Showing posts with label projects. Show all posts
Showing posts with label projects. Show all posts

Projects on PHP,PHP Projects,Projects using PHP,Projects in PHP,List of the PHP Projects,PHP Projects List,list of the Projects using PHP

01 March 2010

List of the PHP Projects :-

ieee projects free download using .NET,projects download,free download projects,B.tech mca degree projects,Projects download

09 January 2010

ieee projects free download using .NET,projects download,free download projects,B.tech mca degree projects

Free Download ieee DOT NET Projects :
You can get your project by sending me the abstract the project the date of the Project submission and then i can complete your project and can send to your mail id. And my mail id- projectswhirl@gmail.com And also you can contact me by 8106054572 More projects will be update soon...

ieee projects free download using JAVA,projects download,free download projects,B.tech mca degree projects,Projects download

ieee projects free download,projects download,free download projects,B.tech mca degree projects

Free Download ieee JAVA Projects :
You can get your project by sending me the abstract the project the date of the Project submission and then i can complete your project and can send to your mail id. And my mail id- projectswhirl@gmail.com And also you can contact me by 8106054572 More projects will be update soon...

Source code for Gym Application,Code for Gym Application,Download the Gym Application code,Gym Application Free Download

05 January 2010

Source code for Gym Application,Code for Gym Application,Download the Gym Application code,Gym Application Free Download


This is a gym application that I created for my VB class. This App. keeps track of members, employees and inventory. This program uses MS Access with SQL DAO.

For Free Download:


Source code for ADO PRIMER,Download ADO PRIMER Code,Code for ADO PRIMER,Download ADO PRIMER

you reached a stage when you realize that the standard ADO Data Control Shipped with VB is not enough for you?? Ever Wondered How You Can Connect To A Database with code? How You Can Read, Write, Delete, Change data in Tables ? Well, Here's a small Application which uses ADO Code to manipulate data in a table. I've also included code to Enable or Disable the Command Buttons in the Window based on the context (For exampling disabling First & Previous buttons when you are in the first record...).


For source code download :

Source code for Blowfish Algorithm,Code for Blowfish Algorithm,Download Blowfish Algorithm,Free Download Blowfish Algorithm

04 January 2010

Source code for Blowfish Algorithm,Code for Blowfish Algorithm,Download Blowfish Algorithm,Free Download Blowfish Algorithm

Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. Blowfish provides a good encryption rate in software and no effective cryptanalysis of it has been found to date. However, the Advanced Encryption Standard now receives more attention. Schneier designed Blowfish as a general-purpose algorithm, intended as a replacement for the aging DES and free of the problems and constraints associated with other algorithms. At the time Blowfish was released, many other designs were proprietary, encumbered by patents or were commercial/government secrets. Schneier has stated that, "Blowfish is unpatented, and will remain so in all countries. The algorithm is hereby placed in the public domain, and can be freely used by anyone." Notable features of the design include key-dependent S-boxes and a highly complex key schedule.

Blowfish Algorithm :

Blowfish has a 64-bit block size and a variable key length from 32 up to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. It is similar in structure to CAST-128, which uses fixed S-boxes. The diagram to the left shows the action of Blowfish. Each line represents 32 bits. The algorithm keeps two subkey arrays: the 18-entry P-array and four 256-entry S-boxes. The S-boxes accept 8-bit input and produce 32-bit output. One entry of the P-array is used every round, and after the final round, each half of the data block is XORed with one of the two remaining unused P-entries. The diagram to the upper left shows Blowfish's F-function. The function splits the 32-bit input into four eight-bit quarters, and uses the quarters as input to the S-boxes. The outputs are added modulo 232 and XORed to produce the final 32-bit output. Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order. This is not so obvious because xor is commutative and associative. A common mistake is to use inverse order of encryption as decryption algorithm (i.e. first XORing P17 and P18 to the ciphertext block, then using the P-entries in reverse order).
Blowfish's key schedule starts by initializing the P-array and S-boxes with values derived from the hexadecimal digits of pi, which contain no obvious pattern (see nothing up my sleeve number). The secret key is then XORed with the P-entries in order (cycling the key if necessary). A 64-bit all-zero block is then encrypted with the algorithm as it stands. The resultant ciphertext replaces P1 and P2. The ciphertext is then encrypted again with the new subkeys, and P3 and P4 are replaced by the new ciphertext. This continues, replacing the entire P-array and all the S-box entries. In all, the Blowfish encryption algorithm will run 521 times to generate all the subkeys - about 4KB of data is processed.

For Free Download :

Source code for PORT SCANNER,Download PORT SCANNER code,Free Download PORT SCANNER,Code for PORT SCANNER,Download PORT SCANNER

Source code for PORT SCANNER,Download PORT SCANNER code,Free Download PORT SCANNER,Code for PORT SCANNER,Download PORT SCANNER

Port Scanner can keeps your pc port gaurd. Keep an eye on the open ports in your local pc. A java written port scanner which looks for the open ports in the given server and logs a report of them.Click here to see a screenshot of this code!
For free download the Source code :

Source code for password retriever,Download code password retriever,Free download password retriever,Code for Password retriver

This project is a database opener which basically opens any MSAccess database w/o knowing the password. The main purpose of the program is to open a passworded database, and retrieve the password. This is helpful for databases with forgoten passwords. The program requires a "Character Set"- this is where the program retrieves several combinations for unlocking the password. if you suspect the database to include numbers and special characters simply include them in the Character Set. the program runs perfectly on high-end machines, but using it on lower-end machines do take awhile.
For Download :

A Project on "Steganography" for the B.TECH CSE AND IT STUDENTS,lsb steganography, application

29 December 2009

Least Significant Bit steganography. An image is nothing more than strings and strings of bytes, each byte representing a different color. The last few bits in a color byte, however, do not hold as much significance as the first few. This is to say that two bytes that only differ in the last few bits can represent two colors that are virtually indistinguishable to the human eye.


For example, 00100110 and 00100111 can be two different shades of red, but since it is only the last bit that differs between the two, it is impossible to see the color difference. LSB steganography, then, alters these last bits by hiding a message within them. One way of doing this is as follows. Say I wished to hide the first letter of my first name in a small section of an image.

This letter is ?I,? and the ASCII for I is 01001001. As seen from the illustration, the last bit of every byte is replaced with the corresponding bit from the letter I. The bits that have been altered are underlined.The new image now contains the desired text of the ?I? without degrading the quality of the image since only the least significant bits were altered

DOWNLOAD SOURCE CODE FOR THE Least Significant Bit steganography

SOURCE CODE FOR THE INVENTORY MANAGEMENT, CODE FOR THE INVENTORY MANAGEMENT

Inventory Control System - For Retail Store

A Complete MIS SYSTEM [With Customer Support System, Financial Management System,Inventory Control System Including Sales, Purchase, Bills Receivable and Payable,Income and Expense maintenance]

With 14 Useful Reports created In crystal report.Major Feature is that you can run whole application With keyboard only and that gives ease To User. It has developed by considering all real time business transactions. It store Customer Information so that it can be referred later on that helps In Customer Support System. When you perform any purchase or sales transaction it automatically updates inventory and you can have current stock report. You can also issue bills To customer from this software as soon as you issue sales transaction. Moreover it also have reminder that reminds you On Due bills which is available at the bottom of the software. You can also take back up of your database and later On you can restore it also but be careful While you are restoring, Select appropriate file For restore. You can also have Consistency With Customer names and Suppliers with of them is assigned On id that is automatically incremented as you add more names in to it.In customer search you can have all entries he/she has bought up to now along.

Project on DATA ENCRYPTION STANDARD, Download DATA ENCRYPTION STANDARD, source CODE FOR THE DATA ENCRYPTION STANDARD (des), des code

CODE FOR THE DATA ENCRYPTION STANDARD

The Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) that was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor. DES consequently came under intense academic scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis.

DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are unfeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES). Furthermore, DES has been withdrawn as a standard by the National Institute of Standards and Technology, which is the the National Bureau of Standards under a newer name. In some documentation, a distinction is made between DES as a standard and DES the algorithm which is referred to as the DEA (the Data Encryption Algorithm).

The algorithm as a standard :

Despite the criticisms, DES was approved as a federal standard in November 1976, and published on 15 January 1977 as FIPS PUB 46, authorized for use on all unclassified data. It was subsequently reaffirmed as the standard in 1983, 1988 (revised as FIPS-46-1), 1993 (FIPS-46-2), and again in 1999 (FIPS-46-3), the latter prescribing "Triple DES" (see below). On 26 May 2002, DES was finally superseded by the Advanced Encryption Standard (AES), following a public competition. On 19 May 2005, FIPS 46-3 was officially withdrawn, but NIST has approved Triple DES through the year 2030 for sensitive government information.

The algorithm is also specified in ANSI X3.92, NIST SP 800-67 and ISO/IEC 18033-3 (as a component of TDEA). Another theoretical attack, linear cryptanalysis, was published in 1994, but it was a brute force attack in 1998 that demonstrated that DES could be attacked very practically, and highlighted the need for a replacement algorithm. These and other methods of cryptanalysis are discussed in more detail later in the article. The introduction of DES is considered to have been a catalyst for the academic study of cryptography, particularly of methods to crack block ciphers. According to a NIST retrospective about DES,

The DES can be said to have "jump started" the nonmilitary study and development of encryption algorithms. In the 1970s there were very few cryptographers, except for those in military or intelligence organizations, and little academic study of cryptography. There are now many active academic cryptologists, mathematics departments with strong programs in cryptography, and commercial information security companies and consultants. A generation of cryptanalysts has cut its teeth analyzing (that is trying to "crack") the DES algorithm. In the words of cryptographer Bruce Schneier, "DES did more to galvanize the field of cryptanalysis than anything else. Now there was an algorithm to study." An astonishing share of the open literature in cryptography in the 1970s and 1980s dealt with the DES, and the DES is the standard against which every symmetric key algorithm since has been compared.

