Security of web forms full report
#1

[attachment=2756]

Abstract”
This paper delivers some basic information about the security of web forms from web bots (robots). Possible threats are described and the article gives a list of some methods which can be used to protect web forms. The emphasis is on the CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) method that is most often used method. At the end of paper you can find one implementation of security methods using PHP and MySQL technologies.
Presented By:
Zlatko ovi *, Lívia Szedmina **
* Polytechnical Engineering College/Department of Informatics, Subotica, Serbia
** Polytechnical Engineering College/Department of Foreign Languages, Subotica, Serbia

I. INTRODUCTION
This paper offers some basic information about the security of web forms. The second part of the paper explains the notion of web bots, their division and possible threats. Following that some methods of protection against web bots will be named, while the fourth section describes the technique of web forms focusing on the Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) method. Section five deals with the limitations of the application of the Captcha method. A way to avoid these methods is described in the last section of the paper.


II. WEB BOTS
A. What are web bots?
Internet bots, also known as web robots or simply bots, are applications which start automated processes via Internet. In most cases, bots execute simple structured repeating tasks. This tasks are executing much more times than an average man can do. Bots are used when collecting and feeding data from the Internet. In this process automated scripts seek, analyze and file information from the web server.
Reply
#2

i want a seminar report of "captcha for internet security"immediately.please help me.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sample project monitoring forms, documentation forms**re inflate in pdf report, web 20 forms, free sample report forms, civil servants p9 forms, project management forms of, hpboard recheking forms,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,382 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 42,014 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 30,650 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 24,892 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,606 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 66,331 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 74,437 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 23,315 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 41,329 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 43,679 16-09-2015, 02:51 PM
Last Post: seminar report asees

Forum Jump: