Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
File tracking system
1. i
Disclaimer
I hereby declare that this study entitled “FILE TRACKING SYSTEM” is based on my original
research work. Related works on the topic, by other researchers, have been duly acknowledged. I
owe all the liabilities relating to accuracy and authenticity of the data or any other information
included here under.
Signature:
Name of student: Sabana Maharjan
Date:
2. ii
Recommendation
This is to certify that this project entitled, “FILE TRACKING SYSTEM” prepared and
submitted by Sabana Maharjan in partial fulfillment of the requirements of the degree of
Bachelor of science (B.Sc.) in Computer Science and Information Technology awarded by
Tribhuvan University, has been completed under my supervision. I recommend the same for
acceptance by Tribhuvan University.
Signature:
Name of the supervisor:
Designation:
Date signed:
3. iii
Certificate
This project entitled “ FILE TRACKING SYSTEM” prepared and submitted by Sabana
Maharjan has been examined by us and is accepted for the award of the degree of Bachelor of
science (B.Sc.) in Computer Science and Information Technology awarded by Tribhuvan
University.
….. (Name)….. ….. (Signature)….. …… (Date signed)….. External
Examiner (2 blank spaces)
….. (Name)….. ….. (Signature)….. …… (Date signed)….. Project
Coordinator (2 blank spaces)
….. (Name)….. ….. (Signature)….. …… (Date signed)….. Supervisor (2
blank spaces)
….. (Name)….. ….. (Signature)….. …… (Date signed)…..
Head/Program Coordinator
4. iv
ACKNOWLEDGEMENT
We are very grateful to the Department of Computer Science and Information technology,
Kathmandu BernHardt College for providing us with an opportunity to work on a major project
as part of our project works syllabus. We express our gratitude towards our project supervisor
Mr. Keshav Poudel and Mr. Ramesh Sharma for his valuable time, suggestions and feedbacks
during the research and reporting of this project.
We are also grateful to all our teachers for their encouragement, feedback, suggestions and inputs
have been very useful towards completion of this project.
We are very thankful to our entire classmate. The project could not be completed
without their suggestions and support.
Sabana Maharjan (Symbol No.: 3175/068)
5. v
ABSTRACT
This project is made for effective and efficient collecting information about file. Taking this
problem into consideration we got an idea of developing an application which will help the
organization. My project entitled “File Tracking System” will address the problem of cost
because it just use the Internet of low bandwidth and alert or notify the people ranging from few
to huge number of people. This is the era of technology most of the people are lured towards the
smart phones and after installing our app they will get notification despite of their busy schedules
and they will manage their time for the event as per schedule. Since my project will directly push
the notification user does not have to bother about synchronization of their application. If the
user’s mobile is connected to the Internet, they will get popup notification in notification bar of
their mobile phone. After clicking on the notification they will get the detail information related
to that notification.
Keywords: Google Cloud
6. vi
ABBREVIATION
SQL:Structured Query Language
PHP:Personal Home Page
JSP: Java Server Pages
UML: Unified Modeling Language
SDLC: System Development Life Cycle
ID: Identity
CSS:Cascading Style Sheets
HTML: Hyper Text Markup Language
XHTML: Extensible Hyper Text Markup Language
DC: Direct Control
QA: Quality Analyst
7. 1
Table of Contents
Disclaimer .........................................................................................................................................i
Recommendation .............................................................................................................................ii
Certificate........................................................................................................................................iii
ACKNOWLEDGEMENT ..............................................................................................................iv
ABSTRACT.....................................................................................................................................v
ABBREVIATION...........................................................................................................................vi
Introduction..................................................................................................................................... 3
1.1 Background Study ............................................................................................................ 3
1.2 Problem Definition ........................................................................................................... 3
1.3 Objectives......................................................................................................................... 3
1.4 Scope ................................................................................................................................ 4
1.5 Limitation ......................................................................................................................... 4
1.6 Outline of chapter 1 ......................................................................................................... 4
Chapter 2......................................................................................................................................... 5
Literature review............................................................................................................................. 5
2.1 Theoretical Review................................................................................................................ 5
2.2 Review of previous projects .................................................................................................. 5
2.3 outline of chapter 2............................................................................................................... 5
Chapter 3......................................................................................................................................... 6
METHODOLOGY.......................................................................................................................... 6
3.1 Data Collection...................................................................................................................... 6
3.1.1 Primary source................................................................................................................ 6
3.1.2 Secondary source............................................................................................................ 6
3.2 Data presentation ................................................................................................................. 7
3.2.1 System model ................................................................................................................. 7
3.2.2 Architecture model ......................................................................................................... 7
3.2.3 UML................................................................................................................................. 7
3.3 outline of chapter 3............................................................................................................... 7
Chapter 4......................................................................................................................................... 8
8. 2
System Analysis and Design........................................................................................................... 8
4.1 Requirements ........................................................................................................................ 8
4.1.1 Functional Requirement ................................................................................................. 8
4.1.2 Non- Functional Requirement ........................................................................................ 8
4.2 Design.................................................................................................................................... 9
4.2.1 Use Case Diagram........................................................................................................... 9
4.2.2 Class Diagram................................................................................................................ 10
4.2.3 State Diagram............................................................................................................... 10
4.3 outline of chapter 4............................................................................................................. 11
Chapter 5....................................................................................................................................... 12
Implementation ............................................................................................................................. 12
5.1 System Architecture............................................................................................................ 12
5.2 Tool Integration................................................................................................................... 13
HTML (Hypertext Markup Language)........................................................................................ 13
PHP ............................................................................................................................................ 13
CSS............................................................................................................................................. 14
5.3 Major Modules.................................................................................................................... 14
5.4 Testing................................................................................................................................. 15
5.4.1 Testing Cases................................................................................................................. 15
5.5 outline of the chapter 5 ...................................................................................................... 16
Chapter 6....................................................................................................................................... 17
Conclusion and Summary............................................................................................................. 17
6.1 Summary ............................................................................................................................. 17
6.2Conclusion............................................................................................................................ 17
REFERENCES: ............................................................................................................................ 18
Appendixes A................................................................................................................................ 19
9. 3
Chapter 1
Introduction
1.1 Background Study
File tracking by using manual method is just time consuming and the user sometime cannot find
the file which is needed so to overcome the problems file tracking is developed. This project is
helpful in tracking files faster. The programming language used in the software is PHP and the
database is SQL Server. A person will save a file or a document or image in a specific location in
their Pc. When they return after 5 days searching for the file they had saved, they will be
forgotten in most cases but not all the time. In such cases, software would be useful which will
gives us the location of the file where we had saved. This software searches the file very fast
rather than searching it manually. A login page is provided for security purpose. To log in first
you need to register by entering the username and password which will act as your login Id and
password. This username and password must not be shared with any. Admin has the rights to
view all the files or go to that specific location of the file. But the specific user can view only the
file saved by them. As soon as they log into the system a home page will be displayed. This
consists of all the files saved by them. By right clicking on that specific row, two options will be
provided. First is to view, which will directly open the file. Second is the location, which will
provide you the location of the file. The user can also delete the file directly from the software. If
there are more than 100 files displayed in the home and if u want to search for a specific file, you
can either provide the exact name of the file or the name which nearly matches to the exact name
of the file. All the files which consist of the word you searched will be displayed. This will be
helpful for the user in selecting their file and proceeding with their work. This software isn’t time
consuming and is user friendly.
1.2 Problem Definition
Thepeople are very lazy. This system is more prone to errors and sometimes the approach to
various problems is unstructured. The technical systems contains the tools of latest trend i.e.
computers printers, fax, internet etc. The systems with this technology are very fast, accurate,
user-friendly and reliable.
1.3 Objectives
To reduce time, effort and errors in the existing manual system
To provide comfort to different users within the system in filling their work record
To provide quick up information regarding their job details etc.
10. 4
1.4 Scope
To get high speed in finding documents
to combines innovative technology skills with rich domain expertise
to provide software solution to distinct business requirements
1.5 Limitation
Software may fail to give proper output if there is more than one file with same name
If any problem occur in software then expert person is necessary to solve problem
1.6 Outline of chapter 1
File tracking by using manual method is just time consuming and the user sometime cannot find
the file which is needed so to overcome the problems file tracking is developed. It consists many
advantages as well as disadvantages. The objective of this project is to reduce the time to search
files, get quick information etc.
11. 5
Chapter 2
Literature review
This chapter explains and discusses about the related information to File Tracking System. File
Tracking System is an application developed for tracking and to locate the position of files.
