SlideShare a Scribd company logo
1 of 25
Wasif & Saima

JoinPakForces
Final Project Presentation

JoinPakForces
Developed by

Wasif Altaf
Saima Altaf
University Institute of Information Technology,
PMAS Arid Agriculture University, Rawalpindi.
2009

Wasif & Saima

JoinPakForces
Presentation Agenda
•
•
•
•
•
•
•
•

Wasif & Saima

System Introduction
Problem Definition
Proposed Solution
System Architecture
Application UI
Interaction Analysis
Tools & Technologies
Questions & Answers

JoinPakForces
Introduction

Why “JoinPakForces” ?

Wasif & Saima

JoinPakForces
Problem Definition

• Manual
• Decentralized approach
– Frequency checking
– Record handling

Wasif & Saima

JoinPakForces
Proposed Solution

• “JoinPakForces” multipurpose
dynamic Website
• Centralized Approach

Wasif & Saima

JoinPakForces
System Architecture

System Design Modeling :
•
•
•
•
•
•
Wasif & Saima

Data Flow Diagram
E-R Diagram
Template Design
Three main Screen shots
Three test Cases
One Bug Report
JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Entity Relationship Diagram

Wasif & Saima

JoinPakForces
Template Design

Wasif & Saima

JoinPakForces
Index Screen Shot

Wasif & Saima

JoinPakForces
Ad Notices Screen Shot

Wasif & Saima

JoinPakForces
Gallery Screen Shot

Wasif & Saima

JoinPakForces
Three Test Cases
Action
Performed

Action’s
Output

Valid Input

Invalid Input

Input

Required
Output

Output

Administrat
or’s Login

If the entered
login Id and
password are
valid, the user
proceeds
to
the next page

Valid login Id
and password,
according
to
length
constraints and
verification from
“admin” table

Invalid or empty
value for login Id
or password or
for both

Login Id or
password
left empty

Alert is shown,
to fill the text
boxes properly

Alert is shown,
to fill the text
boxes properly

No
differenc
e

User’s
Login

If the entered
NIC No. is
valid, the user
proceeds
to
next page

Valid NIC No.,
according
to
length
constraints and
verification from
“cand” table

Invalid or empty
value for NIC
No.

Alert is shown,
to fill the text
boxes properly

Alert is shown,
to fill the text
boxes properly

No
differenc
e

Validity of the
inputted data
is
checked
and
registration
process
moves ahead

Each of fields
should follow the
related
constraints

Any of the fields
may
not
be
following
the
related
constraints

Invalid
length NIC
No.
entered,
34203466489797
999779-5
Father’s
CNIC
No.
left empty

Candidate
should
be
alerted that he
has left father’s
NIC
related
text box empty,
and
field
should
be
focused

Candidate
is
alerted that he
has left father’s
NIC
related
text box empty,
and field is
focused also.

No
differenc
e

Submit
Step
Button
Pressed

1

Wasif & Saima

Analysis
Result

JoinPakForces
Bug Report
PROBLEM REPORT: BUG01
PROGRAM:
REPORT TYPE:
1.Coding issue
2.Design issue
3.Suggestion

Login Security Problem
2. Design Issue
4. Documentation
5. Hardware
6. Query

RELEASE: 1st
SEVERITY: Serious
1. Fatal
2.Serious
3. Minor

VER: 1.0
ATTACHMENTS: NO
If yes. Describe:
_________
_________

PROBLEM SUMMARY:
If user fills a login form and login’s successfully, and then presses
BACK button provided by Web Browser, his/her NIC number still remains there on the form ,viewable,
which is a serious security threat.
CAN YOU REPRODUCE THE PROBLEM? (Y/N)
PROBLEM AND HOW TO REPRODUCE IT:

Yes

When a user fills a login form and login’s successfully, and then
presses BACK button provided by Web Browser, his/her NIC number still remains there on the form
,viewable, which is a serious security threat. Any other person may be able to see the NIC No. of
candidate, which he/she should not.
SUGGESTED FIX:
PHP session may be used to uproot this problem. Complete fix deferred to
Teacher.
REPORTED BY:

Wasif & Saima

Wasif Altaf

DATE:

14/01/2009

JoinPakForces
Future Enhancements

• Security Upraising
• Communication Base
• Increase Interactivity

Wasif & Saima

JoinPakForces
Tools & Technologies

Client Side
HTML

Server Side
PHP

CSS
JavaScript
Other tools:

Adobe Dreamweaver CS4
Adobe Photoshop CS2
WAMP Server 2.0

Development Platform : Microsoft Windows XP
Wasif & Saima

JoinPakForces
Questions
&
Answers
Wasif & Saima

JoinPakForces
Thanks

Wasif & Saima

JoinPakForces

More Related Content

Viewers also liked (8)

C++ Preprocessor Directives
C++ Preprocessor DirectivesC++ Preprocessor Directives
C++ Preprocessor Directives
 
Implementation of c string functions
Implementation of c string functionsImplementation of c string functions
Implementation of c string functions
 
Preprocessor
PreprocessorPreprocessor
Preprocessor
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
C string
C stringC string
C string
 
C programming - String
C programming - StringC programming - String
C programming - String
 
String in c
String in cString in c
String in c
 
Strings Functions in C Programming
Strings Functions in C ProgrammingStrings Functions in C Programming
Strings Functions in C Programming
 

Similar to Web Project Presentation - JoinPakForces

14.project online eamination system
14.project online eamination system14.project online eamination system
14.project online eamination system
Vivek Mehta
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System Analysis
Deepak Shankar
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
ERPScan
 

Similar to Web Project Presentation - JoinPakForces (20)

Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?
 
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
 
DataOps, DevOps and the Developer: Treating Database Code Just Like App Code
DataOps, DevOps and the Developer: Treating Database Code Just Like App CodeDataOps, DevOps and the Developer: Treating Database Code Just Like App Code
DataOps, DevOps and the Developer: Treating Database Code Just Like App Code
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
 
14.project online eamination system
14.project online eamination system14.project online eamination system
14.project online eamination system
 
Presentation 2315006 done
Presentation 2315006 donePresentation 2315006 done
Presentation 2315006 done
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System Analysis
 
Jenniffer
JennifferJenniffer
Jenniffer
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
QUES#19 Automation and Quality 2022.pdf
QUES#19 Automation and Quality 2022.pdfQUES#19 Automation and Quality 2022.pdf
QUES#19 Automation and Quality 2022.pdf
 
DevOps: Find Solutions, Not More Defects
DevOps: Find Solutions, Not More DefectsDevOps: Find Solutions, Not More Defects
DevOps: Find Solutions, Not More Defects
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
Continuous Performance Testing and Monitoring in Agile Development
Continuous Performance Testing and Monitoring in Agile DevelopmentContinuous Performance Testing and Monitoring in Agile Development
Continuous Performance Testing and Monitoring in Agile Development
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
IV&V Cox Overview
IV&V Cox OverviewIV&V Cox Overview
IV&V Cox Overview
 

More from Wasif Altaf (8)

Security Issues in HTML 5
Security Issues in HTML 5Security Issues in HTML 5
Security Issues in HTML 5
 
Java Web Services - Parts of Speech Tagger Web Service
Java Web Services - Parts of Speech Tagger Web ServiceJava Web Services - Parts of Speech Tagger Web Service
Java Web Services - Parts of Speech Tagger Web Service
 
An Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceAn Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial Intelligence
 
Software User Interface Design Ergonomics
Software User Interface Design ErgonomicsSoftware User Interface Design Ergonomics
Software User Interface Design Ergonomics
 
A Review of Microsoft Windows Vista
A Review of Microsoft Windows VistaA Review of Microsoft Windows Vista
A Review of Microsoft Windows Vista
 
Are Java Primitive Variables Objects?
Are Java Primitive Variables Objects?Are Java Primitive Variables Objects?
Are Java Primitive Variables Objects?
 
Modern Logic - Introduction to Logic
Modern Logic - Introduction to LogicModern Logic - Introduction to Logic
Modern Logic - Introduction to Logic
 
Introduction to Logic
Introduction to LogicIntroduction to Logic
Introduction to Logic
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Web Project Presentation - JoinPakForces

  • 2. Final Project Presentation JoinPakForces Developed by Wasif Altaf Saima Altaf University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi. 2009 Wasif & Saima JoinPakForces
  • 3. Presentation Agenda • • • • • • • • Wasif & Saima System Introduction Problem Definition Proposed Solution System Architecture Application UI Interaction Analysis Tools & Technologies Questions & Answers JoinPakForces
  • 5. Problem Definition • Manual • Decentralized approach – Frequency checking – Record handling Wasif & Saima JoinPakForces
  • 6. Proposed Solution • “JoinPakForces” multipurpose dynamic Website • Centralized Approach Wasif & Saima JoinPakForces
  • 7. System Architecture System Design Modeling : • • • • • • Wasif & Saima Data Flow Diagram E-R Diagram Template Design Three main Screen shots Three test Cases One Bug Report JoinPakForces
  • 8. Data Flow Diagram Wasif & Saima JoinPakForces
  • 9. Data Flow Diagram Wasif & Saima JoinPakForces
  • 10. Data Flow Diagram Wasif & Saima JoinPakForces
  • 11. Data Flow Diagram Wasif & Saima JoinPakForces
  • 12. Data Flow Diagram Wasif & Saima JoinPakForces
  • 13. Data Flow Diagram Wasif & Saima JoinPakForces
  • 14. Data Flow Diagram Wasif & Saima JoinPakForces
  • 15. Entity Relationship Diagram Wasif & Saima JoinPakForces
  • 16. Template Design Wasif & Saima JoinPakForces
  • 17. Index Screen Shot Wasif & Saima JoinPakForces
  • 18. Ad Notices Screen Shot Wasif & Saima JoinPakForces
  • 19. Gallery Screen Shot Wasif & Saima JoinPakForces
  • 20. Three Test Cases Action Performed Action’s Output Valid Input Invalid Input Input Required Output Output Administrat or’s Login If the entered login Id and password are valid, the user proceeds to the next page Valid login Id and password, according to length constraints and verification from “admin” table Invalid or empty value for login Id or password or for both Login Id or password left empty Alert is shown, to fill the text boxes properly Alert is shown, to fill the text boxes properly No differenc e User’s Login If the entered NIC No. is valid, the user proceeds to next page Valid NIC No., according to length constraints and verification from “cand” table Invalid or empty value for NIC No. Alert is shown, to fill the text boxes properly Alert is shown, to fill the text boxes properly No differenc e Validity of the inputted data is checked and registration process moves ahead Each of fields should follow the related constraints Any of the fields may not be following the related constraints Invalid length NIC No. entered, 34203466489797 999779-5 Father’s CNIC No. left empty Candidate should be alerted that he has left father’s NIC related text box empty, and field should be focused Candidate is alerted that he has left father’s NIC related text box empty, and field is focused also. No differenc e Submit Step Button Pressed 1 Wasif & Saima Analysis Result JoinPakForces
  • 21. Bug Report PROBLEM REPORT: BUG01 PROGRAM: REPORT TYPE: 1.Coding issue 2.Design issue 3.Suggestion Login Security Problem 2. Design Issue 4. Documentation 5. Hardware 6. Query RELEASE: 1st SEVERITY: Serious 1. Fatal 2.Serious 3. Minor VER: 1.0 ATTACHMENTS: NO If yes. Describe: _________ _________ PROBLEM SUMMARY: If user fills a login form and login’s successfully, and then presses BACK button provided by Web Browser, his/her NIC number still remains there on the form ,viewable, which is a serious security threat. CAN YOU REPRODUCE THE PROBLEM? (Y/N) PROBLEM AND HOW TO REPRODUCE IT: Yes When a user fills a login form and login’s successfully, and then presses BACK button provided by Web Browser, his/her NIC number still remains there on the form ,viewable, which is a serious security threat. Any other person may be able to see the NIC No. of candidate, which he/she should not. SUGGESTED FIX: PHP session may be used to uproot this problem. Complete fix deferred to Teacher. REPORTED BY: Wasif & Saima Wasif Altaf DATE: 14/01/2009 JoinPakForces
  • 22. Future Enhancements • Security Upraising • Communication Base • Increase Interactivity Wasif & Saima JoinPakForces
  • 23. Tools & Technologies Client Side HTML Server Side PHP CSS JavaScript Other tools: Adobe Dreamweaver CS4 Adobe Photoshop CS2 WAMP Server 2.0 Development Platform : Microsoft Windows XP Wasif & Saima JoinPakForces