SlideShare a Scribd company logo
1 of 18
FOLDER LOCK
What is Folder Lock?
Folder Lock is a security program that helps the user to secure
their data and files.
Folder Lock lets you lock and password protect files and folders
simply with the option browse.
1
Why Folder Lock?
Files and folders left unprotected can lead to theft, data-loss,
and breaches of our privacy, costing us embarrassment as well
as money. Protecting the data and information from certain
unwanted and prying eyes may become a dilemma so Folder
Lock is the only solution that offers data security at rest, in use
and in motion which gives robust protection so that intruders or
unauthorized users are stopped right in their tracks - whether to
read, view, or delete them.
2
Objectives
• To create a utility tool using a C++/CLI programming
language that can be used for securing files and folders.
• To ensure that the information remains confidential.
• To make sure that the information is available when needed.
• To enhance the programming skill.
3
Features
• Enable user to lock files and folders.
• User can also lock files to secure their data.
• Users can also get the graphical user interface for
their convenience.
• Independents users can access their files and folders
with their independent passwords.
Tools Used
Microsoft Visual Studio
2013
◇ The editor/IDE used for this
project was Visual Studio
2013. It is an integrated
development environment
(IDE) which contains
professional-grade editing,
code analysis and debugging
support.
Adobe Photoshop
◇ The photo editor used in the
project is Adobe Photoshop.
It is a raster graphics editor
which is used to create
icons of the program.
XAMPP
◇ XAMPP is a free and
open source cross-
platform web server
solution stack package
which is used to create a
local web server for
testing and deployment
purposes.
◇In this application we used C++ as our programming
language.
User
Login
Browse File
Browse Folder
Lock
Unlock
Change Password
What Users can do?
Login Screen
◇Opening window of application.
◇Simple GUI (Graphical User Interface)
◇Consists of two textbox and two buttons.
a. Textbox to enter username and password (Default)
b. Username and password cannot be null, and maximum size is 32.
c. Exit button
d. Login button
Application: working mechanism
Login Screen
Continue…
Buttons
a. Browse file ->To browse the file to lock.
b. Browse folder -> To browse the respective directory to lock.
c. Lock -> To lock the folder/file
d. Unlock -> Unlocks the locked folder/file
Main Window
◇This is our second window of application
◇Opens if username and password entered are correct.
◇Displays the path of the selected folder
◇Consists of 3 Sub-menu and 4 buttons
🔑
Main Window (Home)
Continue…
◇Home (Main Window)
-> This is the main
window/control panel of the
application
->Where user can lock and
unlock their folders and
navigate to other sub menu.
◇Settings
-> This window provides user
to change their current
password.
->Old password required.
-> New password must be
entered twice for confirmation.
Sub-Menu
◇About
-> This window provides
details about
a. Application
b. Developers and their
contact info.
->Click on labels to perform
different task.
Settings and About
◇ This application is available to only windows user.
◇ This application can be transferred to another PC/Laptop but
couldn’t connect to the database.
◇ Should login with default username and password for first time.
◇ User can’t change their username
◇ Hackers can get into those data’s using certain security hole, SQL
injection.
◇ No registration form.
Limitations
Quick-Fix to the Flaws
◇To make the application available in other operation systems,
◇Registration feature can be added if its necessarily important
◇Changing of username can be added.
◇Using online server for remote database access.
Conclusions
We are highly satisfied and motivated by the results
obtained at the end of this project. The project was a
new experience when it came to the testing phase.
Folder Lock has many possibilities for the future
enhancement and availability of privacy.
Credits
Special thanks to our project supervisor Mr. Satyendra Nath Lohani,
who has directed the execution of tasks in the project in a sequential
and in an efficient manner.
Here again thanking those beautiful hands and great minds that have
helped us to complete this project.
Thank you

More Related Content

What's hot

Logical Volume Manager. An Introduction
Logical Volume Manager. An IntroductionLogical Volume Manager. An Introduction
Logical Volume Manager. An IntroductionJuan A. Suárez Romero
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in LinuxSAMUEL OJO
 
Google Megastore
Google MegastoreGoogle Megastore
Google Megastorebergwolf
 
First fit , Best fit, Worst fit
First fit , Best fit, Worst fitFirst fit , Best fit, Worst fit
First fit , Best fit, Worst fitShahzeb Amjad
 
Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUXSHUBHA CHATURVEDI
 
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memorysgpraju
 
Deadlock detection and recovery by saad symbian
Deadlock detection and recovery by saad symbianDeadlock detection and recovery by saad symbian
Deadlock detection and recovery by saad symbiansaad symbian
 
Understanding GIT and Version Control
Understanding GIT and Version ControlUnderstanding GIT and Version Control
Understanding GIT and Version ControlSourabh Sahu
 
File System Interface
File System InterfaceFile System Interface
File System Interfacechandinisanz
 
Allocating of Frames.pptx
Allocating of Frames.pptxAllocating of Frames.pptx
Allocating of Frames.pptxinfomerlin
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentationhamza haseeb
 
Git and github fundamentals
Git and github fundamentalsGit and github fundamentals
Git and github fundamentalsRajKharvar
 
Software management in linux
Software management in linuxSoftware management in linux
Software management in linuxnejadmand
 

What's hot (20)

Gnome and kde
Gnome and kdeGnome and kde
Gnome and kde
 
Logical Volume Manager. An Introduction
Logical Volume Manager. An IntroductionLogical Volume Manager. An Introduction
Logical Volume Manager. An Introduction
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in Linux
 
Google Megastore
Google MegastoreGoogle Megastore
Google Megastore
 
First fit , Best fit, Worst fit
First fit , Best fit, Worst fitFirst fit , Best fit, Worst fit
First fit , Best fit, Worst fit
 
Window architecture
Window architecture Window architecture
Window architecture
 
Eclipse - Installation and quick start guide
Eclipse - Installation and quick start guideEclipse - Installation and quick start guide
Eclipse - Installation and quick start guide
 
Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
 
Os Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual MemoryOs Swapping, Paging, Segmentation and Virtual Memory
Os Swapping, Paging, Segmentation and Virtual Memory
 
Deadlock detection and recovery by saad symbian
Deadlock detection and recovery by saad symbianDeadlock detection and recovery by saad symbian
Deadlock detection and recovery by saad symbian
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Understanding GIT and Version Control
Understanding GIT and Version ControlUnderstanding GIT and Version Control
Understanding GIT and Version Control
 
Kernal
KernalKernal
Kernal
 
File System Interface
File System InterfaceFile System Interface
File System Interface
 
Allocating of Frames.pptx
Allocating of Frames.pptxAllocating of Frames.pptx
Allocating of Frames.pptx
 
Operating system paging and segmentation
Operating system paging and segmentationOperating system paging and segmentation
Operating system paging and segmentation
 
Git and github fundamentals
Git and github fundamentalsGit and github fundamentals
Git and github fundamentals
 
Software management in linux
Software management in linuxSoftware management in linux
Software management in linux
 
Acknowledgement
AcknowledgementAcknowledgement
Acknowledgement
 
Disk scheduling
Disk schedulingDisk scheduling
Disk scheduling
 

Similar to Presentation

Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Cardiff University FTS presentation 2011 (MS Word plug in)
Cardiff University FTS presentation 2011 (MS Word plug in)Cardiff University FTS presentation 2011 (MS Word plug in)
Cardiff University FTS presentation 2011 (MS Word plug in)salsalamah
 
Dreamwares Recent Projects
Dreamwares Recent ProjectsDreamwares Recent Projects
Dreamwares Recent ProjectsDreamwares
 
FILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERFILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERRajesh Roky
 
SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5Marcus_Wong
 
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Abhay Ananda Shukla
 
synopsis for ediary
synopsis for ediarysynopsis for ediary
synopsis for ediaryDeepak JI
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
Bapi_Sarkar_Resume_Update
Bapi_Sarkar_Resume_UpdateBapi_Sarkar_Resume_Update
Bapi_Sarkar_Resume_UpdateBapi Sarkar
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptxDeeJeeV
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
File encryption decryption
File encryption decryptionFile encryption decryption
File encryption decryptionAmitSaha123
 

Similar to Presentation (20)

Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Syncitall
SyncitallSyncitall
Syncitall
 
DoChronicle
DoChronicleDoChronicle
DoChronicle
 
Cardiff University FTS presentation 2011 (MS Word plug in)
Cardiff University FTS presentation 2011 (MS Word plug in)Cardiff University FTS presentation 2011 (MS Word plug in)
Cardiff University FTS presentation 2011 (MS Word plug in)
 
Dreamwares Recent Projects
Dreamwares Recent ProjectsDreamwares Recent Projects
Dreamwares Recent Projects
 
Ecommerce srs
Ecommerce  srsEcommerce  srs
Ecommerce srs
 
FILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERFILE SPLITTER AND JOINER
FILE SPLITTER AND JOINER
 
SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5
 
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2
 
synopsis for ediary
synopsis for ediarysynopsis for ediary
synopsis for ediary
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Lab 2 software
Lab 2   softwareLab 2   software
Lab 2 software
 
Bapi_Sarkar_Resume_Update
Bapi_Sarkar_Resume_UpdateBapi_Sarkar_Resume_Update
Bapi_Sarkar_Resume_Update
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptx
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Rockets isys363
Rockets isys363Rockets isys363
Rockets isys363
 
Rockets isys363
Rockets isys363Rockets isys363
Rockets isys363
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
File encryption decryption
File encryption decryptionFile encryption decryption
File encryption decryption
 

Presentation

  • 2. What is Folder Lock? Folder Lock is a security program that helps the user to secure their data and files. Folder Lock lets you lock and password protect files and folders simply with the option browse. 1
  • 3. Why Folder Lock? Files and folders left unprotected can lead to theft, data-loss, and breaches of our privacy, costing us embarrassment as well as money. Protecting the data and information from certain unwanted and prying eyes may become a dilemma so Folder Lock is the only solution that offers data security at rest, in use and in motion which gives robust protection so that intruders or unauthorized users are stopped right in their tracks - whether to read, view, or delete them. 2
  • 4. Objectives • To create a utility tool using a C++/CLI programming language that can be used for securing files and folders. • To ensure that the information remains confidential. • To make sure that the information is available when needed. • To enhance the programming skill. 3
  • 5. Features • Enable user to lock files and folders. • User can also lock files to secure their data. • Users can also get the graphical user interface for their convenience. • Independents users can access their files and folders with their independent passwords.
  • 6. Tools Used Microsoft Visual Studio 2013 ◇ The editor/IDE used for this project was Visual Studio 2013. It is an integrated development environment (IDE) which contains professional-grade editing, code analysis and debugging support. Adobe Photoshop ◇ The photo editor used in the project is Adobe Photoshop. It is a raster graphics editor which is used to create icons of the program. XAMPP ◇ XAMPP is a free and open source cross- platform web server solution stack package which is used to create a local web server for testing and deployment purposes. ◇In this application we used C++ as our programming language.
  • 8. Login Screen ◇Opening window of application. ◇Simple GUI (Graphical User Interface) ◇Consists of two textbox and two buttons. a. Textbox to enter username and password (Default) b. Username and password cannot be null, and maximum size is 32. c. Exit button d. Login button Application: working mechanism
  • 10. Continue… Buttons a. Browse file ->To browse the file to lock. b. Browse folder -> To browse the respective directory to lock. c. Lock -> To lock the folder/file d. Unlock -> Unlocks the locked folder/file Main Window ◇This is our second window of application ◇Opens if username and password entered are correct. ◇Displays the path of the selected folder ◇Consists of 3 Sub-menu and 4 buttons 🔑
  • 12. Continue… ◇Home (Main Window) -> This is the main window/control panel of the application ->Where user can lock and unlock their folders and navigate to other sub menu. ◇Settings -> This window provides user to change their current password. ->Old password required. -> New password must be entered twice for confirmation. Sub-Menu ◇About -> This window provides details about a. Application b. Developers and their contact info. ->Click on labels to perform different task.
  • 14. ◇ This application is available to only windows user. ◇ This application can be transferred to another PC/Laptop but couldn’t connect to the database. ◇ Should login with default username and password for first time. ◇ User can’t change their username ◇ Hackers can get into those data’s using certain security hole, SQL injection. ◇ No registration form. Limitations
  • 15. Quick-Fix to the Flaws ◇To make the application available in other operation systems, ◇Registration feature can be added if its necessarily important ◇Changing of username can be added. ◇Using online server for remote database access.
  • 16. Conclusions We are highly satisfied and motivated by the results obtained at the end of this project. The project was a new experience when it came to the testing phase. Folder Lock has many possibilities for the future enhancement and availability of privacy.
  • 17. Credits Special thanks to our project supervisor Mr. Satyendra Nath Lohani, who has directed the execution of tasks in the project in a sequential and in an efficient manner. Here again thanking those beautiful hands and great minds that have helped us to complete this project.