. This will be added to my Deep Web Research and Discovery Resources 2015 white paper.

1534 views

Open Vulnerability Assessment System (OpenVAS)

March 21, 2015

Open Vulnerability Assessment System (OpenVAS)
http://www.darknet.org.uk/2015/01/openvas-7-released-open-source-vulnerability-scanner/

The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 35,000 in total (as of April 2014). The OpenVAS Manager is the central service that consolidates plain vulnerability scanning into a full vulnerability management solution. The Manager controls the Scanner via OTP (OpenVAS Transfer Protocol) and itself offers the XML-based, stateless OpenVAS Management Protocol (OMP). All intelligence is implemented in the Manager so that it is possible to implement various lean clients that will behave consistently e.g. with regard to filtering or sorting scan results. The Manager also controls a SQL database (sqlite-based) where all configuration and scan result data is centrally stored. Finally, Manager also handles user management includiung access control with groups and roles. Still today it’s pretty much the only fully fledged Open Source vulnerability scanner out there. This will be added to Deep Web Research and Discovery Resources 2015.

1541 views

Updated> Deep Web Research and Discovery Resources 2015

March 02, 2015

Updated> Deep Web Research and Discovery Resources 2015
http://www.DeepWeb.us/

I have just updated my white paper link dataset complilation titled Deep Web Research and Discovery Resources 2015 and it is now a 47 page 323KB PDF document available directly from the above URL. This update verified all links as well as reviewed all resources covered. Currently this has been downloaded over 2,500,000+ times!

March 1, 2015

This research is powered by Subject Tracer Bots™ available from the Virtual Private Library™.

©2015 Marcus P. Zillman, M.S., A.M.H.A.

1234 views

DeepDive – Analyze Data On a Deeper Level Than Ever Before

February 17, 2015

DeepDive – Analyze Data On a Deeper Level Than Ever Before
http://deepdive.stanford.edu/

DeepDive is a new type of system that enables developers to analyze data on a deeper level than ever before. DeepDive is a trained system: it uses machine learning techniques to leverage on domain-specific knowledge and incorporates user feedback to improve the quality of its analysis. DeepDive differs from traditional systems in several ways: a) DeepDive is aware that data is often noisy and imprecise: names are misspelled, natural language is ambiguous, and humans make mistakes. Taking such imprecisions into account, DeepDive computes calibrated probabilities for every assertion it makes. For example, if DeepDive produces a fact with probability 0.9 it means the fact is 90% likely to be true; b) DeepDive is able to use large amounts of data from a variety of sources. Applications built using DeepDive have extracted data from millions of documents, web pages, PDFs, tables, and figures; c) DeepDive allows developers to use their knowledge of a given domain to improve the quality of the results by writing simple rules that inform the inference (learning) process. DeepDive can also take into account user feedback on the correctness of the predictions, with the goal of improving the predictions; d) DeepDive is able to use the data to learn “distantly”. In contrast, most machine learning systems require tedious training for each prediction. In fact, many DeepDive applications, especially at early stages, need no traditional training data at all; and e) DeepDive’s secret is a scalable, high-performance inference and learning engine. For the past few years, we have been working to make the underlying algorithms run as fast as possible. The techniques pioneered in this project are part of commercial and open source tools including MADlib, Impala, a product from Oracle, and low-level techniques, such as Hogwild!. They have also been included in Microsoft’s Adam. Examples of DeepDive applications include: 1) PaleoDeepDive – A knowledge base for Paleobiologists; 2) GeoDeepDive – Extracting dark data from geology journal articles; and 3) Wisci – Enriching Wikipedia with structured data. DeepDive is project led by Christopher Ré at Stanford University. This will added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Deep Web Research and Discovery Resources 2015. This will be added to Knowledge Discovery Resources Subject Tracer™. This will be added to Data Mining Resources Subject Tracer™.

