SlideShare a Scribd company logo
1 of 4
Download to read offline
Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97
www.ijera.com 94|P a g e
Introduction to Mail Management System
Suvarnsing G. Bhable1
, Jaypalsing N. Kayte
(Department of Computer Science & Information Technology, Dr Babasaheb Ambedkar Marathwada
University Campus, Aurangabad)
ABSTRACT
Developing different techniques to overcome this problem and protect the consumer, which planted in the hearts
of trust people and encouraged them to purchase via the internet. At first you must know what is the main reason
for the work of the filtration email the mail service is fast and easy way to exchange messages are singing from
the use of traditional mail, there are a large number from of services in the internet requires that you have one
email sometimes one of us would like to cancel his participation in one of the sites because of the large number
of incoming messages to him from the site does not know and have for a way unsubscribe to get rid of these
messages, or would like one of us that some of the messages is prohibited from specific people or locations for
some of these problems has the following solution is the work of a filter to any e-mail and work ban for
unwanted messages application spam filtering as a last resort, you can set up your own spam blocker with your
email application's built-in filter capability Email filtering is the processing of email to organize it according to
specified criteria.
Keywords - WWW, IA, Internet, SI, Java, SQL
I. INTRODUCTION
Internet has become one of the largest properties
important in our daily lives. They provide a way to
enter the vast amount of information, and put at our
disposal. More importantly, they have become a very
important role to play in the greatest inventions of the
twentieth century is e-commerce . Besides the
possibility of developing internet unlimited amounts
of information in our hands, there is the possibility of
buying products and services without leaving the
house, E-commerce means that we can do buy books,
computers, cards, travel, cars, and the other at any
moment. Although this idea was encouraging at first,
but they spread was relatively slow because of public
concern, keeping banking information and credit card
data in an unknown location is a big risk. Although
this risk is limited, but it still exists. This danger
much to do with the fact that the credit card
information sent through unencrypted text, meaning
that it can be stolen and used these data to fraud. we
have been developing different techniques to
overcome this problem and protect the consumer,
which planted in the hearts of trust people and
encouraged them to purchase via the internet. At first
you must know what is the main reason for the work
of the filtration email the mail service is fast and
easy way to exchange messages are singing from the
use of traditional mail, there are a large number from
of services in the internet requires that you have one
email sometimes one of us would like to cancel his
participation in one of the sites because of the large
number of incoming messages to him from the site
does not know and have for a way unsubscribe to get
rid of these messages, or would like one of us that
some of the messages is prohibited from specific
people or locations for some of these problems has
the following solution is the work of a filter to any e-
mail and work ban for unwanted messages
application spam filtering as a last resort, you can set
up your own spam blocker with your email
application's built-in filter capability Email filtering
is the processing of email to organize it according to
specified criteria. Most often this refers to the
automatic processing of incoming messages, in
addition to anti-spam techniques [ 1 ]
ο‚· An electronic message sent from one computer
to another
ο‚· Email saves money and time compared to regular
mail
ο‚· An email message takes seconds to reach
destination
ο‚· Also used to search for a job or to print
A message in this system can be used more than
one server in the same program after changing the
server name and port of receipt and transmission also
shop online Email is a very popular way of
communicating with others over the internet. An
application that allows users to send, receive, and
read email is called an email client after the presence
of all threats to internet users and attempts to steal e-
mail and steal money and fraud emerged the need to
protect e-mail and browsing security through the use
of protocol matching the security of SSL and check
the real user of this email by having a digital
certificate and its validity and the presence of the
electronic signature and the company donor and
RESEARCH ARTICLE OPEN ACCESS
Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97
www.ijera.com 95|P a g e
details user and also user can verify the server is the
real caller through the digital certificate of the server
is done through several processes of authorization
and verification known as hand-shake and note when
using the site security appears lock yellow in the side
of the page indicates that this site uses protocol SSL
to browse security in this the system has worked to
use this protocol works with the email of the inability
of unauthorized people from stealing or tampering
and tampering with messages and also works encrypt
the message and password and make sure the validity
of the server and the user and also for the system the
ability to use more than one server with a change
only the port number and has the ability to search for
messages by either topic or postal address and has the
ability to print the contents of the message and block
spam and unwanted by putting your email in the list
of filter.
II. WORLD WIDE WEB
The World Wide Web (abbreviated as WWW or
W3, and commonly known as the Web) is a system
of interlinked hypertext documents accessed via the
internet. With a web browser, one can view web
pages that may contain text, images, videos, and
other multimedia, and navigate between them via
hyperlinks [3].
A. Internet Architecture
It is a meta-network a constantly changing
collection of thousands of individual networks
intercommunicating with a common protocol. The
internet's architecture is described in its name, a short
from of the compound word "inter-networking". This
architecture is based in the very specification of the
standard TCP/IP protocol, designed to connect any
two networks which may be very different in internal
hardware, software, and technical design. Once two
networks are interconnected, communication with
TCP/IP is enabled end-to-end, so that any node on
the internet has the near magical ability to
communicate with any other no matter where they
are. This openness of design has enabled the internet
architecture to grow to a global scale. in practice, the
internet technical architecture looks a bit like a multi-
dimensional river system, with small tributaries
feeding medium-sized streams feeding large rivers.
B. Internet Services
1- Dial-up (including ISDN)
5- Wi-Fi hotspots
6- Wireless Internet service provider - sometimes
simply called 'microwave'
7- Mobile broadband over terrestrial mobile phone
networks using CSD, GPRS, EDGE, EVDO,
HSPA, etc. either through mobile phones or PCs
8- Satellite Internet
14- Wireless mesh network - mostly military and one
laptop per child use
15- Packet radio
16- Free-space optical communication
C. Internet Used
1- Transfer speed and pass information, and ease of
transport and information and photos e-mail.
2- Internet personal mobile briefcase with the user;
internet is a library for each person.
3- Multimedia used in the global network to
cover the same subject; whether in writing or
picture or sound.
4- Internet shorten the time and effort and money,
providing as many minimal effort, there are sites
that collect thousands of folders, cut short the
effort to read and search through the search
services.
5- Easily search for any word or image information.
6- Use the properties of paying bills and buying
through the Internet and dealing with the banks
through which saving time, effort and money,
and encourages the banks clients to use the
internet to ease the pressure on them.
7- Make inventions is growing and branching out
because of the ease the convergence of scientists
and learn about their joint efforts, which
increases the area of creativity, Innovation and
choice.
8- Potential to provide us with extensive experience
in expert systems in medicine and management,
manufacturing, finance, marketing, education,
media and entertainment etc
9- Online shopping - online shopping, can buy and
sell all kinds of products using credit cards such
as Visa and MasterCard, there are many famous
sites such as Amazon.com and ebay.com auction
site etc.
D. Advantage and Disadvantage:
Advantages
1– Availability of mainly free information
2– Low cost of initial connection
3– Reduces the costs of divulgation
4– The same protocol of communication can be
used for all the services
5– Facilitates rapid interactive communication
6– Facilitates the exchange of huge volumes of data
7– No barriers to divulgation
8– Facilitates access to different sources of
information, which is continuously up-dated
9– Facilitates management of companies
information system
10– it is accessible from anywhere
11– It has become the global media
Disadvantages
1– Danger of overload and excess information
Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97
www.ijera.com 96|P a g e
2– It requires an efficient information search
strategy
3– The search can be slow
4– It is difficult to filter and prioritize information
5– No guarantee of finding what one is looking for
6– There is a lot of apparently unconnected
information
7– Net becomes overloaded because of large
number of users
8– No regulation
9– No quality control over available data
10– The ease with which information can be
constantly up-dated can cause problems of
referencing.
III. PROBLEM STATEMENT
There is a range of problems that threaten the
internet, especially email, including spam and hacker
threat and for this reason must be the protection of e-
mail to the attributes of the sensitive personal
information.
A. Problem Defined
Email is prevalent in all aspects of our life today,
but in many ways it is still a flawed system. the most
notable example is the problem of spam, and there is
a wide body of research on detecting, filtering, and
removing spam. there is also research dealing with
email security, and how to make that security easier
to use .[6]
B. Feasibility Study
In any project feasibility analysis stage is very
important. the feasibility study is to propose a system
according to their influence, the ability of portability,
the process to meet user needs and the efficient use of
resources. any project may face a scarcity of time,
resources or manpower. Important result of the
preliminary inquiry is to determine whether the
system is required is not feasible or not. the key
considerations involved in the analysis of economic
and technical feasibility, operational, economic, and
after studying the project found that this project fits
with the requirements of the user to email filtering
and encryption of messages when the transmitter and
check the server and the possible use of more than
mail in this program [7].
C. Technical
Technical feasibility is the most important of all
types of feasibility analysis. Technical feasibility
deals with hardware as well as software
requirements. An idea from the outline design to
system requirements in terms of inputs outputs, files
and procedures is drawn and the type of hardware,
software, and the methods required for running the
systems are analyzed hence the system is technically
feasible. [ 8 ]
D. Operational
The purpose of the operational feasibility study
is to determine whether the new system would be
used if it is developed and implemented will there be
resistance from users that will undermine the possible
application benefits from the outputs of the meeting
that was held with the system users. After analyzing
the requirements for our project we had come to the
conclusion that our project users require the
following requirements. [9]
E. Sender's Requirement
1- Needs a more user interface.
2- More and more security.
3- Security feature which are controlled by the user.
4- Complexity of the security.
5- The account bound with a separate username and
password for every user.
6- Needs an algorithm which can achieve integrity
and authentication.
F. Receiver's requirement
1- Access to the POP3 server of the mail server
from where the mails are going to be extracted.
2- Needs interface.
3- Needs a security feature which could make the
cryptanalysis more secure.
G. Software Requirements
Tool used: eagetmail_1, HTML, JSP
Front end: Java.
Windows 2000 professional operating system.
Windows XP, windows vista and windows 7.
Internet explorer 5.0 and Netscape navigator.
H. Hard Ware Requirements
Pentium IV Processor
512 MB RAM.
20GB Hard Disk space.
Ethernet card with an internet and internet zone.
IV. CONCLUSION
The need for urgent and day to day email we
must protect email from theft, including contains
personal information and sensitive private emails are
used for companies and businessmen, statesmen and
security is also a means closing security gaps that are
used by hackers to enter the computer through email
for this reason, used the protocol SSL to protect and
verify the on the server and the user on the other
work in addition to filtering email to any strange or
annoying email messages from the forum or
advertising and the other to not appear in the inbox .
REFERENCES
[1] Bowman, M., Debray, S. K., and Peterson,
L. L. 1993. Reasoning about naming
systems. .
Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97
www.ijera.com 97|P a g e
[2] "How Pervasive is ISP Outbound Email
Filtering?".
http://ask.slashdot.org/story/08/01/31/2130251
/How-Pervasive-is-ISP-Outbound-Email-
Filtering. Retrieved 15 September 2011.
[3] R.T. Morris, 1985. A Weakness in the
4.2BSD Unix TCP/IP Software. Computing
Science Technical Report No. 117, AT&T
Bell Laboratories, Murray Hill, New Jersey.
[4] "World Wide Web Consortium".
http://www.w3.org/.
[5] "How Broadband Works", Chris Woodford,
Explain that Stuff, 20 August 2008.
Retrieved 19 January
[6] Principles of Information Security ,Fourth
Edition Michael E .Whitman and Herbert J.
Mattord Vice
http://www.slgmexico.com/index-4.html
[7] Bentley, L & Whitten, J (2007). System
Analysis & Design for the Global
Enterprise. 7th ed. (p. 417).
[8] http://en.wikipedia.org/wiki/Feasibility_stud
y
[9] Harper, Douglas (November 2001). "Online
Etymology Dictionary – Economy".
http://www.etymonline.com/index.php?term
=economy. Retrieved October 27,

More Related Content

What's hot

Aspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In IndiaAspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In IndiaShiva Shankara
Β 
The Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingThe Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingCSCJournals
Β 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
Β 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
Β 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business pptJason Roy
Β 
TID Chapter 2 Introduction To Internet
TID Chapter 2 Introduction To InternetTID Chapter 2 Introduction To Internet
TID Chapter 2 Introduction To InternetWanBK Leo
Β 
instant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fiinstant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fiINFOGAIN PUBLICATION
Β 
The internet
The internetThe internet
The internetAniqa Zai
Β 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final pptpriyanka Garg
Β 
The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...ijcsit
Β 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
Β 
Course_Template
Course_TemplateCourse_Template
Course_TemplateSri Ram
Β 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
Β 
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights premarhea
Β 

What's hot (20)

Aspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In IndiaAspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In India
Β 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
Β 
The Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingThe Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-Banking
Β 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
Β 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Β 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
Β 
TID Chapter 2 Introduction To Internet
TID Chapter 2 Introduction To InternetTID Chapter 2 Introduction To Internet
TID Chapter 2 Introduction To Internet
Β 
instant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fiinstant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fi
Β 
The internet
The internetThe internet
The internet
Β 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
Β 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
Β 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
Β 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
Β 
The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...
Β 
internet ,
internet ,internet ,
internet ,
Β 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
Β 
Course_Template
Course_TemplateCourse_Template
Course_Template
Β 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Β 
Notacd051
Notacd051Notacd051
Notacd051
Β 
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights
Β 

Viewers also liked

E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingIJERA Editor
Β 
Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...
Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...
Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...IJERA Editor
Β 
A Study on Relationship between Employee Satisfaction and Its Determinants
A Study on Relationship between Employee Satisfaction and Its DeterminantsA Study on Relationship between Employee Satisfaction and Its Determinants
A Study on Relationship between Employee Satisfaction and Its DeterminantsIJERA Editor
Β 
Renewable Energy Based Floating Power Generator (Rivers and Canals)
Renewable Energy Based Floating Power Generator (Rivers and Canals)Renewable Energy Based Floating Power Generator (Rivers and Canals)
Renewable Energy Based Floating Power Generator (Rivers and Canals)IJERA Editor
Β 
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...IJERA Editor
Β 
Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...
Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...
Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...IJERA Editor
Β 
Modelling Framework of a Neural Object Recognition
Modelling Framework of a Neural Object RecognitionModelling Framework of a Neural Object Recognition
Modelling Framework of a Neural Object RecognitionIJERA Editor
Β 
Development of 30 Watt Solar Bag with Wireless Power Transmission Unit
Development of 30 Watt Solar Bag with Wireless Power Transmission UnitDevelopment of 30 Watt Solar Bag with Wireless Power Transmission Unit
Development of 30 Watt Solar Bag with Wireless Power Transmission UnitIJERA Editor
Β 
Investigation on Bridges Connection to Network Carrefour in Existing Roads in...
Investigation on Bridges Connection to Network Carrefour in Existing Roads in...Investigation on Bridges Connection to Network Carrefour in Existing Roads in...
Investigation on Bridges Connection to Network Carrefour in Existing Roads in...IJERA Editor
Β 
A Method for Probabilistic Stability Analysis of Earth Dams
A Method for Probabilistic Stability Analysis of Earth DamsA Method for Probabilistic Stability Analysis of Earth Dams
A Method for Probabilistic Stability Analysis of Earth DamsIJERA Editor
Β 
Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...
Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...
Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...IJERA Editor
Β 
A Computational Investigation of Flow Structure Within a Sinuous Duct
A Computational Investigation of Flow Structure Within a Sinuous DuctA Computational Investigation of Flow Structure Within a Sinuous Duct
A Computational Investigation of Flow Structure Within a Sinuous DuctIJERA Editor
Β 
Optimization of Test Pattern Using Genetic Algorithm for Testing SRAM
Optimization of Test Pattern Using Genetic Algorithm for Testing SRAMOptimization of Test Pattern Using Genetic Algorithm for Testing SRAM
Optimization of Test Pattern Using Genetic Algorithm for Testing SRAMIJERA Editor
Β 
Application of Rapid Bioassay Method for Assessing Its Water Purification by ...
Application of Rapid Bioassay Method for Assessing Its Water Purification by ...Application of Rapid Bioassay Method for Assessing Its Water Purification by ...
Application of Rapid Bioassay Method for Assessing Its Water Purification by ...IJERA Editor
Β 
Investigations in Effective Viscosity of Fluid in a Porous Medium
Investigations in Effective Viscosity of Fluid in a Porous MediumInvestigations in Effective Viscosity of Fluid in a Porous Medium
Investigations in Effective Viscosity of Fluid in a Porous MediumIJERA Editor
Β 
Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...
Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...
Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...IJERA Editor
Β 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
Β 
Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)
Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)
Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)IJERA Editor
Β 
Role of the Biochemistry Labs in Promoting the Health Care Services for the I...
Role of the Biochemistry Labs in Promoting the Health Care Services for the I...Role of the Biochemistry Labs in Promoting the Health Care Services for the I...
Role of the Biochemistry Labs in Promoting the Health Care Services for the I...IJERA Editor
Β 

Viewers also liked (19)

