Virtual Security
#1

[attachment=11571]
VIRTUAL SECURITY
1. INTRODUCTION:

The project name Virtual Security System is a rich Net working Project. Provides security for complete networking systems and provided along with Feature Editor. This Editor is very help full to Blind people. Which has capability to narrate data to the user, which contains secured authentication and storing the user information across the database side and hand disk file system, This system can block any type of web sites across the networks and it will provides visited information to the administrators.
Which is notifying the each and every accessing information to the administrator’s mobile phone and email? This system provides rich graphical user interface (GUI) so that user can use easy way.
Purpose:
Only the authorized person is allowed to access VSA. The user is been prompted for username and password and then the user can be allowed to select the type recent his/her text files. After selection, the user can be edit text file
Generally the Editor application is introduced by Microsoft Corporation for various types of windows operating system. But they do not provide authentication for Editor, so that anonymous users can access this application as anonymously. To avoid this we are developing Virtual Security System for Authenticated Users Only (VSA). At the same time in our appication data will stored at database side and hard disk file.
Scope:
1) If any body tries to delete the text files they must enter valid user id and password.
2) The data will be stored into a normal text file format in the database, No data loss.
3) Occupies less memory space.
4) No need to pay money for maintaining the database. Accessing will be fast while processing data.
5) Cross platform independent, so it can be used in any operating system.
6) Enhanced security when compared normal Editor application.
7) Human resource is reduced.
8) Enhanced security is assured since we provide Authentication while retrieving tables from the Databases.
Action plan:
Only the authorized person is allowed to access VSA. The user is been prompted for username and password and then the user can be allowed to select the type recent his/her text files. After selection, the user can be edit text file .
User can import data from normal notepad text to Virtual Security System application for registered users only (VSA). Before Importing the data, the user can preview the text from that the user can check whether the correct text is been selected. The text is been converted and a message will be displayed to the user about the import. The imported file will be in any format and it is been previewed to the user in the database format or fate file format. Users can user different colors and different fonts for developing a file or text (not default fonts and colors).
ABSTRACT
Specifications of Virtual Security
Aim of the Project Virtual Security is to develop an application such that it will work like a Windows Text editor (note pad)
The following are the modules in Virtual Security
1. File processing module
2. Editing Module
3. Formatting module
4. Printing Module
The following are the functions of Virtual Security
Reading text files: Open any text file and view its contents.
Creating text file: We can create a new text file and save it with our own name
Modifying text: We can open an existing text file and modify its contents
Displaying text: Displays the contents of a file
Copying text: We can copy the contents of one file into another file
Merging: Two different text files can be merged into third file or one of the two files
Information: We can view the properties of a given text file
Formatting: Change the font size, font type font style of the text file when displaying
Find: Finding a given word in a text file.
Features of the Virtual Security
1) It is more efficient than Notepad
2) Auto wrap text
3) It displays metadata of a file which is not available in notepad.
4) It can be used to type programs also
HARDWARE AND SOFTWARE REQUIREMENTS
Software requirements:
Technologies : .Net, informs
Operating System : Windows 2000 Prof/XP.
Hardware requirements:
Processor : Pentium IV or higher
Processor Speed : 250 MHz to 833MHz
RAM : 128 MB or higher
2. PRESENT SYSTEM /PROPOSED SYSTEM
2.1. Existing System:

 The Existing system provides access for anonymouse users so that any users can access and modify.
 Notepad comes with operating system, If it is corrupt only the chance is repair or reinstallation of operationg system.
 There is no import or export data option, lot of problems will be arise like data corruption, huge memory spaces, and unnecessary expenses for File security.
 Now a day’s most of the websites stores data in backend storage device. The data are stored in Oracle database or some other backend devices. These databases occupy some part of memory in the server. The site owner should be paid some amount of money to maintain that database. The amount should be vary depending upon the database size and also have a lot of problem to maintain the database. This is unnecessary expenses and waste of memory spaces.
 To retrieve the data from normal notepad the process is very slow when we are browsing the files. These are the difficult arising to retrieve the files.
Drawbacks
There are lots of problems in the existing system. They are,
 Data corruption will occur.
 requires huge memory space.
 There is no chance to retrive data if the file is currepted or deleted.
 The only the option is formate system / Repair.
2.2. PROPOSED SYSTEM
Virtual Security System Application for Registered Users Only is provide more security than normal notepad. Which is provide extra option and data base facility also. It occupies less momery in the installed system.Easly you can retrive data if the data is currupted or deleted.To develop this system we are using Microsoft Visual Studio Dot net 2008 version.
In our system we have 7 modules each module will be devided into sub modules. Every module developed with different types of security wrapers. So that your data will be stored in secured place.
The Virtual Security System has the ability to process on any platform, since it is platform independent we can use it in any operating system. Apart from this no proxy server or firewall can restrict data’s. Here maintenance is very easy as it is a file and consumes very less memory.
The normal notepad application are not supported in different platforms but Virtual Security System application for registered users only file format supports different platforms like Linux, Windows etc.,
2.3. Modules:
 Administrator
 Visited Information
 Blocked web sites
 Site Blocking
 Logical Drives Information
 User
 Menu bar (File, Edit, Import, Export, Select Database)
 Help
The File operations includes following:
New: When we click this menu item, it creates an untitled text document.
Open: When we click this menu item, it allows opening an existing file.
Save : Using this menu item, to save data into the file.
Save as: Using this menu item, it allows creating an untitled file as titled file.
As well as to rename the existing file.
Exit : Using this menu item, to close the current Virtual security editor.
The Edit operation includes the following:
Undo: To choose undo from edit menu, appears the lost action.
Cut : To cut text so you can move it to another location, select the text, and then on the Edit menu click Cut.
Copy: To copy text so you can paste it in another location, select the text, and then on the Edit menu click Copy.
Paste: To paste text you have cut or copied, place the cursor where you want to paste the text, and then on the Edit menu click Paste.
Delete : To delete text, select it, and then on the Edit menu click Delete.
Select All: To select entire text on Virtual Security, then click on select all from edit menu.
Time/Date: Move the cursor to where you want to add the time and date.
On the Edit menu, click Time/Date.
Word-wrap: A check mark appears when word wrap is turned on. Wrapping text enables you to see all the text on the line, but it doesn't affect the way text appears when it is printed.
Set Font : When we click on this menu item, it appears the dialog and set font name, size and style.
The Search operation includes the following:
Find : On the Search menu, click Find. It allows finding what. In find what, type the characters or words you want to find.
Find Next: It finds the next preceding character or word.
The Help operation includes the following:
About: It show some message about Virtual Security
The Virtual Security application is developed in .Net programming language.
3. LITERATURE SURVEY
INTRODUCTION ABOUT .NET

Overview of the .NET Framework:
The .NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet. The .NET Framework is designed to fulfill the following objectives:
• To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely.
• To provide a code-execution environment that minimizes software deployment and versioning conflicts.
• To provide a code-execution environment that guarantees safe execution of code, including code created by an unknown or semi-trusted third party.
• To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments.
• To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications.
• To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code. The .NET Framework has two main components: the common language runtime and the .NET Framework class library. The common language runtime is the foundation of the .NET Framework. You can think of the runtime as an agent that manages code at execution time, providing core services such as memory management, thread management, and remoting, while also enforcing strict type safety and other forms of code accuracy that ensure security and robustness. In fact, the concept of code management is a fundamental principle of the runtime. Code that targets the runtime is known as managed code, while code that does not target the runtime is known as unmanaged code. D code, thereby creating a software environment that can exploit both managed.
• For example, ASP.NET hosts the runtime to provide a scalable, server-side environment for managed code. ASP.NET works directly with the runtime to enable Web Forms applications and XML Web services, both of which are discussed later in this topic.
Features of the Common Language Runtime:
• The common language runtime manages memory, thread execution, code execution, code safety verification, compilation, and other system services. These features are intrinsic to the managed code that runs on the common language runtime.
• With regards to security, managed components are awarded varying degrees of trust, depending on a number of factors that include their origin (such as the Internet, enterprise network, or local computer). This means that a managed component might or might not be able to perform file-access operations, registry-access operations, or other sensitive functions, even if it is being used in the same active application.
• The runtime enforces code access security. For example, users can trust that an executable embedded in a Web page can play an animation on screen or sing a song, but cannot access their personal data, file system, or network. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally feature rich.
• The runtime also accelerates developer productivity. For example, programmers can write applications in their development language of choice, yet take full advantage of the runtime, the class library, and components written in other languages by other developers. Any compiler vendor who chooses to target the runtime can do so. Language compilers that target the .NET Framework make the features of the .NET Framework available to existing code written in that language, greatly easing the migration process for existing applications.
• While the runtime is designed for the software of the future, it also supports software of today and yesterday. Interoperability between managed and unmanaged code enables developers to continue to use necessary COM components and DLLs.
• The runtime is designed to enhance performance. Although the common language runtime provides many standard runtime services, managed code is never interpreted. A feature called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing. Meanwhile, the memory manager removes the possibilities of fragmented memory and increases memory locality-of-reference to further increase performance.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: w3 edit,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cloud Computing Security: From Single to Multi-Clouds 1 844 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Reconfigurable Virtual Keyboard seminar class 5 2,084 30-11-2015, 02:30 PM
Last Post: seminar report asees
  Security system using IP camera mechanical engineering crazy 5 4,408 16-03-2015, 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,280 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,716 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,682 29-07-2013, 11:09 AM
Last Post: computer topic
  Internet Security and Firewall Design smart paper boy 1 1,878 10-12-2012, 01:23 PM
Last Post: seminar details
  Security in Wireless Networks nit_cal 1 1,423 12-11-2012, 01:41 PM
Last Post: seminar details
  Network Analysis & Security computer science topics 1 2,017 09-11-2012, 12:02 PM
Last Post: seminar details

Forum Jump: