1 00:00:00,780 --> 00:00:01,800 Hey, guys, welcome back. 2 00:00:02,340 --> 00:00:07,560 So in this lecture, we're going to discuss about the required security measures that should be taken 3 00:00:07,560 --> 00:00:09,300 care of before accessing the deep. 4 00:00:10,680 --> 00:00:16,410 How to solve safely on the deep dark web and actually to prevent all devices from any kind of Marvis 5 00:00:17,130 --> 00:00:22,900 or any type of leak that can be files leak or location leak, the given steps are very important. 6 00:00:22,920 --> 00:00:23,970 So let's discuss them. 7 00:00:24,980 --> 00:00:30,120 Browser settings, actually, that are browser has a quite strong security feature. 8 00:00:30,500 --> 00:00:36,920 So the first layer of the security is always at your browser would be discussed about the security settings 9 00:00:37,400 --> 00:00:39,860 and installing door sessions previously in the schools. 10 00:00:40,440 --> 00:00:46,460 You need to block any type of script, maybe a dollar or JavaScript, because they play a key role in 11 00:00:46,460 --> 00:00:48,680 interaction between the device and the website. 12 00:00:49,010 --> 00:00:55,100 Secondly, you need to plug the automatically download something which is default and you have to ask 13 00:00:55,100 --> 00:00:55,910 before downloading. 14 00:00:56,360 --> 00:01:02,150 This can be very useful when devices try to install certain files like cookies without asking permission. 15 00:01:03,080 --> 00:01:08,990 And lastly, you need to deny all the services like location or data, which is the browser ask. 16 00:01:09,000 --> 00:01:14,360 Sometimes it can leak your data location for more details and practical execution. 17 00:01:14,360 --> 00:01:17,570 You can do what they're installing, but we do open the doors. 18 00:01:17,870 --> 00:01:20,720 We open the door has an inbuilt VPN. 19 00:01:20,900 --> 00:01:23,960 It changes your location automatically as you open the browser. 20 00:01:24,320 --> 00:01:30,350 But several times due to the information required by a particular website, this indeed VPN feature 21 00:01:30,350 --> 00:01:30,860 is breached. 22 00:01:31,520 --> 00:01:39,200 So for another layer of security, this advised to use an external VPN public wifi, download the website, 23 00:01:39,200 --> 00:01:45,350 upload those on the Deep Dark Web, always uses public Wi-Fi for updating or making any changes to this 24 00:01:45,350 --> 00:01:45,800 website. 25 00:01:46,350 --> 00:01:52,020 But isn't it essential as air activity can be monitored by the government or any other individual, 26 00:01:52,040 --> 00:01:52,780 maybe a hacker? 27 00:01:53,450 --> 00:01:59,060 And if you are successful in breaching the security, you can easily order. 28 00:01:59,920 --> 00:02:07,210 As you will be using your personal or office Wi-Fi once you are detected, the device IP, your location 29 00:02:07,210 --> 00:02:08,620 at everything is leaked. 30 00:02:08,620 --> 00:02:13,990 So it's not compulsory, but it's advisable to use a public Wi-Fi while accessing the deep dark web 31 00:02:14,410 --> 00:02:17,360 is the amnesiac incognito life system. 32 00:02:17,930 --> 00:02:25,570 Actually, we had a lecture on this topic deals as an operating system installing a hardware device 33 00:02:25,570 --> 00:02:32,890 like Mandry or CD-ROM, and it comes with all the applications required to access the Web and its main 34 00:02:33,340 --> 00:02:37,350 plus point as it does not support any kind of the files. 35 00:02:38,050 --> 00:02:43,890 All the memory used while using data is executed in the processing unit of the computer, which you 36 00:02:43,930 --> 00:02:46,090 may never you eject the device containing Deards. 37 00:02:46,360 --> 00:02:51,940 All the memory to the dark web is deleted in the computer as well as in the hardware device. 38 00:02:52,490 --> 00:02:55,340 So it's the safest way so far, as did Dr.. 39 00:02:56,670 --> 00:03:03,870 Wanted notification, yes, after taking care of all topics on site, notifications can reach them all 40 00:03:04,650 --> 00:03:10,020 for the websites on the surface where it's common to ask for cookies or any kind of data usage. 41 00:03:10,260 --> 00:03:14,450 But in the case of dark web, it can be very harmful. 42 00:03:14,460 --> 00:03:20,370 Once you accept the cookies policy of a website, it can download and store any malicious file which 43 00:03:20,370 --> 00:03:22,090 ultimately invites hackers. 44 00:03:22,920 --> 00:03:28,830 My advice to you would be that you should use a computer that has no or negligible amount of sensitive 45 00:03:28,830 --> 00:03:29,150 data. 46 00:03:29,640 --> 00:03:35,510 So even when it is hacked or any kind of malware is installed, you can just formate the device inside 47 00:03:35,520 --> 00:03:35,730 of it. 48 00:03:36,240 --> 00:03:38,860 That's the way I use it. 49 00:03:39,330 --> 00:03:40,650 That is for this lecture. 50 00:03:41,870 --> 00:03:43,950 We are really close to completing the schools. 51 00:03:43,970 --> 00:03:46,040 Congratulations, you read so far. 52 00:03:46,100 --> 00:03:49,880 I really hope you enjoyed the schools and I request you to give the feedback. 53 00:03:50,360 --> 00:03:52,520 Either it may be positive or negative. 54 00:03:52,580 --> 00:03:56,220 It will be very helpful for us to further improve the schools. 55 00:03:56,240 --> 00:03:57,110 So that's it. 56 00:03:57,290 --> 00:03:58,010 Thank you very much. 57 00:03:58,370 --> 00:03:59,500 See you in the next lecture.