E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and Prototyping
Β 
Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...
Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...
Analytical and Experimental Studieson Fracture Behaviour of Foundry Sand Conc...
Β 
A Study on Relationship between Employee Satisfaction and Its Determinants
A Study on Relationship between Employee Satisfaction and Its DeterminantsA Study on Relationship between Employee Satisfaction and Its Determinants
A Study on Relationship between Employee Satisfaction and Its Determinants
Β 
Renewable Energy Based Floating Power Generator (Rivers and Canals)
Renewable Energy Based Floating Power Generator (Rivers and Canals)Renewable Energy Based Floating Power Generator (Rivers and Canals)
Renewable Energy Based Floating Power Generator (Rivers and Canals)
Β 
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Seasonal Variation of Groundwater Quality in Parts of Y.S.R and Anantapur Dis...
Β 
Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...
Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...
Seismic Analysis and Optimization of RC Elevated Water Tank Using Various Sta...
Β 
Modelling Framework of a Neural Object Recognition
Modelling Framework of a Neural Object RecognitionModelling Framework of a Neural Object Recognition
Modelling Framework of a Neural Object Recognition
Β 
Development of 30 Watt Solar Bag with Wireless Power Transmission Unit
Development of 30 Watt Solar Bag with Wireless Power Transmission UnitDevelopment of 30 Watt Solar Bag with Wireless Power Transmission Unit
Development of 30 Watt Solar Bag with Wireless Power Transmission Unit
Β 
Investigation on Bridges Connection to Network Carrefour in Existing Roads in...
Investigation on Bridges Connection to Network Carrefour in Existing Roads in...Investigation on Bridges Connection to Network Carrefour in Existing Roads in...
Investigation on Bridges Connection to Network Carrefour in Existing Roads in...
Β 
A Method for Probabilistic Stability Analysis of Earth Dams
A Method for Probabilistic Stability Analysis of Earth DamsA Method for Probabilistic Stability Analysis of Earth Dams
A Method for Probabilistic Stability Analysis of Earth Dams
Β 
Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...
Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...
Evaluation of Energy Contribution for Additional Installed Turbine Flow in Hy...
Β 
A Computational Investigation of Flow Structure Within a Sinuous Duct
A Computational Investigation of Flow Structure Within a Sinuous DuctA Computational Investigation of Flow Structure Within a Sinuous Duct
A Computational Investigation of Flow Structure Within a Sinuous Duct
Β 
Optimization of Test Pattern Using Genetic Algorithm for Testing SRAM
Optimization of Test Pattern Using Genetic Algorithm for Testing SRAMOptimization of Test Pattern Using Genetic Algorithm for Testing SRAM
Optimization of Test Pattern Using Genetic Algorithm for Testing SRAM
Β 
Application of Rapid Bioassay Method for Assessing Its Water Purification by ...
Application of Rapid Bioassay Method for Assessing Its Water Purification by ...Application of Rapid Bioassay Method for Assessing Its Water Purification by ...
Application of Rapid Bioassay Method for Assessing Its Water Purification by ...
Β 
Investigations in Effective Viscosity of Fluid in a Porous Medium
Investigations in Effective Viscosity of Fluid in a Porous MediumInvestigations in Effective Viscosity of Fluid in a Porous Medium
Investigations in Effective Viscosity of Fluid in a Porous Medium
Β 
Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...
Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...
Seismic Vulnerability and Mitigation on Non-Engineered Traditional Buildings ...
Β 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
Β 
Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)
Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)
Analysis of Seed Proteins in Groundnut Cultivars (Arachis hypogaea L.)
Β 
Role of the Biochemistry Labs in Promoting the Health Care Services for the I...
Role of the Biochemistry Labs in Promoting the Health Care Services for the I...Role of the Biochemistry Labs in Promoting the Health Care Services for the I...
Role of the Biochemistry Labs in Promoting the Health Care Services for the I...
Β 

Similar to Introduction to Mail Management System

VOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMVOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMIRJET Journal
Β 
Voice Based Email for Blind
Voice Based Email for BlindVoice Based Email for Blind
Voice Based Email for BlindIRJET Journal
Β 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerPutra Wanda
Β 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
Β 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEUsama ahmad
Β 
The global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxThe global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxcherry686017
Β 
Communication skills ppt
Communication skills pptCommunication skills ppt
Communication skills pptJason Roy
Β 
How To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. ExamHow To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. ExamCrystal Carter
Β 
contemporary application of information technology
contemporary application of information technologycontemporary application of information technology
contemporary application of information technologyPANKHURI JAIN
Β 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
Β 
IRJET- Voice based Email Application for Blind People
IRJET-  	  Voice based Email Application for Blind PeopleIRJET-  	  Voice based Email Application for Blind People
IRJET- Voice based Email Application for Blind PeopleIRJET Journal
Β 
Technology in Modern Communication
Technology in Modern CommunicationTechnology in Modern Communication
Technology in Modern CommunicationMahbub Hussain
Β 
Uses of computer networks
Uses of computer networksUses of computer networks
Uses of computer networksDr. Shalini Pandey
Β 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Heather Vargas
Β 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptxSONISINGH52160
Β 
Computer & services
Computer & services Computer & services
Computer & services Prateek Rohatgi
Β 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetPrateek Rohatgi
Β 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEIRJET Journal
Β 

