SlideShare a Scribd company logo
1 of 5
24-seven
September 19
2013
System administrator is a software which will provide security
to your data and will let you to access your data remotely
System
administration
using E-mail
Submitted by:-
1) Suchet V. pawar (30)
2) Vishal M. patil (20)
3) Kartik K. thorat (25)
Guided by:-
Mr. Amol Deshmukh
System Administration Using Email
Abstract:
The purpose of the project is to provide the mobile users
(i.e. who travelling for work) a service that facilitates them to
work with their system from anywhere in the world using
Email.
The basic idea behind the project is to bridge the
communication gap between mobile users and their systems.
This type of service enhances the capabilities and
features of mobile devices. With this type of service one can
have a control over the System in addition to accessibility
Features:
1. This application is designed to provide the user easy capability
to access a PC from his mobile device.
2. This project is to enable the mobile users to control his PC
information at their fingertips.
3. The application must consider the limitations of mobile devices.
4. The application must work properly without problems on all
targeted devices, power supply and network support.
Objectives:
1. This application is designed to bridge the gap between System
and Mobile.
2. This project is to enable the mobile users to Access their
system’s data.
3. This project involves flow of data on the Wireless Application
Protocol.
Scope & Limitations:
1. The proposed software targets resource constrained and more
specifically wireless computing devices.
2. Deployment requires formatting the display in a generic way so
that it works for all different types of devices.
3. Special attention is needed regarding complexities of network
limitations.
It is spitted into six parts:
1. Read 2. Write 3. Execute
4. Logoff 5. Restart 6. Shutdown
 Read:
User can read the remote system files by using read function.
 Write:
User can write text data in a mobile, we can save a data as a file in
remote system.
 Execute:
The application run by clicking the execute option. We can
execute remote system explorer, notepad & so on.
 Logoff:
We can logoff our remote system by using logoff function.
 Restart:
We can restart our remote system by using restart function.
 Shutdown:
We can shutdown our remote system by using shutdown
function.

More Related Content

What's hot

Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introductiondipaknandankar
 
Mapping the school network
Mapping the school networkMapping the school network
Mapping the school networkhengehall
 
Mobile frame asset management in depth
Mobile frame asset management in depthMobile frame asset management in depth
Mobile frame asset management in depthMobileWorxs
 
2.table of contents (blue eye technology)
2.table of contents (blue eye technology)2.table of contents (blue eye technology)
2.table of contents (blue eye technology)JIEMS Akkalkuwa
 

What's hot (7)

Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introduction
 
Mapping the school network
Mapping the school networkMapping the school network
Mapping the school network
 
Mobile frame asset management in depth
Mobile frame asset management in depthMobile frame asset management in depth
Mobile frame asset management in depth
 
2.table of contents (blue eye technology)
2.table of contents (blue eye technology)2.table of contents (blue eye technology)
2.table of contents (blue eye technology)
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Satish kumar
Satish kumar Satish kumar
Satish kumar
 
Biometrics faq
Biometrics  faqBiometrics  faq
Biometrics faq
 

Viewers also liked

Konsepasasnilai 130212230145-phpapp01
Konsepasasnilai 130212230145-phpapp01Konsepasasnilai 130212230145-phpapp01
Konsepasasnilai 130212230145-phpapp01Ang Xiao Yean
 
Jenis jenisnilai-130720113732-phpapp02
Jenis jenisnilai-130720113732-phpapp02Jenis jenisnilai-130720113732-phpapp02
Jenis jenisnilai-130720113732-phpapp02Ang Xiao Yean
 
Power aware operating system
Power aware operating systemPower aware operating system
Power aware operating systemRajan Kumar Yadav
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesJing WANG
 
Hanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt LtdHanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt LtdEdward Collin
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationmworks8788
 
Consecuencias de las concesiones petroleras
Consecuencias de las concesiones petrolerasConsecuencias de las concesiones petroleras
Consecuencias de las concesiones petrolerasBreyner Rojas
 
Memahami sekolah islam (perkembangan dan karakteristiknya)
Memahami sekolah islam (perkembangan dan karakteristiknya)Memahami sekolah islam (perkembangan dan karakteristiknya)
Memahami sekolah islam (perkembangan dan karakteristiknya)Bams Bams
 
SCCI'15 - Devology - Session 1 - Introduction The Internet & HTML
SCCI'15 - Devology - Session 1 - Introduction The Internet & HTMLSCCI'15 - Devology - Session 1 - Introduction The Internet & HTML
SCCI'15 - Devology - Session 1 - Introduction The Internet & HTMLSCCI-CU
 
อาชญากรรมทางคอมพิวเตอร์
อาชญากรรมทางคอมพิวเตอร์อาชญากรรมทางคอมพิวเตอร์
อาชญากรรมทางคอมพิวเตอร์Jarilg Gaewduanglek
 

Viewers also liked (18)

Ipv6_final
Ipv6_finalIpv6_final
Ipv6_final
 
Portable PC final
Portable PC finalPortable PC final
Portable PC final
 
Rapport om crowdfunding
Rapport om crowdfundingRapport om crowdfunding
Rapport om crowdfunding
 
Konsepasasnilai 130212230145-phpapp01
Konsepasasnilai 130212230145-phpapp01Konsepasasnilai 130212230145-phpapp01
Konsepasasnilai 130212230145-phpapp01
 
