SlideShare a Scribd company logo
1 of 14
E-Commerce & Web Solution
Online Shopping mall
Group members
Md.Ramiz Uddin
Md.Reduanur Rahman Rafi
Contents will covered within
this session
1.Project overview with PPT
2. Showing demo product live on browser
3.Submit report.
We proposed for
A system in which will include the following features
• Business-to-Consumer (B2C)
• Consumer-to-consumer (C2C)
• CMS for all sorts of users
• Custom search
What we have achieved ?
1.Very user friendly interface.
2.A very useful project architecture.
3.Strong security system
4.Clean code
User experience Design
1.Easy Navigation
- The navigation is not hazy just added the necessary
pages in the navigation bar.
- User need not to round up here and there for their
desired product.
- Easy to crate account
- Only few information needed to create account.
2.Supper easy management system.
- Just do everything in one click
Security system in detail
SQL injection
How does hackers inject bad thing lets have an
example.
The most common thing the hacker do first is bypassing
how dose it works ?
Lets have a look on our sql query for a login system
$query="select username,pass from users where
username='$uname' and password='$passwrd' limit 0,1";
Security system Continued
Hackers generally perform bypassing like this
Username : ' or ''='
Password : ' or ''=‘
Then the query looks like
select username, pass from users where username='' or
''='' and password='' or ''='' limit 0,1;
To get ride of this we took 2 steps
First one is to validate the form so that user could not enter
any special character.
Then we used PDO
Which contains prepare function to execute query.
Project Architecture
Project Architecture
Project Architecture
How does it works ?
User’s
request • Frontend
validation
controller
• Check valid
request
• Find model
Model
• find data
• Save data
Project Architecture
Example of controlling a process
Complete system at a glance
Search with
product name
Know price limit
View product
and order
View shop
Bring products
with shops
B2C
Complete system at a glance
C2C
• Buy and
sell
• Find
ads
• Create
ads
• Create
account
Product
list
Search
Product
Get seller
info
Find
categories
Let’s Move on towards demo

More Related Content

What's hot

Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shopping
Sandeep Bittu
 
business marketing assignment
business marketing assignmentbusiness marketing assignment
business marketing assignment
Nitesh Balraju
 

What's hot (11)

Srs online shoping
Srs online shopingSrs online shoping
Srs online shoping
 
E commerce
E commerceE commerce
E commerce
 
IBN CRM
IBN CRM IBN CRM
IBN CRM
 
Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shopping
 
Online Mobile Shopping
Online Mobile ShoppingOnline Mobile Shopping
Online Mobile Shopping
 
Shop management system
Shop management systemShop management system
Shop management system
 
My ppt
My pptMy ppt
My ppt
 
Online Shopping System
Online Shopping SystemOnline Shopping System
Online Shopping System
 
Online shopping system (E-commerce)
Online shopping system (E-commerce)Online shopping system (E-commerce)
Online shopping system (E-commerce)
 
business marketing assignment
business marketing assignmentbusiness marketing assignment
business marketing assignment
 
Thefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRMThefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRM
 

Viewers also liked

Commemorazione Craxi 2012[1]
Commemorazione  Craxi 2012[1]Commemorazione  Craxi 2012[1]
Commemorazione Craxi 2012[1]
Michele Simone
 
Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013
Emma Clark
 

Viewers also liked (11)

'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
 
Commemorazione Craxi 2012[1]
Commemorazione  Craxi 2012[1]Commemorazione  Craxi 2012[1]
Commemorazione Craxi 2012[1]
 
Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013
 
about_limeSHIFT
about_limeSHIFTabout_limeSHIFT
about_limeSHIFT
 
Diseño de título
Diseño de títuloDiseño de título
Diseño de título
 
Los materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informaticaLos materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informatica
 
Site Mockups
Site MockupsSite Mockups
Site Mockups
 
Menú del día
Menú del día Menú del día
Menú del día
 
9 tips for gaining Self Confidence
9 tips for gaining Self Confidence9 tips for gaining Self Confidence
9 tips for gaining Self Confidence
 
Things Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small BusinessThings Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small Business
 
Errezeta txantiloia
Errezeta txantiloiaErrezeta txantiloia
Errezeta txantiloia
 

Similar to Defence

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
Krishnendu Paul
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
krushnaborade2
 

Similar to Defence (20)

Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
 
Security testing
Security testingSecurity testing
Security testing
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less work
 
IT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsIT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startups
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point
 
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Defence

  • 1. E-Commerce & Web Solution Online Shopping mall Group members Md.Ramiz Uddin Md.Reduanur Rahman Rafi
  • 2. Contents will covered within this session 1.Project overview with PPT 2. Showing demo product live on browser 3.Submit report.
  • 3. We proposed for A system in which will include the following features • Business-to-Consumer (B2C) • Consumer-to-consumer (C2C) • CMS for all sorts of users • Custom search
  • 4. What we have achieved ? 1.Very user friendly interface. 2.A very useful project architecture. 3.Strong security system 4.Clean code
  • 5. User experience Design 1.Easy Navigation - The navigation is not hazy just added the necessary pages in the navigation bar. - User need not to round up here and there for their desired product. - Easy to crate account - Only few information needed to create account. 2.Supper easy management system. - Just do everything in one click
  • 6. Security system in detail SQL injection How does hackers inject bad thing lets have an example. The most common thing the hacker do first is bypassing how dose it works ? Lets have a look on our sql query for a login system $query="select username,pass from users where username='$uname' and password='$passwrd' limit 0,1";
  • 7. Security system Continued Hackers generally perform bypassing like this Username : ' or ''=' Password : ' or ''=‘ Then the query looks like select username, pass from users where username='' or ''='' and password='' or ''='' limit 0,1; To get ride of this we took 2 steps First one is to validate the form so that user could not enter any special character. Then we used PDO Which contains prepare function to execute query.
  • 10. Project Architecture How does it works ? User’s request • Frontend validation controller • Check valid request • Find model Model • find data • Save data
  • 11. Project Architecture Example of controlling a process
  • 12. Complete system at a glance Search with product name Know price limit View product and order View shop Bring products with shops B2C
  • 13. Complete system at a glance C2C • Buy and sell • Find ads • Create ads • Create account Product list Search Product Get seller info Find categories
  • 14. Let’s Move on towards demo