SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
SUSPICIOUS EMAIL DETECTION
ABSTRACT
AIM:
In this project, suspicious users are identified by determining the keywords used by him/her. The
keywords such as bomb, RDX, are found in the mails which are sent by the user. All these
blocked mails are checked by the administrator and identify the users who sent such mails.This is
very useful in real-time scenario in which you can resume the anti-social activities.
PURPOSE OF THE PROJECT:
The purpose of the project is to suspect the E-mails which consist of offensive, anti-social elements and
block them which help in identifying the suspicious user.
EXISTING SYSTEM & DISADVANTAGES:
In the existing system, the mails are sent to the authenticated users who are intended to be received. Some
defects in existing system are:
 Suspicious mails cannot be detected.
 Offensive users cannot be identified.
PROPOSED SYSTEM& ITS DISADVANTAGES:
In the proposed system the suspicious users are detected and the offensive mails are blocked.
Features of proposed system:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
 This helps in finding out anti social elements.
 This provides the security to system which adapts it.
 This also helps the intelligence bureau, crime branch etc.,
 Insurance premium calculations, for quarterly, half yearly and annually is completely automated
gives us a reliable environment.
 The system provides claim reporting and status enquiry.
MODULES:
It consists 5 modules:
1) Login Module
2) Registration Module
3) Administration Module
4) Encryption Module
5) User Module
6) Mailing Module
Modules Description:
 Login Module:
This module is used by administrator and users (who are authenticated) to login into the Colours
mail. The login details of the specified person will be entered and hence can enter into the Colours mail.
 Registration Module:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
This module is used by the unauthenticated users who are unregistered. The users must register
themselves such that they can login into the Coloursmail.
 Administration Module:
This module is used by the administrator to perform the functions like managing the keywords,
entering new keywords and to check out the block list of the discarded mails.
 Encryption Module:
This module is used by the administrator to perform the functions like encryption of the words. The
encrypted words are sent to the database and hence managed by the administrator.
 User Module:
This module is used by the users to do operations like composing mail, checking out the mails in
inbox and finally sending the mails to the authenticated users by attaching a message.
 Mailing Module:
This module is used by the users perform mailing system. The mailing system consists of
composing the mails, sending the mails and checking out the mails in inbox.
This module allows employees to register and manage patient details. When a request is made, an
employee immediately dispatches an ambulance with available doctor and other attendants. Employee
keeps track of patient status and in case of emergency consults a hospital for admitting the patient.
SOFTWARE REQUIREMENTS:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Technology : Java and J2EE
Web Technologies : HTML, CSS, JavaScript
Database : Oracle10g
JDK Version : JDK1.5
Server : Tomcat5.5
HARDWARE REQUIREMENTS:
 Processor:: Pentium-III (or) Higher
 Ram:: 64MB (or) Higher
 Cache:: 512MB
 Hard disk:: 10GB
Additional Tools:
HTML Designing : Dream weaver Tool
Development Tool kit : My Eclipse

More Related Content

What's hot

REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...
REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...
REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...
ijcsit
 
Crime file
Crime fileCrime file
Crime file
divy_resting
 
Student database management system
Student database management systemStudent database management system
Student database management system
Arpita Naik
 
lab access and management using barcode scanner
lab access and management using barcode scannerlab access and management using barcode scanner
lab access and management using barcode scanner
bilalengg24
 
Crime
CrimeCrime
Paper on TnPDatabaseMgmtSystem
Paper on TnPDatabaseMgmtSystemPaper on TnPDatabaseMgmtSystem
Paper on TnPDatabaseMgmtSystem
Rohit Mate
 
Hostel Management System(HMS)
Hostel Management  System(HMS)Hostel Management  System(HMS)
Hostel Management System(HMS)
Omkar Walavalkar
 
C++ student management system
C++ student management systemC++ student management system
C++ student management system
ABHIJITPATRA23
 
Hostel Management System
Hostel Management System Hostel Management System
Hostel Management System
RegmiBhanu
 
sports event management system.report
sports event management system.reportsports event management system.report
sports event management system.report
Zuhaib Hunzai
 
Student Management System
Student Management SystemStudent Management System
Student Management System
HamaQarani
 
Course registration system
Course registration systemCourse registration system
Course registration system
Barani Tharan
 
Presentation Of Hostel Management System SRS
Presentation Of Hostel Management System SRSPresentation Of Hostel Management System SRS
Presentation Of Hostel Management System SRS
hira akram
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Application
satvirsandhu9
 