2.1 Theoretical Review
Every day we make files and store in our electronic devices and there is numbers of files which
we store in our device. But when we need to search the respective file we have to remember the
location of the file. When we forget the location of stored file we will face big problem and to
search the file we have to open each and every file. We have to check manually the files and
more time is loosed. So this system is developed which helps the user to find the file faster and
easier. Which save the time of the user.
2.2 Review of previous projects
A Review of Project.net: PM Software With Built-In Social Media
written by: Ronda Bowen • edited by: Marlene Gundlach • updated: 6/4/2013
This article takes a hard look at Project.net and describes this full-service open source web-based
free software and whether it may be helpful to you in your situation.
Project.net is open source web-based software that allows users to increase their project's
performance and productivity while still managing to cut costs. This program has many features
that may be useful to project managers. These features include collaboration capabilities, issues
tracking, document management, project portfolio management, reports creation, a powerful
project dashboard, and the ability to closely monitor all project progress.
A Review of Project.net: File Tracking System for BPO company
www.freestudentprojects.com
This project is developed by using the Asp because this will be the advanced and easy to use the
client / server technology so developed this project on the JSP
Who have the BPO Company will be use this project. It will be fully based on the Client / Server
technology. Using this project we can maintain the all person details (Data Conversion
Operators, Data Management, Quality Controller, etc). This project also will be the very useful
for the BPO Company.
2.3 outline of chapter 2
In this chapter, we can see the reviews of previews projects, book and the review of this project.
12. 6
Chapter 3
METHODOLOGY
Methodology is the systematic, theoretical analysis of the methods applied to a field of study. It
comprises the theoretical analysis of the body of methods and principles associated with a branch of
knowledge.
3.1 Data Collection
Data collection is the process of gathering and measuring information on targeted variables in an
established systematic fashion, which then enables one to answer relevant questions and evaluate
outcomes.
3.1.1 Primary source
Primary data means original data that has been collected specially for the purpose to build my
“file tracking system “. That is the data collected from the original source first hand. Since the
data has not been published yet so the data is more reliable, authentic and objective. And the data
it includes is valid.
Questioner
I found that many of users are not aware about the system and they just use manual file tracking
process. There is least number of people who use this system. But those who used it have great
feedback to my system. So I start collecting the information about the users who are using
manual process for searching files and latest trend to search files,and collect the data in which I
found many users are not feeling easy to use manual process.
Interview
I ask the people about how they search their files. And from the interview I found that how
difficult for them to get the document which they want. So I collected the information from them
and included that information in my system as the features.
3.1.2 Secondary source
I collected the other secondary information like the analysis of system, system design from the
following sources:
Software Engineering by Ian Sommerville (Seventh Edition)
Software Engineering by Ian Sommerville (Ninth Edition)
13. 7
3.2 Data presentation
Data presentation is the method by which people summarize, organize and
communicate information using a variety of tools, such as diagrams, distribution charts,
histograms and graphs.
3.2.1 System model
A system model is the conceptual model as a result of system modeling that describes and
represents a system. A system comprises multiple views such as planning, requirement
(analysis), design, implementation, deployment, structure, behavior, input data, and output
data views. A system model is required to describe and represent all these multiple views.
3.2.2 Architecture model
An architectural model is a type of scale model - a physical representation of a structure - built to
study aspects of an architectural design or to communicate design ideas.
Depending on the purpose, models can be made from a variety of materials, including blocks,
paper, and wood, and at a variety of scales.
3.2.3 UML
Unified Modeling language (UML) is a standardized modeling language enabling developers to
specify, visualize, construct and document artifacts of a software system. Thus, UML makes
these artifacts scalable, secure and robust in execution. UML is an important aspect involved in
object-oriented software development. It uses graphic notation to create visual models of
software systems.
3.3 outline of chapter 3
In this chapter, I have include different methodologies for this project. This project include data
collection methods like primary source and secondary source; and different data presentation like
system model, architecture model and UML.