1667 views

Project Maelstrom – The Internet We Build Next

February 16, 2015

Project Maelstrom – The Internet We Build Next
http://blog.bittorrent.com/category/labs/

An invite-only Alpha to help build the distributed web. It started with a simple question. What if more of the web worked the way BitTorrent does? Project Maelstrom begins to answer that question with our first public release of a web browser that can power a new way for web content to be published, accessed and consumed. Truly an Internet powered by people, one that lowers barriers and denies gatekeepers their grip on our future. If we are successful, we believe this project has the potential to help address some of the most vexing problems facing the Internet today. How can we keep the Internet open? How can we keep access to the Internet neutral? How can we better ensure our private data is not misused by large companies? How can we help the Internet scale efficiently for content? The power of distributed technology that underpins BitTorrent and all of our products has long been an example in this regard and bringing more of this power to the web is only natural as these challenges loom. This will be added to Deep Web Research and Discovery Resources 2015 white paper. This will be added to World Wide Web Reference Subject Tracer™.

1392 views

SurfEasy – Online Privacy

February 06, 2015

SurfEasy – Online Privacy
https://www.surfeasy.com/

Unblock the Internet and secure your smartphone, tablet and computer with SurfEasy Virtual Private Network (VPN). Surf safely – on any network, with any device, at any location. Whether you’re on your home internet, a public WiFi hotspot, or your college’s network, your location and activities can be tracked when you’re online. Hackers can access your financial details, your personal information and almost all your accounts online–and location tracking means that your web might be restricted because of where you are. SurfEasy VPN helps you protect your personal privacy and keeps you secured on the internet. With SurfEasy, you can surf the web safely, privately and anonymously–without limits or restrictions, from anywhere in the world. Features include: a) WiFi Security – Bank-grade encryption secures your Internet connection on WiFi hotspots and unsecured networks; b) Identity Protection – Your IP address is shielded from websites so you can browse anonymously and avoid being tracked; c) Privacy Protection – Everything you do online is hidden from hackers, snoops and anyone monitoring the network; and d) Online Freedom – Surf without restrictions from anywhere in the world. Bypass firewalls and access blocked websites. SurfEasy is the only VPN that works on every device and every network. That includes phones, tablets, public computers and devices that block software installations, like your office PC. However you surf the web, let SurfEasy protect you. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Deep Web Research and Discovery Resources 2015 white paper. This will be added to Privacy Resources Subject Tracer™.

1524 views

CyberGhost – One of the World’s Most Trusted and Secure Virtual Private Networks

February 06, 2015

CyberGhost – One of the World’s Most Trusted and Secure Virtual Private Networks
http://www.cyberghostvpn.com/

Free, simple & secure access to content from all over the world. 3.5 Million people have enjoyed their service so far! CyberGhost is a fast, simple and efficient way to protect your online privacy, surf anonymously and access blocked or censored content. It offers top-notch security and anonymity without being complicated to use or slowing down your internet connection. Internet was first created as an environment where everybody could express their opinion and have unrestricted access to information while remaining anonymous. And we believe it should stay that way! Features include: a) Privacy – CyberGhost VPN hides your IP and replaces it with one of your choice. This way, you surf anonymously; b) Security – They encrypt your connection and don’t keep logs, so you don’t have to worry about the security of your data; and c) Freedom – With CyberGhost VPN you gain access to censored or geo-restricted content from all around the world. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Deep Web Research and Discovery Resources 2015 white paper. This will be added to Privacy Resources Subject Tracer™.

1652 views

TOR For Newbies – When Should You Use It?

February 03, 2015

TOR For Newbies – When Should You Use It?
http://www.makeuseof.com/tag/tor-for-newbies/

Surely you’ve heard about TOR. Good or bad, the network of relays has been talked about in privacy circles for a while now. Savvy users should already know whether using TOR is right for their needs, but what about the newbies out there? How are they to decide if they want to take the plunge into the world of TOR? This infographic will show you everything you need to know about how TOR works, when you should use it, and how to get started. This will be added to Deep Web Research and Discovery Resources 2015.

1452 views

Updated> Deep Web Research and Discovery Resources 2015

February 02, 2015

Updated> Deep Web Research and Discovery Resources 2015
http://www.DeepWeb.us/

I have just updated my white paper link dataset complilation titled Deep Web Research and Discovery Resources 2015 and it is now a 47 page 323KB PDF document available directly from the above URL. This update verified all links as well as reviewed all resources covered. Currently this has been downloaded over 2,500,000+ times!

February 1, 2015

This research is powered by Subject Tracer Bots™ available from the Virtual Private Library™.

©2015 Marcus P. Zillman, M.S., A.M.H.A.

1292 views