Similar to Introduction to Mail Management System (20)

VOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMVOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEM
Β 
Voice Based Email for Blind
Voice Based Email for BlindVoice Based Email for Blind
Voice Based Email for Blind
Β 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Β 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Β 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
Β 
The global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docxThe global information infrastructureSectionGETTING ON BO.docx
The global information infrastructureSectionGETTING ON BO.docx
Β 
Communication skills ppt
Communication skills pptCommunication skills ppt
Communication skills ppt
Β 
How To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. ExamHow To Summarize An Article In Apa Format. Exam
How To Summarize An Article In Apa Format. Exam
Β 
contemporary application of information technology
contemporary application of information technologycontemporary application of information technology
contemporary application of information technology
Β 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
Β 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
Β 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
Β 
IRJET- Voice based Email Application for Blind People
IRJET-  	  Voice based Email Application for Blind PeopleIRJET-  	  Voice based Email Application for Blind People
IRJET- Voice based Email Application for Blind People
Β 
Technology in Modern Communication
Technology in Modern CommunicationTechnology in Modern Communication
Technology in Modern Communication
Β 
Uses of computer networks
Uses of computer networksUses of computer networks
Uses of computer networks
Β 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
Β 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
Β 
Computer & services
Computer & services Computer & services
Computer & services
Β 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Β 
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLEVOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
VOICE-BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED PEOPLE
Β 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
Β 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
Β 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
Β 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
Β 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Β 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
Β 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
Β 
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
Β 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Β 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Β 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Β 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Β 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Β 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Β 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Β 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Β 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
Β 
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
πŸ”9953056974πŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Β 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Β 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Β 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Β 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Β 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Β 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Β 