14. 8
Chapter 4
System Analysis and Design
Information Systems Analysis and Design-Development Life Cycle == Businesses and
organizations use various types of information systems to support the many processes needed to
carry out their business functions. Each of these information systems has a particular purpose or
focus, and each has a life of its own. This “life of its own” concept is called the systems
development life cycle or SDLC, and it includes the entire process of planning, building,
deploying, using, updating, and maintaining an information system. The development of a new
information system involves several different, but related activities. These activities, or phases,
usually include planning, analysis, design, implementation, and maintenance/support.
4.1 Requirements
Requirements analysis, also called requirements engineering, is the process of determining user
expectations for a new or modified product. These features, called requirements, must be
quantifiable, relevant and detailed. In software engineering, such requirements are often
called functional specifications. Requirements analysis is an important aspect of project
management.
4.1.1 Functional Requirement
Functional Requirements are statement of services that system should provide. It describes what
the system should do. They are helpful to describe the system function in detail. Here are some
of the functional requirements for our system, used by the users.
The users shall be able to search either of all initial set of database or select a subset of it.
The system shall provide the users to read the content and provide the feedback.
Modification in the system can only be done by the developer.
Every feedback is collected from the mail id of the user. Every user shall be allocated a unique
identifier and provide password.
4.1.2 Non- Functional Requirement
Non-functional Requirements are constraints on the services or functions offered by the system.
They are the constraint to the system as a whole. Some of the non-functional requirement of this
system is:-
Accurate information
System reliability
Usable information
System security
15. 9
4.2 Design
Design is the creation of a plan or convention for the construction of an object, system or
measurable human interaction (as in architectural blueprints, engineering drawings, business
processes, circuit diagrams, and sewing patterns). Design has different connotations in different
fields (see design disciplines below). In some cases, the direct construction of an object (as
in pottery, engineering, management, coding, and graphic design) is also considered to be design.
4.2.1 Use Case Diagram
As we know that every system invoices the different actors (users) to run the system or to
interact with the system. Use case diagram shows the graphical overview of the actors involves
in the system, different function perform by different actor, interaction with the system within
environment. File Tracking System involves two actors: Admin and user.
This system includes different function which should be performed within the system
environment. Some functions are: Login, create user, take input i.e., name of file, etc. User can
provide their review through login into the system. The use case diagram of this project is shown
below:
16. 10
4.2.2 Class Diagram
It is mostly used UML diagram which is blueprint to classes in a system. It shows the classes in a
system, attributes and functions of each class and the relationship between each class. In class
diagram, it contains three parts, name at the top, attributes in the middle and functions or
methods at the bottom.
In this system, it also contains classes. Due to presence of classes, classes are grouped
together to create a class diagram. Different relationships between classes are shown by different
types of arrows.
The Class diagram for the system is shown below:
4.2.3 State Diagram
A state diagram is a type of diagram used in computer science and related fields to describe the
behavior of systems. State diagrams require that the system described is composed of a finite
number of states. The State diagram for our project is shown below:
17. 11
Fig: state diagram of user
Log in add
update
response
Fig: state diagram for admin
Some of the symbols used in this state diagram indicate-
Initial pseudo state
Final state
Simple state
4.3 outline of chapter 4
This chapter includes system analysis and design of the system. It includes requirements for the
project and designs : use case design, class design and state design with diagrams.
user
Search item
it
Compare item
view
Provide feedback
Not found
compare
admin Add item
Update item
Response
feedback
18. 12
Chapter 5
Implementation
5.1 System Architecture
The methodology we have used to develop this software is “Waterfall Model”. Waterfall model
is one of a system development life cycle (SDLC) model. Users proceed to next phase if and
only if current phase is complete. Users are not allowed go back to previous phases if there are
any mistake so they named it waterfall model, just like the water is always fall down from the
waterfall and not flow upward.
In Royce's original waterfall model, the waterfall model originally consists of 7 phases
which is Requirement Specification, Design, Construction, Integration, Testing and Debugging,
Installation and Maintenance.
Fig: water flow model
19. 13
In system architecture data are represented in different models as system models and architecture
models. The models are shown below:
System model:
A system model is the conceptual model as a result of system modeling that describes
and represents a system.
Architecture model:
An architectural model is a type of scale model - a physical representation of a structure -
built to study aspects of an architectural design or to communicate design ideas.