Jenis jenisnilai-130720113732-phpapp02
Jenis jenisnilai-130720113732-phpapp02Jenis jenisnilai-130720113732-phpapp02
Jenis jenisnilai-130720113732-phpapp02
 
สะกดคำ
สะกดคำสะกดคำ
สะกดคำ
 
Power aware operating system
Power aware operating systemPower aware operating system
Power aware operating system
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slides
 
Hanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt LtdHanjer Biotech Energies Pvt Ltd
Hanjer Biotech Energies Pvt Ltd
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
EMAAR MGF
EMAAR MGFEMAAR MGF
EMAAR MGF
 
Emaar MGF
Emaar MGFEmaar MGF
Emaar MGF
 
Consecuencias de las concesiones petroleras
Consecuencias de las concesiones petrolerasConsecuencias de las concesiones petroleras
Consecuencias de las concesiones petroleras
 
Memahami sekolah islam (perkembangan dan karakteristiknya)
Memahami sekolah islam (perkembangan dan karakteristiknya)Memahami sekolah islam (perkembangan dan karakteristiknya)
Memahami sekolah islam (perkembangan dan karakteristiknya)
 
SCCI'15 - Devology - Session 1 - Introduction The Internet & HTML
SCCI'15 - Devology - Session 1 - Introduction The Internet & HTMLSCCI'15 - Devology - Session 1 - Introduction The Internet & HTML
SCCI'15 - Devology - Session 1 - Introduction The Internet & HTML
 
Galería de imágenes para el foro 3 (1)
Galería de imágenes para el foro 3 (1)Galería de imágenes para el foro 3 (1)
Galería de imágenes para el foro 3 (1)
 
Calibration Project
Calibration ProjectCalibration Project
Calibration Project
 
อาชญากรรมทางคอมพิวเตอร์
อาชญากรรมทางคอมพิวเตอร์อาชญากรรมทางคอมพิวเตอร์
อาชญากรรมทางคอมพิวเตอร์
 

Similar to 24seven

11.universal mobile application development (umad) on home automation
11.universal mobile application development (umad) on home automation11.universal mobile application development (umad) on home automation
11.universal mobile application development (umad) on home automationAlexander Decker
 
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyVoice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyIRJET Journal
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...CSCJournals
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - AbhijeetAbhijeet Kalsi
 
Remote pc administration using j2 me
Remote pc administration using j2 meRemote pc administration using j2 me
Remote pc administration using j2 mesudheerkumar123
 
Distributed system
Distributed systemDistributed system
Distributed systemchirag patil
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneTowards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneeSAT Journals
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET Journal
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
 

Similar to 24seven (20)

11.universal mobile application development (umad) on home automation
11.universal mobile application development (umad) on home automation11.universal mobile application development (umad) on home automation
11.universal mobile application development (umad) on home automation
 
WBS Final
WBS FinalWBS Final
WBS Final
 
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyVoice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - Abhijeet
 
Remote pc administration using j2 me
Remote pc administration using j2 meRemote pc administration using j2 me
Remote pc administration using j2 me
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Distributed system
Distributed systemDistributed system
Distributed system
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
Download
DownloadDownload
Download
 
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneTowards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephone
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile Technology
 
chapter 3.docx
chapter 3.docxchapter 3.docx
chapter 3.docx
 
chapter 3.pdf
chapter 3.pdfchapter 3.pdf
chapter 3.pdf
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 

24seven

  • 1. 24-seven September 19 2013 System administrator is a software which will provide security to your data and will let you to access your data remotely System administration using E-mail
  • 2. Submitted by:- 1) Suchet V. pawar (30) 2) Vishal M. patil (20) 3) Kartik K. thorat (25) Guided by:- Mr. Amol Deshmukh
  • 3. System Administration Using Email Abstract: The purpose of the project is to provide the mobile users (i.e. who travelling for work) a service that facilitates them to work with their system from anywhere in the world using Email. The basic idea behind the project is to bridge the communication gap between mobile users and their systems. This type of service enhances the capabilities and features of mobile devices. With this type of service one can have a control over the System in addition to accessibility Features: 1. This application is designed to provide the user easy capability to access a PC from his mobile device. 2. This project is to enable the mobile users to control his PC information at their fingertips. 3. The application must consider the limitations of mobile devices. 4. The application must work properly without problems on all targeted devices, power supply and network support.
  • 4. Objectives: 1. This application is designed to bridge the gap between System and Mobile. 2. This project is to enable the mobile users to Access their system’s data. 3. This project involves flow of data on the Wireless Application Protocol. Scope & Limitations: 1. The proposed software targets resource constrained and more specifically wireless computing devices. 2. Deployment requires formatting the display in a generic way so that it works for all different types of devices. 3. Special attention is needed regarding complexities of network limitations. It is spitted into six parts: 1. Read 2. Write 3. Execute 4. Logoff 5. Restart 6. Shutdown
  • 5.  Read: User can read the remote system files by using read function.  Write: User can write text data in a mobile, we can save a data as a file in remote system.  Execute: The application run by clicking the execute option. We can execute remote system explorer, notepad & so on.  Logoff: We can logoff our remote system by using logoff function.  Restart: We can restart our remote system by using restart function.  Shutdown: We can shutdown our remote system by using shutdown function.