SlideShare a Scribd company logo
1 of 17
E-AEGIS
By,
N Aashiq Ahamed
III-B.Sc CS(SSS)
SLCS College
What is E-AEGIS
• E - electronic, in computer terms, it refers to
anything which is online, anything which uses
network.
• AEGIS - in computer terms it refers to security,
defence.
• It’s a software used for security purpose.
• The software does not allow to change the
MAC Address of the PC.
About E-AEGIS
• This software is written in VB.net
programming language.
• Thus its written in VB.net it can be executed in
any windows platform like Windows 7,
Windows 10.
• A task in windows task scheduler is used to
trigger the application.
Importance of MAC Address
• The MAC address is a unique value associated
with a network adapter. MAC addresses are
also known as hardware addresses
or physical addresses. They uniquely identify
an adapter on a LAN.
• MAC addresses are 12-digit hexadecimal
numbers (48 bits in length).
MAC spoofing
• MAC spoofing is a technique for changing a factory-
assigned Media Access Control (MAC) address of a
network interface on a networked device.
• The MAC address that is hard-coded on a network
interface controller (NIC) cannot be changed.
• However, many drivers allow the MAC address to be
changed. Additionally, there are tools which can make
an operating system believe that the NIC has the MAC
address of a user's choosing.
• The process of masking a MAC address is known as
MAC spoofing.
Purpose of changing MAC Address
• Free Internet: There are places where you go get the WIFI
password but can’t access the network because they have
activated MAC filtering so spoof your MAC to allowed
devices and have fun.
• Identity Protection: As I told you it’s your identity on the
network so you can protect your identity on that network.
• Stop Tracking: Now in the world of WIFI zones companies
try to keep track of users by recording the MAC address so
spoofing MAC randomly can save you from that as well.
• Fake Accounts: By changing MAC ID we can easy create
fake accounts
Windows Task Scheduler
The Task Scheduler is a tool included with
Windows that allows predefined actions to be
automatically executed whenever a certain set
of conditions is met.
For example:-
You can schedule a task to run a backup
script every night, or send you an e-mail
whenever a certain system event occurs.
About the software
• This software can be implemented in corporate
industries where there is a cyber security threat arisen
by there employee because, the first step for doing
illegal activities with computer is Spoofing the MAC
Address.
• If the employee changes the MAC Address the system
will trigger an action and the computer will restart until
the MAC Address is changed on the PC and it will give 2
minutes time interval to change the MAC Address on
the system. To find the MAC address on the computer,
Internet is must without internet MAC Address can’t be
fetched, without internet this software will not trigger
the process.
The software has 3 parts:
1. MAC Address finder
2. MAC Address comparison
3. Task Scheduler Process
MAC Address finder:
This part is used to find the MAC Address of the system.
MAC Address comparison:
This part is used to compare the MAC Address given in the
program with the current MAC Address.
Task Scheduler Process:
This part is used to invoke the application with the help of
windows task scheduler.
Working process
• When a user changes the MAC Address of a
system it will be automatically logoff.
• With the help of Windows task scheduler the
process will run the software constantly when
the user logon to the system.
• At first the task scheduler will start the
execution then the application will start the
finding and comparison part.
• If the current MAC Address matches with the
default MAC Address it will simply terminate
the process.
• If the current MAC Address does not matches
with the default MAC Address it will logoff the
system.
This is the designing part of the software but it will
not be visible during the software execution.
Screenshot
This is task created in the windows task
scheduler for triggering the process when the
user is logged on.
Advantage
To find the MAC Address we need the internet,
in that case during the execution of the
software without internet means the system
will be logoff, but in my software the process
will be triggered only if internet is present
otherwise the action will not be triggered.
CONCLUSION
The E-AEGIS is security purpose created
software by this the cyber crimes and illegal
activities can be reduced as the software
needs the administrator privilege the other
persons can’t manipulate the software (or) the
task created in the task scheduler.
FUTURE ENHANCEMENT
If the administrator wants to change the MAC
Address it can changed (or) declared in the
VB.net program. Only the administrator can
able to change the MAC Address directly in
the software.
So the future enhancement will be the MAC
Address can be manually changed by the
administrator directly in the software itself.
THANK YOU

More Related Content

Similar to E-AEGIS

PDF-Poster- Varun
PDF-Poster- VarunPDF-Poster- Varun
PDF-Poster- VarunVarun Goyal
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor10-Strike Software
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer TroubleshootingRence Montanes
 
Remote Admittance
Remote AdmittanceRemote Admittance
Remote AdmittanceAjit Yadav
 
Mes Scada
Mes Scada Mes Scada
Mes Scada ROBOSOFT
 
mes-scada-101015064014-phpapp02.pdf
mes-scada-101015064014-phpapp02.pdfmes-scada-101015064014-phpapp02.pdf
mes-scada-101015064014-phpapp02.pdfNgcThinNguyn10
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoringIAEME Publication
 
Crime File System
Crime File SystemCrime File System
Crime File SystemIJARIIT
 
Online Real Estate Management System
Online Real Estate Management SystemOnline Real Estate Management System
Online Real Estate Management Systemshahrukh Nawandish
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a companyrosu555
 
Transcend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC ProductsTranscend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC ProductsBaiju P.S.
 
Software ,hardware,firmware,addressing
Software ,hardware,firmware,addressingSoftware ,hardware,firmware,addressing
Software ,hardware,firmware,addressingNajmulIslam38
 

Similar to E-AEGIS (20)

Mantra
MantraMantra
Mantra
 
PDF-Poster- Varun
PDF-Poster- VarunPDF-Poster- Varun
PDF-Poster- Varun
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
 
Remote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile PhoneRemote PC Administration Using Mobile Phone
Remote PC Administration Using Mobile Phone
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
Remote Admittance
Remote AdmittanceRemote Admittance
Remote Admittance
 
Mes Scada
Mes Scada Mes Scada
Mes Scada
 
mes-scada-101015064014-phpapp02.pdf
mes-scada-101015064014-phpapp02.pdfmes-scada-101015064014-phpapp02.pdf
mes-scada-101015064014-phpapp02.pdf
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
Crime File System
Crime File SystemCrime File System
Crime File System
 
Online Real Estate Management System
Online Real Estate Management SystemOnline Real Estate Management System
Online Real Estate Management System
 
Fg b
Fg bFg b
Fg b
 
Project1
Project1Project1
Project1
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a company
 
Transcend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC ProductsTranscend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC Products
 
Software ,hardware,firmware,addressing
Software ,hardware,firmware,addressingSoftware ,hardware,firmware,addressing
Software ,hardware,firmware,addressing
 

More from Aashiq Ahamed N

More from Aashiq Ahamed N (7)

Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Gas leakage detection system
Gas leakage detection systemGas leakage detection system
Gas leakage detection system
 
Usb Drive Protector
Usb Drive ProtectorUsb Drive Protector
Usb Drive Protector
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 
IOT
IOTIOT
IOT
 
5G
5G5G
5G
 
Steganography
SteganographySteganography
Steganography
 

Recently uploaded

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 

Recently uploaded (20)

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 

E-AEGIS

  • 2. What is E-AEGIS • E - electronic, in computer terms, it refers to anything which is online, anything which uses network. • AEGIS - in computer terms it refers to security, defence. • It’s a software used for security purpose. • The software does not allow to change the MAC Address of the PC.
  • 3. About E-AEGIS • This software is written in VB.net programming language. • Thus its written in VB.net it can be executed in any windows platform like Windows 7, Windows 10. • A task in windows task scheduler is used to trigger the application.
  • 4. Importance of MAC Address • The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN. • MAC addresses are 12-digit hexadecimal numbers (48 bits in length).
  • 5. MAC spoofing • MAC spoofing is a technique for changing a factory- assigned Media Access Control (MAC) address of a network interface on a networked device. • The MAC address that is hard-coded on a network interface controller (NIC) cannot be changed. • However, many drivers allow the MAC address to be changed. Additionally, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. • The process of masking a MAC address is known as MAC spoofing.
  • 6. Purpose of changing MAC Address • Free Internet: There are places where you go get the WIFI password but can’t access the network because they have activated MAC filtering so spoof your MAC to allowed devices and have fun. • Identity Protection: As I told you it’s your identity on the network so you can protect your identity on that network. • Stop Tracking: Now in the world of WIFI zones companies try to keep track of users by recording the MAC address so spoofing MAC randomly can save you from that as well. • Fake Accounts: By changing MAC ID we can easy create fake accounts
  • 7. Windows Task Scheduler The Task Scheduler is a tool included with Windows that allows predefined actions to be automatically executed whenever a certain set of conditions is met. For example:- You can schedule a task to run a backup script every night, or send you an e-mail whenever a certain system event occurs.
  • 8. About the software • This software can be implemented in corporate industries where there is a cyber security threat arisen by there employee because, the first step for doing illegal activities with computer is Spoofing the MAC Address. • If the employee changes the MAC Address the system will trigger an action and the computer will restart until the MAC Address is changed on the PC and it will give 2 minutes time interval to change the MAC Address on the system. To find the MAC address on the computer, Internet is must without internet MAC Address can’t be fetched, without internet this software will not trigger the process.
  • 9. The software has 3 parts: 1. MAC Address finder 2. MAC Address comparison 3. Task Scheduler Process MAC Address finder: This part is used to find the MAC Address of the system. MAC Address comparison: This part is used to compare the MAC Address given in the program with the current MAC Address. Task Scheduler Process: This part is used to invoke the application with the help of windows task scheduler.
  • 10. Working process • When a user changes the MAC Address of a system it will be automatically logoff. • With the help of Windows task scheduler the process will run the software constantly when the user logon to the system. • At first the task scheduler will start the execution then the application will start the finding and comparison part.
  • 11. • If the current MAC Address matches with the default MAC Address it will simply terminate the process. • If the current MAC Address does not matches with the default MAC Address it will logoff the system.
  • 12. This is the designing part of the software but it will not be visible during the software execution. Screenshot
  • 13. This is task created in the windows task scheduler for triggering the process when the user is logged on.
  • 14. Advantage To find the MAC Address we need the internet, in that case during the execution of the software without internet means the system will be logoff, but in my software the process will be triggered only if internet is present otherwise the action will not be triggered.
  • 15. CONCLUSION The E-AEGIS is security purpose created software by this the cyber crimes and illegal activities can be reduced as the software needs the administrator privilege the other persons can’t manipulate the software (or) the task created in the task scheduler.
  • 16. FUTURE ENHANCEMENT If the administrator wants to change the MAC Address it can changed (or) declared in the VB.net program. Only the administrator can able to change the MAC Address directly in the software. So the future enhancement will be the MAC Address can be manually changed by the administrator directly in the software itself.