SlideShare a Scribd company logo
1 of 5
A PROJECT REPORT

                                          ON




                                 USING JAVA

                A Project Report submitted for the partial fulfilment of the

        requirement for Bachelor of Technology in Information Technology under


                            Punjab Technical University
                           SIX MONTH INDUSTRIAL TRAINING ( SEM 8th)

                                    BATCH (2008 TO 2012)

Submitted To:                                                   Submitted By:
Miss.Ritu Bala(H.O.D)                                             Parul Sharma

Supervised By:                                                  B.Tech(I.T) 8th SEM
MR.SHER SINGH                                                   Roll no:80608113029
Acknowledgement
A project is a major milestone during the study period of a student. When
I started planning for this project, I thought that it takes just a lot of
reference material and secretarial assistance to make a project. But to my
surprise, I found that making a project is, in fact, a collective effort based
on contributions of many-known and unknown. The list of such persons is
long and their contributions have come without the desire for any return.
So, it is my pleasure to take this opportunity to thank all those people who
have helped me directly or indirectly in preparation of this project. The
making of a project of this nature, particularly in a class where not much
exposure to software development is there would not have been possible
without consulting many projects of other project makers. I am indebted
to all of them.
             I feel honored to express my sincere gratitude to Mr.Sher
Singh, his constant encouragement and co-operation have been a source
of everlasting inspiration for me in doing my project “Phishpool”. They
treated me not only as a professor but also as a friend, as a project mate. I
would also like to thank all those professors of our department to whom I
have consulted, even for smallest thing, during the project.
                                                           PARUL SHARMA
                                                               80608113029
CS Technologies is an internationally recognized Software
development, IT Training and Network Solution company with state of art
infrastructure, certified trainers and the widest range of Industry relevant
courseware covering entire IT Learning space and technologies.

 CS Technologies, having it Corporate Office in Amritsar and Chandigarh ,
 started its operation in the year 2008 ans since then it has steadily grown to
 become one of the largest providers if IT Training. CS Continues to solidify its
 industry leadership position by developing the processes for deliverling quality
 instruction for the largest technology training segments.
 The edge for CS Technologies has been its wholesome focus of International
 Certifications, Quality Training and Uncompromising Student Satisfaction. All
 the programs are devised to equip the students with unparalleled professional
 expertise as you walk out with the Internationally Acclaimed Certifications.
  CS Technologies specializes in providing High Tech Industrial Training (6
Months / 6 Weeks) to all the Engineering & MCA students mainly in Oracle DBA,
Red Hat Linux, MCSE, CISCO and JAVA Technologies with exposure to Real
time.
 We strongly believe that an atmosphere where the students feels comfortable
 and at ease makes for better learning. We have world class infrastructure having
 latest Pentium machines, high-end Routers and Switches, Licenced Software,
 Multimedia Projecters for training, Wi-Fi labs etc.
 Our centre and classrooms are designed to ensure a warm and extermely
 professional environment. We proffer air conditioned labs having high standard
 of hygiene.
1. ABSTRACT OF THE PROJECT




Phishpool.com(Antiphishing Site)
This site is a computerized, online solution to the various problems faced by
internet users who are deceived by the phishers and lose their account information,
security and data.



Overview of the Project


Phishpool is a web application developed to stop the cyber crime and to prevent
users from cyber attacks. There are a number of sites called as phishing sites on
internet which are used to leak the security and information of users like bank
accounts, emails, social networking and number of frauds done by these sites.
These sites provide users with the fake login pages to hack their accounts. So we
have developed an antiphishing site which is a huge database to detect or search
these sites.




2.   PROFILE OF THE PROBLEM ASSIGNED
With the increased popularity of the internet, the phishing
attacks are also growing over various reputed organizations and companies.
Phishing is a way of attempting to acquire information such as usernames,
passwords, and credit card details by masquerading as a trustworthy entity in an
electric communication. Communications purporting to be from popular social
web sites, auction sites, online payment processors or IT administrators are
commonly used to lure the unsuspecting public. Phishing is typically carried out by
e-mail spoofing or instant messaging, and it often directs users to enter details at a
fake website whose look and feel are almost identical to the legitimate one.
Phishing is an example of social engineering techniques used to deceive users, and
exploits the poor usability of current web security technologies. Attempts to deal
with the growing number of reported phishing incidents include legislation, user
training, public awareness, and technical security measures.

In order to lure the victim into giving up sensitive information the message might
include imperatives like "verify your account" or "confirm billing information".
Once the victim had revealed the password, the attacker could access and use the
victim's account for fraudulent purposes or spamming. Phishers are targeting the
customers of banks and online payment services.

 “Phishpool” is a web application to be developed in JAVA/ORACLE. The main
concept of this is to aware the people with phishing attacks as well as to secure
themselves. This web application has three modules for the management.

More Related Content

What's hot

Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolArash Foroughi
 
Modules and modularization criteria
Modules and modularization criteriaModules and modularization criteria
Modules and modularization criteriaUmaselvi_R
 
A presentation on software crisis
A presentation on software crisisA presentation on software crisis
A presentation on software crisischandan sharma
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communicationAnkit Anand
 
FIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement AlgorithmFIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement AlgorithmArijitRoy118
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 
Network News Transfer Protocol
Network News Transfer ProtocolNetwork News Transfer Protocol
Network News Transfer ProtocolDaniyal Khan
 
1 - Introduction to Compilers.ppt
1 - Introduction to Compilers.ppt1 - Introduction to Compilers.ppt
1 - Introduction to Compilers.pptRakesh Kumar
 
IT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGIT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGSathya R
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practicalNitesh Dubey
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 
System Performance and Feasibility Study
System Performance and Feasibility StudySystem Performance and Feasibility Study
System Performance and Feasibility StudySaifur Rahman
 
Distributed design alternatives
Distributed design alternativesDistributed design alternatives
Distributed design alternativesPooja Dixit
 

What's hot (20)

Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Modules and modularization criteria
Modules and modularization criteriaModules and modularization criteria
Modules and modularization criteria
 
A presentation on software crisis
A presentation on software crisisA presentation on software crisis
A presentation on software crisis
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
FIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement AlgorithmFIFO, LRU, OPTIMAL Page Replacement Algorithm
FIFO, LRU, OPTIMAL Page Replacement Algorithm
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Layer 2 osi
Layer 2 osiLayer 2 osi
Layer 2 osi
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
Network News Transfer Protocol
Network News Transfer ProtocolNetwork News Transfer Protocol
Network News Transfer Protocol
 
1 - Introduction to Compilers.ppt
1 - Introduction to Compilers.ppt1 - Introduction to Compilers.ppt
1 - Introduction to Compilers.ppt
 
IT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGIT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTING
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practical
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Sun NFS , Case study
Sun NFS , Case study Sun NFS , Case study
Sun NFS , Case study
 
System Performance and Feasibility Study
System Performance and Feasibility StudySystem Performance and Feasibility Study
System Performance and Feasibility Study
 
File system structure
File system structureFile system structure
File system structure
 
Distributed design alternatives
Distributed design alternativesDistributed design alternatives
Distributed design alternatives
 

Viewers also liked

Viewers also liked (10)

Project synopsis
Project synopsisProject synopsis
Project synopsis
 
Sample project-synopsis
Sample project-synopsisSample project-synopsis
Sample project-synopsis
 
Synopsis format
Synopsis formatSynopsis format
Synopsis format
 
Synopsis format
Synopsis formatSynopsis format
Synopsis format
 
SYNOPSIS WRITING
SYNOPSIS WRITINGSYNOPSIS WRITING
SYNOPSIS WRITING
 
Html, CSS & Web Designing
Html, CSS & Web DesigningHtml, CSS & Web Designing
Html, CSS & Web Designing
 
Format Of Synopsis
Format Of SynopsisFormat Of Synopsis
Format Of Synopsis
 
Web Development using HTML & CSS
Web Development using HTML & CSSWeb Development using HTML & CSS
Web Development using HTML & CSS
 
Web Design Project Report
Web Design Project ReportWeb Design Project Report
Web Design Project Report
 
Web Development on Web Project Report
Web Development on Web Project ReportWeb Development on Web Project Report
Web Development on Web Project Report
 

Similar to First Synopsis Format

Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
 
Demat account 1
Demat account 1Demat account 1
Demat account 1kammy virk
 
Taxation project new
Taxation project newTaxation project new
Taxation project newIT
 
Restricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project ReportRestricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project ReportSai Charan
 
Microsoft exchange server report final3
Microsoft exchange server report final3Microsoft exchange server report final3
Microsoft exchange server report final3Manshant Singh
 
Project Report Format for Final Year Engineering Students
Project Report Format for Final Year Engineering StudentsProject Report Format for Final Year Engineering Students
Project Report Format for Final Year Engineering Studentscutericha10
 
Campus Recruitment program for Engineering students ...
Campus Recruitment program for Engineering students                          ...Campus Recruitment program for Engineering students                          ...
Campus Recruitment program for Engineering students ...Pompeii Connect
 
Pinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb projectPinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb projectPinkleMakhijani
 
AmolKumbharDevelopment
AmolKumbharDevelopmentAmolKumbharDevelopment
AmolKumbharDevelopmentAmoL Kumbhar
 
Ankita goyal(resume) 1
Ankita goyal(resume) 1Ankita goyal(resume) 1
Ankita goyal(resume) 1Ankita Goyal
 
My Professional Profile
My Professional ProfileMy Professional Profile
My Professional ProfileMark Reha
 
Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...
Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...
Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...The Interface™
 
Cloud Computing for Knowledge Management, Learning & Innovation
Cloud Computing for Knowledge Management, Learning & InnovationCloud Computing for Knowledge Management, Learning & Innovation
Cloud Computing for Knowledge Management, Learning & Innovation2016
 
Presentation on Big Data Hadoop (Summer Training Demo)
Presentation on Big Data Hadoop (Summer Training Demo)Presentation on Big Data Hadoop (Summer Training Demo)
Presentation on Big Data Hadoop (Summer Training Demo)Ashok Royal
 

Similar to First Synopsis Format (20)

Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Demat account 1
Demat account 1Demat account 1
Demat account 1
 
Taxation project new
Taxation project newTaxation project new
Taxation project new
 
Restricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project ReportRestricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project Report
 
Hotel management report
Hotel management reportHotel management report
Hotel management report
 
Microsoft exchange server report final3
Microsoft exchange server report final3Microsoft exchange server report final3
Microsoft exchange server report final3
 
Project Report Format for Final Year Engineering Students
Project Report Format for Final Year Engineering StudentsProject Report Format for Final Year Engineering Students
Project Report Format for Final Year Engineering Students
 
Online Job Portal
Online Job PortalOnline Job Portal
Online Job Portal
 
Campus Recruitment program for Engineering students ...
Campus Recruitment program for Engineering students                          ...Campus Recruitment program for Engineering students                          ...
Campus Recruitment program for Engineering students ...
 
Pinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb projectPinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb project
 
AmolKumbharDevelopment
AmolKumbharDevelopmentAmolKumbharDevelopment
AmolKumbharDevelopment
 
Ankita goyal(resume) 1
Ankita goyal(resume) 1Ankita goyal(resume) 1
Ankita goyal(resume) 1
 
My Professional Profile
My Professional ProfileMy Professional Profile
My Professional Profile
 
Billing project
Billing projectBilling project
Billing project
 
Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...
Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...
Data Science Courses in Mumbai Learn the Latest Tools and Techniques for Care...
 
Hardik_cv
Hardik_cvHardik_cv
Hardik_cv
 
Internship at SELISE
Internship at SELISEInternship at SELISE
Internship at SELISE
 
TCF15 Program Book
TCF15 Program BookTCF15 Program Book
TCF15 Program Book
 
Cloud Computing for Knowledge Management, Learning & Innovation
Cloud Computing for Knowledge Management, Learning & InnovationCloud Computing for Knowledge Management, Learning & Innovation
Cloud Computing for Knowledge Management, Learning & Innovation
 
Presentation on Big Data Hadoop (Summer Training Demo)
Presentation on Big Data Hadoop (Summer Training Demo)Presentation on Big Data Hadoop (Summer Training Demo)
Presentation on Big Data Hadoop (Summer Training Demo)
 

Recently uploaded

E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...JeylaisaManabat1
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 

Recently uploaded (6)

E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 

First Synopsis Format

  • 1. A PROJECT REPORT ON USING JAVA A Project Report submitted for the partial fulfilment of the requirement for Bachelor of Technology in Information Technology under Punjab Technical University SIX MONTH INDUSTRIAL TRAINING ( SEM 8th) BATCH (2008 TO 2012) Submitted To: Submitted By: Miss.Ritu Bala(H.O.D) Parul Sharma Supervised By: B.Tech(I.T) 8th SEM MR.SHER SINGH Roll no:80608113029
  • 2. Acknowledgement A project is a major milestone during the study period of a student. When I started planning for this project, I thought that it takes just a lot of reference material and secretarial assistance to make a project. But to my surprise, I found that making a project is, in fact, a collective effort based on contributions of many-known and unknown. The list of such persons is long and their contributions have come without the desire for any return. So, it is my pleasure to take this opportunity to thank all those people who have helped me directly or indirectly in preparation of this project. The making of a project of this nature, particularly in a class where not much exposure to software development is there would not have been possible without consulting many projects of other project makers. I am indebted to all of them. I feel honored to express my sincere gratitude to Mr.Sher Singh, his constant encouragement and co-operation have been a source of everlasting inspiration for me in doing my project “Phishpool”. They treated me not only as a professor but also as a friend, as a project mate. I would also like to thank all those professors of our department to whom I have consulted, even for smallest thing, during the project. PARUL SHARMA 80608113029
  • 3. CS Technologies is an internationally recognized Software development, IT Training and Network Solution company with state of art infrastructure, certified trainers and the widest range of Industry relevant courseware covering entire IT Learning space and technologies. CS Technologies, having it Corporate Office in Amritsar and Chandigarh , started its operation in the year 2008 ans since then it has steadily grown to become one of the largest providers if IT Training. CS Continues to solidify its industry leadership position by developing the processes for deliverling quality instruction for the largest technology training segments. The edge for CS Technologies has been its wholesome focus of International Certifications, Quality Training and Uncompromising Student Satisfaction. All the programs are devised to equip the students with unparalleled professional expertise as you walk out with the Internationally Acclaimed Certifications. CS Technologies specializes in providing High Tech Industrial Training (6 Months / 6 Weeks) to all the Engineering & MCA students mainly in Oracle DBA, Red Hat Linux, MCSE, CISCO and JAVA Technologies with exposure to Real time. We strongly believe that an atmosphere where the students feels comfortable and at ease makes for better learning. We have world class infrastructure having latest Pentium machines, high-end Routers and Switches, Licenced Software, Multimedia Projecters for training, Wi-Fi labs etc. Our centre and classrooms are designed to ensure a warm and extermely professional environment. We proffer air conditioned labs having high standard of hygiene.
  • 4. 1. ABSTRACT OF THE PROJECT Phishpool.com(Antiphishing Site) This site is a computerized, online solution to the various problems faced by internet users who are deceived by the phishers and lose their account information, security and data. Overview of the Project Phishpool is a web application developed to stop the cyber crime and to prevent users from cyber attacks. There are a number of sites called as phishing sites on internet which are used to leak the security and information of users like bank accounts, emails, social networking and number of frauds done by these sites. These sites provide users with the fake login pages to hack their accounts. So we have developed an antiphishing site which is a huge database to detect or search these sites. 2. PROFILE OF THE PROBLEM ASSIGNED
  • 5. With the increased popularity of the internet, the phishing attacks are also growing over various reputed organizations and companies. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electric communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. In order to lure the victim into giving up sensitive information the message might include imperatives like "verify your account" or "confirm billing information". Once the victim had revealed the password, the attacker could access and use the victim's account for fraudulent purposes or spamming. Phishers are targeting the customers of banks and online payment services. “Phishpool” is a web application to be developed in JAVA/ORACLE. The main concept of this is to aware the people with phishing attacks as well as to secure themselves. This web application has three modules for the management.