Report (icons event ) (2)
Report (icons event ) (2)Report (icons event ) (2)
Report (icons event ) (2)
SIDDHARTHHATKAR
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Amit Gandhi
 
Synopsis of online Attendance System
Synopsis of online Attendance SystemSynopsis of online Attendance System
Synopsis of online Attendance System
Shyam Sundar Pandey
 
MMS JAVA Updated RESUME
MMS JAVA Updated RESUMEMMS JAVA Updated RESUME
MMS JAVA Updated RESUME
Madan Mohan
 
Bright
BrightBright
Student information system
Student information systemStudent information system
Student information system
Saqib Nadeem
 

What's hot (20)

REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...
REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...
REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA ...
 
Crime file
Crime fileCrime file
Crime file
 
Student database management system
Student database management systemStudent database management system
Student database management system
 
lab access and management using barcode scanner
lab access and management using barcode scannerlab access and management using barcode scanner
lab access and management using barcode scanner
 
Crime
CrimeCrime
Crime
 
Paper on TnPDatabaseMgmtSystem
Paper on TnPDatabaseMgmtSystemPaper on TnPDatabaseMgmtSystem
Paper on TnPDatabaseMgmtSystem
 
Hostel Management System(HMS)
Hostel Management  System(HMS)Hostel Management  System(HMS)
Hostel Management System(HMS)
 
C++ student management system
C++ student management systemC++ student management system
C++ student management system
 
Hostel Management System
Hostel Management System Hostel Management System
Hostel Management System
 
sports event management system.report
sports event management system.reportsports event management system.report
sports event management system.report
 
Student Management System
Student Management SystemStudent Management System
Student Management System
 
Course registration system
Course registration systemCourse registration system
Course registration system
 
Presentation Of Hostel Management System SRS
Presentation Of Hostel Management System SRSPresentation Of Hostel Management System SRS
Presentation Of Hostel Management System SRS
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Application
 
Report (icons event ) (2)
Report (icons event ) (2)Report (icons event ) (2)
Report (icons event ) (2)
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Synopsis of online Attendance System
Synopsis of online Attendance SystemSynopsis of online Attendance System
Synopsis of online Attendance System
 
MMS JAVA Updated RESUME
MMS JAVA Updated RESUMEMMS JAVA Updated RESUME
MMS JAVA Updated RESUME
 
Bright
BrightBright
Bright
 
Student information system
Student information systemStudent information system
Student information system
 

Similar to 3.exposure of suspicious email

Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email Detection
Suraj Kumar
 
28.storage utilization system
28.storage utilization system28.storage utilization system
28.storage utilization system
Pvrtechnologies Nellore
 
Harmfull mail scanning
Harmfull mail scanningHarmfull mail scanning
Harmfull mail scanning
SHAMMI KUMAR
 
Harmfull mail scanning
Harmfull mail scanningHarmfull mail scanning
Harmfull mail scanning
SHAMMI KUMAR
 
25.group examination process
25.group examination process25.group examination process
25.group examination process
Pvrtechnologies Nellore
 
SarojKumarDash
SarojKumarDashSarojKumarDash
SarojKumarDash
Saroj Kumar Dash
 
Colleges.net
Colleges.netColleges.net
Colleges.net
Neena Rawat
 
Hotel Management System final report
Hotel Management System final report  Hotel Management System final report
Hotel Management System final report
jaysavani5
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
LJ PROJECTS
 
Final (1).pdf
Final (1).pdfFinal (1).pdf
Final (1).pdf
karmadjango
 
83.e bill board
83.e bill board83.e bill board
83.e bill board
Pvrtechnologies Nellore
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
 
Personality Prediction and CV Analysis System
Personality Prediction and CV Analysis SystemPersonality Prediction and CV Analysis System
Personality Prediction and CV Analysis System
IRJET Journal
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
IJEDR1501061.pdf
IJEDR1501061.pdfIJEDR1501061.pdf
IJEDR1501061.pdf
SurveyCorpz
 
47.sdlc automation system
47.sdlc automation system47.sdlc automation system
47.sdlc automation system
Pvrtechnologies Nellore
 
IRJET- E-Attendance Manager: A Review
IRJET-  	  E-Attendance Manager: A ReviewIRJET-  	  E-Attendance Manager: A Review
IRJET- E-Attendance Manager: A Review
IRJET Journal
 
88. employee salary information system
88. employee salary information system88. employee salary information system
88. employee salary information system
Pvrtechnologies Nellore
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
YogeshIJTSRD
 
Smartpoly Android Application
Smartpoly Android ApplicationSmartpoly Android Application
Smartpoly Android Application
SubmissionResearchpa
 

Similar to 3.exposure of suspicious email (20)

Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email Detection
 
28.storage utilization system
28.storage utilization system28.storage utilization system
28.storage utilization system
 
Harmfull mail scanning
Harmfull mail scanningHarmfull mail scanning
Harmfull mail scanning
 
Harmfull mail scanning
Harmfull mail scanningHarmfull mail scanning
Harmfull mail scanning
 
25.group examination process
25.group examination process25.group examination process
25.group examination process
 
SarojKumarDash
SarojKumarDashSarojKumarDash
SarojKumarDash
 
Colleges.net
Colleges.netColleges.net
Colleges.net
 
Hotel Management System final report
Hotel Management System final report  Hotel Management System final report
Hotel Management System final report
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
 
Final (1).pdf
Final (1).pdfFinal (1).pdf
Final (1).pdf
 
83.e bill board
83.e bill board83.e bill board
83.e bill board
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Personality Prediction and CV Analysis System
Personality Prediction and CV Analysis SystemPersonality Prediction and CV Analysis System
Personality Prediction and CV Analysis System
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
IJEDR1501061.pdf
IJEDR1501061.pdfIJEDR1501061.pdf
IJEDR1501061.pdf
 
47.sdlc automation system
47.sdlc automation system47.sdlc automation system
47.sdlc automation system
 
IRJET- E-Attendance Manager: A Review
IRJET-  	  E-Attendance Manager: A ReviewIRJET-  	  E-Attendance Manager: A Review
IRJET- E-Attendance Manager: A Review
 
88. employee salary information system
88. employee salary information system88. employee salary information system
88. employee salary information system
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
Smartpoly Android Application
Smartpoly Android ApplicationSmartpoly Android Application
Smartpoly Android Application
 

More from Pvrtechnologies Nellore

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Pvrtechnologies Nellore
 

More from Pvrtechnologies Nellore (20)

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

3.exposure of suspicious email

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 SUSPICIOUS EMAIL DETECTION ABSTRACT AIM: In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.This is very useful in real-time scenario in which you can resume the anti-social activities. PURPOSE OF THE PROJECT: The purpose of the project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user. EXISTING SYSTEM & DISADVANTAGES: In the existing system, the mails are sent to the authenticated users who are intended to be received. Some defects in existing system are:  Suspicious mails cannot be detected.  Offensive users cannot be identified. PROPOSED SYSTEM& ITS DISADVANTAGES: In the proposed system the suspicious users are detected and the offensive mails are blocked. Features of proposed system:
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457  This helps in finding out anti social elements.  This provides the security to system which adapts it.  This also helps the intelligence bureau, crime branch etc.,  Insurance premium calculations, for quarterly, half yearly and annually is completely automated gives us a reliable environment.  The system provides claim reporting and status enquiry. MODULES: It consists 5 modules: 1) Login Module 2) Registration Module 3) Administration Module 4) Encryption Module 5) User Module 6) Mailing Module Modules Description:  Login Module: This module is used by administrator and users (who are authenticated) to login into the Colours mail. The login details of the specified person will be entered and hence can enter into the Colours mail.  Registration Module:
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the Coloursmail.  Administration Module: This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.  Encryption Module: This module is used by the administrator to perform the functions like encryption of the words. The encrypted words are sent to the database and hence managed by the administrator.  User Module: This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.  Mailing Module: This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox. This module allows employees to register and manage patient details. When a request is made, an employee immediately dispatches an ambulance with available doctor and other attendants. Employee keeps track of patient status and in case of emergency consults a hospital for admitting the patient. SOFTWARE REQUIREMENTS:
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Technology : Java and J2EE Web Technologies : HTML, CSS, JavaScript Database : Oracle10g JDK Version : JDK1.5 Server : Tomcat5.5 HARDWARE REQUIREMENTS:  Processor:: Pentium-III (or) Higher  Ram:: 64MB (or) Higher  Cache:: 512MB  Hard disk:: 10GB Additional Tools: HTML Designing : Dream weaver Tool Development Tool kit : My Eclipse