SlideShare a Scribd company logo
1 of 14
E-Commerce & Web Solution
Online Shopping mall
Group members
Md.Ramiz Uddin
Md.Reduanur Rahman Rafi
Contents will covered within
this session
1.Project overview with PPT
2. Showing demo product live on browser
3.Submit report.
We proposed for
A system in which will include the following features
• Business-to-Consumer (B2C)
• Consumer-to-consumer (C2C)
• CMS for all sorts of users
• Custom search
What we have achieved ?
1.Very user friendly interface.
2.A very useful project architecture.
3.Strong security system
4.Clean code
User experience Design
1.Easy Navigation
- The navigation is not hazy just added the necessary
pages in the navigation bar.
- User need not to round up here and there for their
desired product.
- Easy to crate account
- Only few information needed to create account.
2.Supper easy management system.
- Just do everything in one click
Security system in detail
SQL injection
How does hackers inject bad thing lets have an
example.
The most common thing the hacker do first is bypassing
how dose it works ?
Lets have a look on our sql query for a login system
$query="select username,pass from users where
username='$uname' and password='$passwrd' limit 0,1";
Security system Continued
Hackers generally perform bypassing like this
Username : ' or ''='
Password : ' or ''=‘
Then the query looks like
select username, pass from users where username='' or
''='' and password='' or ''='' limit 0,1;
To get ride of this we took 2 steps
First one is to validate the form so that user could not enter
any special character.
Then we used PDO
Which contains prepare function to execute query.
Project Architecture
Project Architecture
Project Architecture
How does it works ?
User’s
request • Frontend
validation
controller
• Check valid
request
• Find model
Model
• find data
• Save data
Project Architecture
Example of controlling a process
Complete system at a glance
Search with
product name
Know price limit
View product
and order
View shop
Bring products
with shops
B2C
Complete system at a glance
C2C
• Buy and
sell
• Find
ads
• Create
ads
• Create
account
Product
list
Search
Product
Get seller
info
Find
categories
Let’s Move on towards demo

More Related Content

What's hot

Srs online shoping
Srs online shopingSrs online shoping
Srs online shopingAbdul Saboor
 
Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shoppingSandeep Bittu
 
Online Mobile Shopping
Online Mobile ShoppingOnline Mobile Shopping
Online Mobile ShoppingPanchal Chetan
 
Shop management system
Shop management systemShop management system
Shop management systemBUBT
 
Online Shopping System
Online Shopping SystemOnline Shopping System
Online Shopping SystemKusum Sankhala
 
Online shopping system (E-commerce)
Online shopping system (E-commerce)Online shopping system (E-commerce)
Online shopping system (E-commerce)Sarp Infotech
 
business marketing assignment
business marketing assignmentbusiness marketing assignment
business marketing assignmentNitesh Balraju
 
Thefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRMThefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRMalekswatch
 

What's hot (11)

Srs online shoping
Srs online shopingSrs online shoping
Srs online shoping
 
E commerce
E commerceE commerce
E commerce
 
IBN CRM
IBN CRM IBN CRM
IBN CRM
 
Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shopping
 
Online Mobile Shopping
Online Mobile ShoppingOnline Mobile Shopping
Online Mobile Shopping
 
Shop management system
Shop management systemShop management system
Shop management system
 
My ppt
My pptMy ppt
My ppt
 
Online Shopping System
Online Shopping SystemOnline Shopping System
Online Shopping System
 
Online shopping system (E-commerce)
Online shopping system (E-commerce)Online shopping system (E-commerce)
Online shopping system (E-commerce)
 
business marketing assignment
business marketing assignmentbusiness marketing assignment
business marketing assignment
 
Thefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRMThefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRM
 

Viewers also liked

'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...Grant Goddard
 
Commemorazione Craxi 2012[1]
Commemorazione  Craxi 2012[1]Commemorazione  Craxi 2012[1]
Commemorazione Craxi 2012[1]Michele Simone
 
Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark
 
Los materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informaticaLos materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informaticaChristian Paredes Arroyo
 
Things Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small BusinessThings Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small BusinessIntuit Inc.
 
Errezeta txantiloia
Errezeta txantiloiaErrezeta txantiloia
Errezeta txantiloiaidoialariz
 

Viewers also liked (11)

'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
 
Commemorazione Craxi 2012[1]
Commemorazione  Craxi 2012[1]Commemorazione  Craxi 2012[1]
Commemorazione Craxi 2012[1]
 
Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013
 
about_limeSHIFT
about_limeSHIFTabout_limeSHIFT
about_limeSHIFT
 
Diseño de título
Diseño de títuloDiseño de título
Diseño de título
 
Los materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informaticaLos materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informatica
 
Site Mockups
Site MockupsSite Mockups
Site Mockups
 
Menú del día
Menú del día Menú del día
Menú del día
 
9 tips for gaining Self Confidence
9 tips for gaining Self Confidence9 tips for gaining Self Confidence
9 tips for gaining Self Confidence
 
Things Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small BusinessThings Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small Business
 
Errezeta txantiloia
Errezeta txantiloiaErrezeta txantiloia
Errezeta txantiloia
 

Similar to Defence

Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceMarc Boorshtein
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdfMarlboroAbyad
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerTom Keetch
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less workIevgenii Katsan
 
IT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsIT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsSieuwert van Otterloo
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...PROIDEA
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversysKrishnendu Paul
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)mikemcbryde
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service deliveryRakuten Group, Inc.
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)abend_cve_9999_0001
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessHelpSystems
 
Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point SARCCOM
 
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with AnalyticsWSO2
 

Similar to Defence (20)

Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
 
Security testing
Security testingSecurity testing
Security testing
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less work
 
IT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsIT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startups
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point
 
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 

Defence

  • 1. E-Commerce & Web Solution Online Shopping mall Group members Md.Ramiz Uddin Md.Reduanur Rahman Rafi
  • 2. Contents will covered within this session 1.Project overview with PPT 2. Showing demo product live on browser 3.Submit report.
  • 3. We proposed for A system in which will include the following features • Business-to-Consumer (B2C) • Consumer-to-consumer (C2C) • CMS for all sorts of users • Custom search
  • 4. What we have achieved ? 1.Very user friendly interface. 2.A very useful project architecture. 3.Strong security system 4.Clean code
  • 5. User experience Design 1.Easy Navigation - The navigation is not hazy just added the necessary pages in the navigation bar. - User need not to round up here and there for their desired product. - Easy to crate account - Only few information needed to create account. 2.Supper easy management system. - Just do everything in one click
  • 6. Security system in detail SQL injection How does hackers inject bad thing lets have an example. The most common thing the hacker do first is bypassing how dose it works ? Lets have a look on our sql query for a login system $query="select username,pass from users where username='$uname' and password='$passwrd' limit 0,1";
  • 7. Security system Continued Hackers generally perform bypassing like this Username : ' or ''=' Password : ' or ''=‘ Then the query looks like select username, pass from users where username='' or ''='' and password='' or ''='' limit 0,1; To get ride of this we took 2 steps First one is to validate the form so that user could not enter any special character. Then we used PDO Which contains prepare function to execute query.
  • 10. Project Architecture How does it works ? User’s request • Frontend validation controller • Check valid request • Find model Model • find data • Save data
  • 11. Project Architecture Example of controlling a process
  • 12. Complete system at a glance Search with product name Know price limit View product and order View shop Bring products with shops B2C
  • 13. Complete system at a glance C2C • Buy and sell • Find ads • Create ads • Create account Product list Search Product Get seller info Find categories
  • 14. Let’s Move on towards demo