Introduction to Mail Management System

  • 1. Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97 www.ijera.com 94|P a g e Introduction to Mail Management System Suvarnsing G. Bhable1 , Jaypalsing N. Kayte (Department of Computer Science & Information Technology, Dr Babasaheb Ambedkar Marathwada University Campus, Aurangabad) ABSTRACT Developing different techniques to overcome this problem and protect the consumer, which planted in the hearts of trust people and encouraged them to purchase via the internet. At first you must know what is the main reason for the work of the filtration email the mail service is fast and easy way to exchange messages are singing from the use of traditional mail, there are a large number from of services in the internet requires that you have one email sometimes one of us would like to cancel his participation in one of the sites because of the large number of incoming messages to him from the site does not know and have for a way unsubscribe to get rid of these messages, or would like one of us that some of the messages is prohibited from specific people or locations for some of these problems has the following solution is the work of a filter to any e-mail and work ban for unwanted messages application spam filtering as a last resort, you can set up your own spam blocker with your email application's built-in filter capability Email filtering is the processing of email to organize it according to specified criteria. Keywords - WWW, IA, Internet, SI, Java, SQL I. INTRODUCTION Internet has become one of the largest properties important in our daily lives. They provide a way to enter the vast amount of information, and put at our disposal. More importantly, they have become a very important role to play in the greatest inventions of the twentieth century is e-commerce . Besides the possibility of developing internet unlimited amounts of information in our hands, there is the possibility of buying products and services without leaving the house, E-commerce means that we can do buy books, computers, cards, travel, cars, and the other at any moment. Although this idea was encouraging at first, but they spread was relatively slow because of public concern, keeping banking information and credit card data in an unknown location is a big risk. Although this risk is limited, but it still exists. This danger much to do with the fact that the credit card information sent through unencrypted text, meaning that it can be stolen and used these data to fraud. we have been developing different techniques to overcome this problem and protect the consumer, which planted in the hearts of trust people and encouraged them to purchase via the internet. At first you must know what is the main reason for the work of the filtration email the mail service is fast and easy way to exchange messages are singing from the use of traditional mail, there are a large number from of services in the internet requires that you have one email sometimes one of us would like to cancel his participation in one of the sites because of the large number of incoming messages to him from the site does not know and have for a way unsubscribe to get rid of these messages, or would like one of us that some of the messages is prohibited from specific people or locations for some of these problems has the following solution is the work of a filter to any e- mail and work ban for unwanted messages application spam filtering as a last resort, you can set up your own spam blocker with your email application's built-in filter capability Email filtering is the processing of email to organize it according to specified criteria. Most often this refers to the automatic processing of incoming messages, in addition to anti-spam techniques [ 1 ] ο‚· An electronic message sent from one computer to another ο‚· Email saves money and time compared to regular mail ο‚· An email message takes seconds to reach destination ο‚· Also used to search for a job or to print A message in this system can be used more than one server in the same program after changing the server name and port of receipt and transmission also shop online Email is a very popular way of communicating with others over the internet. An application that allows users to send, receive, and read email is called an email client after the presence of all threats to internet users and attempts to steal e- mail and steal money and fraud emerged the need to protect e-mail and browsing security through the use of protocol matching the security of SSL and check the real user of this email by having a digital certificate and its validity and the presence of the electronic signature and the company donor and RESEARCH ARTICLE OPEN ACCESS
  • 2. Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97 www.ijera.com 95|P a g e details user and also user can verify the server is the real caller through the digital certificate of the server is done through several processes of authorization and verification known as hand-shake and note when using the site security appears lock yellow in the side of the page indicates that this site uses protocol SSL to browse security in this the system has worked to use this protocol works with the email of the inability of unauthorized people from stealing or tampering and tampering with messages and also works encrypt the message and password and make sure the validity of the server and the user and also for the system the ability to use more than one server with a change only the port number and has the ability to search for messages by either topic or postal address and has the ability to print the contents of the message and block spam and unwanted by putting your email in the list of filter. II. WORLD WIDE WEB The World Wide Web (abbreviated as WWW or W3, and commonly known as the Web) is a system of interlinked hypertext documents accessed via the internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks [3]. A. Internet Architecture It is a meta-network a constantly changing collection of thousands of individual networks intercommunicating with a common protocol. The internet's architecture is described in its name, a short from of the compound word "inter-networking". This architecture is based in the very specification of the standard TCP/IP protocol, designed to connect any two networks which may be very different in internal hardware, software, and technical design. Once two networks are interconnected, communication with TCP/IP is enabled end-to-end, so that any node on the internet has the near magical ability to communicate with any other no matter where they are. This openness of design has enabled the internet architecture to grow to a global scale. in practice, the internet technical architecture looks a bit like a multi- dimensional river system, with small tributaries feeding medium-sized streams feeding large rivers. B. Internet Services 1- Dial-up (including ISDN) 5- Wi-Fi hotspots 6- Wireless Internet service provider - sometimes simply called 'microwave' 7- Mobile broadband over terrestrial mobile phone networks using CSD, GPRS, EDGE, EVDO, HSPA, etc. either through mobile phones or PCs 8- Satellite Internet 14- Wireless mesh network - mostly military and one laptop per child use 15- Packet radio 16- Free-space optical communication C. Internet Used 1- Transfer speed and pass information, and ease of transport and information and photos e-mail. 2- Internet personal mobile briefcase with the user; internet is a library for each person. 3- Multimedia used in the global network to cover the same subject; whether in writing or picture or sound. 4- Internet shorten the time and effort and money, providing as many minimal effort, there are sites that collect thousands of folders, cut short the effort to read and search through the search services. 5- Easily search for any word or image information. 6- Use the properties of paying bills and buying through the Internet and dealing with the banks through which saving time, effort and money, and encourages the banks clients to use the internet to ease the pressure on them. 7- Make inventions is growing and branching out because of the ease the convergence of scientists and learn about their joint efforts, which increases the area of creativity, Innovation and choice. 8- Potential to provide us with extensive experience in expert systems in medicine and management, manufacturing, finance, marketing, education, media and entertainment etc 9- Online shopping - online shopping, can buy and sell all kinds of products using credit cards such as Visa and MasterCard, there are many famous sites such as Amazon.com and ebay.com auction site etc. D. Advantage and Disadvantage: Advantages 1– Availability of mainly free information 2– Low cost of initial connection 3– Reduces the costs of divulgation 4– The same protocol of communication can be used for all the services 5– Facilitates rapid interactive communication 6– Facilitates the exchange of huge volumes of data 7– No barriers to divulgation 8– Facilitates access to different sources of information, which is continuously up-dated 9– Facilitates management of companies information system 10– it is accessible from anywhere 11– It has become the global media Disadvantages 1– Danger of overload and excess information
  • 3. Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97 www.ijera.com 96|P a g e 2– It requires an efficient information search strategy 3– The search can be slow 4– It is difficult to filter and prioritize information 5– No guarantee of finding what one is looking for 6– There is a lot of apparently unconnected information 7– Net becomes overloaded because of large number of users 8– No regulation 9– No quality control over available data 10– The ease with which information can be constantly up-dated can cause problems of referencing. III. PROBLEM STATEMENT There is a range of problems that threaten the internet, especially email, including spam and hacker threat and for this reason must be the protection of e- mail to the attributes of the sensitive personal information. A. Problem Defined Email is prevalent in all aspects of our life today, but in many ways it is still a flawed system. the most notable example is the problem of spam, and there is a wide body of research on detecting, filtering, and removing spam. there is also research dealing with email security, and how to make that security easier to use .[6] B. Feasibility Study In any project feasibility analysis stage is very important. the feasibility study is to propose a system according to their influence, the ability of portability, the process to meet user needs and the efficient use of resources. any project may face a scarcity of time, resources or manpower. Important result of the preliminary inquiry is to determine whether the system is required is not feasible or not. the key considerations involved in the analysis of economic and technical feasibility, operational, economic, and after studying the project found that this project fits with the requirements of the user to email filtering and encryption of messages when the transmitter and check the server and the possible use of more than mail in this program [7]. C. Technical Technical feasibility is the most important of all types of feasibility analysis. Technical feasibility deals with hardware as well as software requirements. An idea from the outline design to system requirements in terms of inputs outputs, files and procedures is drawn and the type of hardware, software, and the methods required for running the systems are analyzed hence the system is technically feasible. [ 8 ] D. Operational The purpose of the operational feasibility study is to determine whether the new system would be used if it is developed and implemented will there be resistance from users that will undermine the possible application benefits from the outputs of the meeting that was held with the system users. After analyzing the requirements for our project we had come to the conclusion that our project users require the following requirements. [9] E. Sender's Requirement 1- Needs a more user interface. 2- More and more security. 3- Security feature which are controlled by the user. 4- Complexity of the security. 5- The account bound with a separate username and password for every user. 6- Needs an algorithm which can achieve integrity and authentication. F. Receiver's requirement 1- Access to the POP3 server of the mail server from where the mails are going to be extracted. 2- Needs interface. 3- Needs a security feature which could make the cryptanalysis more secure. G. Software Requirements Tool used: eagetmail_1, HTML, JSP Front end: Java. Windows 2000 professional operating system. Windows XP, windows vista and windows 7. Internet explorer 5.0 and Netscape navigator. H. Hard Ware Requirements Pentium IV Processor 512 MB RAM. 20GB Hard Disk space. Ethernet card with an internet and internet zone. IV. CONCLUSION The need for urgent and day to day email we must protect email from theft, including contains personal information and sensitive private emails are used for companies and businessmen, statesmen and security is also a means closing security gaps that are used by hackers to enter the computer through email for this reason, used the protocol SSL to protect and verify the on the server and the user on the other work in addition to filtering email to any strange or annoying email messages from the forum or advertising and the other to not appear in the inbox . REFERENCES [1] Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems. .
  • 4. Suvarnsing G. Bhable Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 5) January 2016, pp.94-97 www.ijera.com 97|P a g e [2] "How Pervasive is ISP Outbound Email Filtering?". http://ask.slashdot.org/story/08/01/31/2130251 /How-Pervasive-is-ISP-Outbound-Email- Filtering. Retrieved 15 September 2011. [3] R.T. Morris, 1985. A Weakness in the 4.2BSD Unix TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey. [4] "World Wide Web Consortium". http://www.w3.org/. [5] "How Broadband Works", Chris Woodford, Explain that Stuff, 20 August 2008. Retrieved 19 January [6] Principles of Information Security ,Fourth Edition Michael E .Whitman and Herbert J. Mattord Vice http://www.slgmexico.com/index-4.html [7] Bentley, L & Whitten, J (2007). System Analysis & Design for the Global Enterprise. 7th ed. (p. 417). [8] http://en.wikipedia.org/wiki/Feasibility_stud y [9] Harper, Douglas (November 2001). "Online Etymology Dictionary – Economy". http://www.etymonline.com/index.php?term =economy. Retrieved October 27,