From the time of Clearnet, dark web and associated links have defeated the market places. These marketplaces sell almost every illegal great. Every now and then, authorities are slapping down markets that are flourishing in the digital world. However, this makes way for newer ones. Guns, ammunitions, drugs and medicines are available for users all round the world. Users that are curious and want to surf the dark web for entertainment should strictly stick to safe practices. An alternative route when chosen can lead to personal injury and damage to property. This report discusses the security measures to be taken while swimming in dark web links. Setup of TOR Browser in dark netThe principal requirement for obtaining dark web is that a Tor enabled browser. dark web links can be accessed exclusively by setup of such a browser. There are several armed plugins out there on the market. TOR browsers look like Firefox browsers. Installation is quite straightforward and usually takes about 3 to 5 minutes for an ordinary user. It's best advised to install any dark web related software in a guest account in Windows. Installation of this software takes a couple of minutes and once installed you can configure it for Linux operating systems. Before powering off the Virtual Machine, then double check whether shared ports, hardware acceleration and sequential port accessibility is turned off by default. These options give a hint to malicious attackers in your machine particulars.Know More about dark web linksA connection occurs to the tor network when you click a dark web link. This connection exactly like a standard link takes you to a site from the dark web. Make certain that your VPN is practical at this time and you're accessing the same from your guest account. The whole activities retaking put at a virtual machine too. So the channel should be like this. After booting the Operating System, the guest account needs to be triggered. Once activated, you can easily turn on your VPN and connect to the installed virtual machine. Any Linux variant available within the virtual machine can be fired to start a tor browser. These recommendations can allow you to thwart any efforts on your computer by malicious programmers. The guest accounts or surfer account must only be used for accessing the dark web. It shouldn't be used for regular activities. While browsing the dark web links, netizens should take extreme care not to enter any personally identifying information online. Fake names may be utilized and also the passwords used should likewise be different. Being on a VPON or even a digital machine won't ever assist if you disclose your identity online. Each of the automated tools are there to assist an individual in safe browsing.