UML:
UML is a standardized modeling language enabling developers to specify, visualize,
construct and document artifacts of a software system
5.2 Tool Integration
The tools that were used for the development of this system are:
MSWord 2010(Report writing)
Database server : MySQL
Programming language : PHP, CSS, Html
Photoshop (pictures)
Microsoft visio (forming charts)
HTML (Hypertext Markup Language)
Hypertext Markup Language (HTML) is the standard markup language for creating web
pages and web applications. With Cascading Style Sheets (CSS), and JavaScript, it forms a triad
of cornerstone technologies for the World Wide Web. Web browsers receive HTML documents
from a webserver or from local storage and render them into multimedia web pages. HTML
describes the structure of a web page semantically and originally included cues for the
appearance of the document.
PHP
PHP is a server-side scripting language designed primarily for web development but also
used as a general-purpose programming language. Originally created by Rasmus Lerdorf in
1994, the PHP reference implementation is now produced by The PHP Development Team. PHP
originally stood for Personal Home Page, but it now stands for the recursive acronym PHP:
Hypertext Preprocessor.
20. 14
CSS
Cascading Style Sheets (CSS) is a style sheet language used for describing
the presentation of a document written in a markup language. Although most often used to set
the visual style of web pages and user interfaces written in HTML and XHTML and is applicable
to rendering in speech, or on other media. Along with HTML and JavaScript, CSS is a
cornerstone technology used by most websites to create visually engaging webpages, user
interfaces for web applications, and user interfaces for many mobile applications.
5.3 Major Modules
Here the project Modules:-
Login Module
Administrator Module
Data Management Module
Data conversion operator Module
Quality control Module
Server or quality Analyst Module
Report Module
LOGIN MODULE:
This module is used for authentication purpose. Any registered employee who is trying to enter
his work area is checked for his id and password .If he is authorized then he would be allowed to
enter into his work area.
ADMINISTRATOR MODULE:
This module helps the administrator to get the files from the client and register it into the server
database. Depending on the information given by the data management group the data or files
would be stored in the system. If the client wants to know the status of their files then they can
get it from the administrator. The Administrator would get the requested data from quality
analyst’s database.
DATA MANAGEMNT MODULE:
This module helps the data management group to assign the id and password for the employees
depending on their domain. It also helps the data management group to allocate the files their
domain.
DATA CONVERSION OPERATOR MODULE:
The employees authenticate themselves and get into the work area. This module helps the DC
operator to view the files that have been allocating to him. Through this module the employee
21. 15
can download the files from the server and work on it. Once the DC operator has finished
processing the file, it is sent to quality controller.
QUALITY ANALYST MODULE:
This module helps the QA to track the current status of the file on which a DC operator is
working on. Immediately after the file is downloaded by the employee, information regarding the
file with the time that should be taken to process that file is received by the quality analyst. If the
file is not completed by the employee within the allocated time, then the quality analyst would
send a message to the respective employee asking him for the reason for the delay of the process.
If the process on the file is completed within the allotted time then a message would be received
regarding this by the quality analyst. Quality analyst can just maintain theses information, he is
not permitted to view or download a file from the database.
QUALITY CONTROLLER MODULE: After the process on the file is completed it is received
by the quality controller. He checks the file for quality and if found satisfactory then sends it
back to the administrator. But if the quality of the processed file is not found to be satisfactory
then that file is sent to the same place where the administrator had stored after registering the
file.
5.4 Testing
In system testing a common view is to eliminate program errors. This is extremely difficult and
time consuming. Since designers cannot prove 100% accuracy. A successful test, then, is one
that fined errors
.
5.4.1 Testing Cases
Test case ID Test case Expected result Actual result
1 Entry the valid date
in user Id and user
password and click
on login button on
login page.
Login page should
be display.
Login page opened.
2 Entry the invalid
date in user Id and
user password and
click on login
button on login
page.
Error message
should be display.
Error message is
display.
3 Search the file with
the file name.
File is found. Mission complete.
22. 16
4 Mistake file is
searched or may be
spelling mistake.
Error message
should be
displayed.
Error message is
display.
5 File is searched but
more than one file
with same name are
stored.
File is displayed on
the screen.
Many files are
displayed on the
screen.
5.5 outline of the chapter 5
Chapter 5 describe about the implementation and testing of the system. This chapter describe
about the system architecture, tools used for the development of the system, modules are also
described and the result of the test are also includes.
23. 17
Chapter 6
Conclusion and Summary
6.1 Summary
File tracking system is developed in place of manual method to decrease time consuming and the
user sometime cannot find the file which is needed so to overcome the problems file tracking is
developed. This project is helpful in tracking files faster. The programming language used in the
software is PHP and the database is SQL Server. A person will save a file or a document or
image in a specific location in their Pc. When they return after 5 days searching for the file they
had saved, they will be forgotten in most cases but not all the time. In such cases, software would
be useful which will gives us the location of the file where we had saved. This software searches
the file very fast rather than searching it manually. A login page is provided for security purpose.
To log in first you need to register by entering the username and password which will act as your
login Id and password. This username and password must not be shared with any. Admin has the
rights to view all the files or go to that specific location of the file. But the specific user can view
only the file saved by them. As soon as they log into the system a home page will be displayed.
This consists of all the files saved by them. By right clicking on that specific row, two options
will be provided. First is to view, which will directly open the file. Second is the location, which
will provide you the location of the file. The user can also delete the file directly from the
software. If there are more than 100 files displayed in the home and if u want to search for a
specific file, you can either provide the exact name of the file or the name which nearly matches
to the exact name of the file. All the files which consist of the word you searched will be
displayed. This will be helpful for the user in selecting their file and proceeding with their work.
This software isn’t time consuming and is user friendly.
In this project I have include the system design, architecture design modules of the file tracking
system which verify the working system of the system. I have questioned many users about this
system and manual system and take the feedback from then and tries to make the module which
the user want. This documentation includes different reviews of projects and the book. It
includes the figures of UML diagrams and other diagrams. In this documentation I have include
the testing cases which shows the system is not 100% errorless.
6.2Conclusion
I developed this project by using the PHP, HTML and CSS because this will be the advanced and
easy to use the client / server technology so developed this project on the JSP
This project will be used by any laptop users especially for those who have to work on different
files daily like students. It will be fully based on the Client / Server technology. Using this
project I can maintain the all person details (Data Conversion Operators, Data Management,
Quality Controller, etc.).
24. 18
REFERENCES:
Djbfts.nic.in - File Tracking System (FTS). (n.d.). Retrieved February 13, 2017,
from
http://www.bing.com/cr?IG=3A7F04D6D42C460AA2A9CD7E407C701D&CID=1061A03
03E896B87334FAA183FB86A37&rd=1&h=lkK-
lgFA5_3ne7u2DTW49nv9yJkEllDfornVuDoZWag&v=1&r=http%3a%2f%2fdjbfts.nic.in%
2f&p=DevEx,5035.1
File Tracking System Login - nic.in. (n.d.). Retrieved February 14, 2017,
from
http://www.bing.com/cr?IG=5586481D598D4F4EA32BE275E8ED618E&CID=211FF
26D42396DEC15E1F84443086CE7&rd=1&h=lvhQaanSzZhGRTgFSF62yVOlRZKys
BbE1O_pcymhyL4&v=1&r=http%3a%2f%2fcg.nic.in%2ffms%2f&p=DevEx,5043.1
File Tracking and Tracing. (n.d.). Retrieved February 14, 2017, from
http://www.filetrackingclient.com/
25. 19
Appendixes A
Login page:
<form name="form1" method="post" action="system.php">
<div align="center"><font size="2">Username</font><br>
<input type="text" name="user"><br>
<font size="2">Password</font><br>
<input type="password" name="pass">
<br><br>
<input type="submit" name="Submit" value=" Login ">
</div>
</form>
<div align="center"></div>
Logout page:
<?php
$time = time();
// Say that user is logged out
$loggedout = true;
// If there is a cookie
if (isset($_COOKIE['cookie_info'])) {
// Delete the cookie
setcookie ("cookie_info", "", $time - 3600);
// Use Connect Script
include("connect.php");
// Include the validation of user file
include("validateuser.php");
// If user and password are correct
if (validateuser() == true) {
// Use cookie and Extract the cookie data (Username and Password)
$cookie_info = explode("-", $_COOKIE['cookie_info']);
$namecookie = $cookie_info[0];
$passcookie = $cookie_info[1];
// Get details of user from Database and put them in variables
$query = mysql_query("SELECT * FROM user WHERE username = '$namecookie'");
$name= mysql_result($query,0,0);
//The user is not logged out yet
$loggedout = false;
}
// If user and password are not correct print error message
else {
26. 20
echo "Incorrect username/password";
exit;
}
}
?>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<title>Logout</title>
</head>
<body>
<div align="center"><br><br><br><br><br>
<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000"
codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,
0,0,0" width="80" height="58">
<param name=movie value="images/Movie2.swf">
<param name=quality value=high>
<embed src="images/Movie2.swf" quality=high
pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=
ShockwaveFlash" type="application/x-shockwave-flash" width="80" height="58">
</embed>
</object><br>
<br>
<?php
// If user is logged out then print message
if ($loggedout == false) {
echo " <b>You are now logged out. <br><br><a href='index2.php'>Click here to log in
again.</a><br><br> or<br><br>";?><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-
444553540000"
codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,
0,0,0" width="100" height="22">
<param name=movie value="images/close.swf">
<param name=quality value=high>
<embed src="images/close.swf" quality=high
pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=
ShockwaveFlash" type="application/x-shockwave-flash" width="100" height="22">
</embed>
</object><?php
}
?>
27. 21
</div>
</html>
User validation:
<?php
function validateuser() {
// Use cookie information and validate cookie
// Use cookie and Extract the cookie data (Username and Password)
// 'cookie_info' is the cookie name you assigned it when making the cookie
$cookie_info = explode("-", $_COOKIE['cookie_info']);
$namecookie = $cookie_info[0];
$passcookie = $cookie_info[1];
// Check if username exists
$usernamelogin = mysql_num_rows(mysql_query("SELECT * FROM user WHERE username
= '$namecookie'"));
// If username exists
if ($usernamelogin == 1) {
// Check if password matches the database password
$passwordlogin = mysql_num_rows(mysql_query("SELECT * FROM user WHERE
username = '$namecookie' AND password = '$passcookie'"));
// If password is correct
if ($passwordlogin == 1) {
// User is now logged in
return (true);
}
// If the password is incorrect
else {
return(false);
}
}
// If the username was not found in database
else {
return(false);
}
}
?>
Connection with Database :
<?php
28. 22
$dbh=mysql_connect ("localhost", "root", "dah7717") or die ('I cannot connect to the database
because: ' . mysql_error());
mysql_select_db ("fts");
?>
File set:
<script language="JavaScript">
<!--
function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
}
function MM_preloadImages() { //v3.0
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
}
function MM_findObj(n, d) { //v4.0
var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
if(!x && document.getElementById) x=document.getElementById(n); return x;
}
function MM_swapImage() { //v3.0
var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new Array; for(i=0;i<(a.length-
2);i+=3)
if ((x=MM_findObj(a[i]))!=null){document.MM_sr[j++]=x; if(!x.oSrc) x.oSrc=x.src;
x.src=a[i+2];}
}
//-->
</script>
<body
onLoad="MM_preloadImages('images/createNewDown.PNG','images/updatelocationDown.PN
G','images/deletefileDown.PNG')" >
<table width="758" border="0" cellpadding="0" cellspacing="0" >
<tr>
<td width="2" height="19"></td>
<td valign="top" colspan="5"><a href="system_files.php"
onMouseOut="MM_swapImgRestore()"
onMouseOver="MM_swapImage('Image2','','images/updatelocationDown.PNG',1)"><img
57. 51
if (!$username) {
echo "<center><b>Please Enter Your Username <br><br><a
href='index2.php'>Back</a>"; exit;
}
if (!$password) {
echo "<center><b>Please Enter Your Password <br><br><a
href='index2.php'>Back</a>"; exit;
}
// Use Connect Script
include("connect.php");
// MD5 Username and Password
//$username = MD5($username);
//$password = MD5($password);
// Check if username exists. If not then say no such username.
$issuchusername = mysql_query("SELECT * FROM user WHERE username =
'$username'");
$usernamelogin = mysql_num_rows($issuchusername);
// If username exists
if ($usernamelogin == 1) {
$issuchpassword = mysql_query("SELECT * FROM user WHERE username =
'$username' AND password = '$password'");
$passwordlogin = mysql_num_rows($issuchpassword);
// If password is correct
if ($passwordlogin == 1) {
$time = time();
$cookie_data = $username.'-'.$password;
if(setcookie ("cookie_info",$cookie_data, $time+3600)==TRUE) {
}
else {
echo "You computer does not support cookies. <BR> To view other pages after
logged in you need to have cookies enabled.<BR>";
}
58. 52
}
else {
echo "<center><b>Incorrect Username/Password <br><br><a
href='index2.php'>Back</a>";
exit;
}
}
else {
echo "<center><b>Incorrect Username/Password <br><br><a
href='index2.php'>Back</a>";
exit;
}
}
// End if no cookie present
?>
<html>
<head>
<title>..::: File-Track System :::.. by ReVo</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<script language="JavaScript">
<!--
function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
}
function MM_preloadImages() { //v3.0
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
}
function MM_findObj(n, d) { //v4.0
var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
if(!x && document.getElementById) x=document.getElementById(n); return x;
}
61. 55
<td width="2"></td>
<td valign="top" colspan="2">
<div align="center"><a href="?page=help" onMouseOut="MM_swapImgRestore()"
onMouseOver="MM_swapImage('Image14','','images/help_down.PNG',1)"><img
name="Image14" border="0" src="images/help_down.PNG" width="150" height="19"
alt="Need Help?"></a><br>
<a href="?page=help" onMouseOut="MM_swapImgRestore()"
onMouseOver="MM_swapImage('helpicon','','images/foldericondownhelp.PNG',1)"><img
name="helpicon" border="0" src="images/foldericonuphelp.PNG" width="68" height="54"
alt="Need Help?"></a></div>
</td>
<td width="1"></td>
<td></td>
</tr>
<tr>
<td height="39"></td>
<td valign="top" colspan="12">
<div align="center">
<hr>
<?php
switch($_GET['page']) {
case "files":
//echo "Files";
include ('files.php');
break;
case "search":
//echo "Search";
include ('searchbynumber.php');
break;
case "location":
//echo "Locations";
include ('locations.php');
break;
case "person":
//echo "Persons";
include ('persons.php');
break;
case "help":
//echo "Help";
62. 56
include ('help.php');
break;
default:
//echo "Help Default";
include ('help.php');
break;
}
?>
</div>
</td>
<td></td>
</tr>
<tr>
<td height="1"></td>
<td width="79"></td>
<td width="71"></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td width="62"></td>
<td width="88"></td>
<td></td>
<td></td>
</tr>
</table>
</div>
</body>
</html>
System location:
<?php
// If there is no cookie presesnt
if (!isset($_COOKIE['cookie_info'])) {
// Variables that data come from the form
$username = $_POST["user"];
63. 57
$password = $_POST["pass"];
// Check if username and password where submitted
if (!$username) {
echo "<center><b>Please Enter Your Username <br><br><a
href='index2.php'>Back</a>"; exit;
}
if (!$password) {
echo "<center><b>Please Enter Your Password <br><br><a
href='index2.php'>Back</a>"; exit;
}
// Use Connect Script
include("connect.php");
// MD5 Username and Password
//$username = MD5($username);
//$password = MD5($password);
// Check if username exists. If not then say no such username.
$issuchusername = mysql_query("SELECT * FROM user WHERE username =
'$username'");
$usernamelogin = mysql_num_rows($issuchusername);
// If username exists
if ($usernamelogin == 1) {
$issuchpassword = mysql_query("SELECT * FROM user WHERE username =
'$username' AND password = '$password'");
$passwordlogin = mysql_num_rows($issuchpassword);
// If password is correct
if ($passwordlogin == 1) {
$time = time();
$cookie_data = $username.'-'.$password;
if(setcookie ("cookie_info",$cookie_data, $time+3600)==TRUE) {
}
else {
64. 58
echo "You computer does not support cookies. <BR> To view other pages after
logged in you need to have cookies enabled.<BR>";
}
}
else {
echo "<center><b>Incorrect Username/Password <br><br><a
href='index2.php'>Back</a>";
exit;
}
}
else {
echo "<center><b>Incorrect Username/Password <br><br><a
href='index2.php'>Back</a>";
exit;
}
}
// End if no cookie present
?>
<html>
<head>
<title>..::: File-Track System :::.. by ReVo</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<script language="JavaScript">
<!--
function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
}
function MM_preloadImages() { //v3.0
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
}
function MM_findObj(n, d) { //v4.0
var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];