Computation of DES can be shown :

DES exhibits the complementation property, namely that

E_K(P)=C \Leftrightarrow E_\overline{K}(\overline{P})=\overline{C}

There are also six pairs of semi-weak keys. Encryption with one of the pair of semiweak keys, K1, operates identically to decryption with the other, K2:
E_{K_1}(E_{K_2}(P)) = P or equivalently, E_{K_2} = D_{K_1}.

To get download the Download DES CODE goto this link :

PROJECT ON THE ADXPRESS/SOURCE CODE FOR THE ADXPRESS/ADXPRESS CODE DOWNLOAD

CODE FOR THE ADXPRESS USING THE JSP

AdXpress is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. AdXpress offers a FREE World Advertising and Marketing News email service, ensuring the top global stories are delivered daily to your inbox. Our free classifieds will expose your ads to local, regional and national buyers in different countries across the globe. AdXpress is a full featured classified ad manager website. AdXpress is designed to seamlessly integrate ads in this website.

Our AdXpress ad web site is organized using an easy-to-follow index so that you can locate the classified ads you're interested in quickly and easily. We hope you'll enjoy your visit and you will opt this site for placing the ads forever and you will definitely add our site as a bookmark in your web browser. Please come back and visit us again soon.

Welcome to AdXpress. We are pleased to be able to offer you free classified advertising over the Internet. AdXpress splits your screen up into various sections. At the home page there are list of menu options. These allow you to go straight to a category you want by navigating through the sub options.

There are two types of users who can use this system:

1.Administrator
2.Member


This application allows the administrator us to manage the members through registration. He can also manage the categories and he has the right to place a new on his won, edit the ad or delete the add. Once member is registered he can place the ads in selective category. He can generate a report about which are placed by him, he can edit his ad and he deletes his ad.

It allows the administrator to manage important links information, yellow pages and he can store the ad management tasks using this application, assign the tasks to different employees and check their status.

There are two types of users who can use this system:

1.Administrator
2.Member


This application allows the administrator us to manage the members through registration. He can also manage the categories and he has the right to place a new on his won, edit the ad or delete the add. Once member is registered he can place the ads in selective category. He can generate a report about the which are placed by him, he can edit his ad and he deletes his ad.

Here the existing system is nothing but manual traditional new paper systems in which we can post thJustify Fulle ads then the customer of new paper can only see these details. In this system the company will store the business information in a record which is not safe. We need assign the tasks and get status of the tasks from an employee manually.

Disadvanatges :

1. Ad info can accessible for the customers of our new paper
2. Allows to post limited no of ads
3. Difficulty in managing different ads in different categories
4. Difficulty in updated the new links for each and every time

5. Difficulty in updated the yellow pages information

6. Difficulty in managing daily business activities of the company

7. Difficulty in tracking the tasks.

  • To download the source code goto this link : ADXPRESS
  • To download the documentation goto this link : DOCUMENTATION
  • To download the UML representation of the ADXPRESS goto this link : UML REPRESENTATION

VOIP DOWNLOAD, VOICE OVER IP FREE DOWNLOAD, SOURCE CODE FOR VOICE OVER IP (VOIP)

26 December 2009

Voice Over IP (VOIP) is a relatively new technology. Voice Over IP allows people to leave behind the old and very traditional analogue phone networks and now adapt in favor of the very new and very progressive Internet-based calling system infrastructure. Using this technology for your communications actually works out cheaper for you in the long run as it means you won't need to pay for calls if the people you are calling and speaking to are also using the same VOIP system.

Voice Over IP runs on several different types of infrastructure. This is the main reason why you should take the time to do your homework and find out how it works and what is involved, before you even consider setting up a Voice Over IP network at your home or place of business. When you do your homework you will see that invariably VOIP offers lots of advantages over and above the standard traditional telephone based analogue service that most people are currently using. Let's take a moment to examine some of the advantages of using Voice Over IP.

The main advantage of Voice Over IP is to be honest - the cost - the cost benefit goes directly back into your pocket. And because Voice Over IP uses the infrastructure of the Internet to make outgoing calls, you will never need to pay your traditional phone provider to maintain a telephone line or for phone and line rental. In addition, many Voice Over IP service providers allow customers to make long distance calls that attract minimal or no long distance charges at all. Many service providers even offer customer VOIP packages that allow you to opt for discounted internet call rates so you can save even more.

But what about this for a benefit? If you have Voice Over IP software installed on your PC and you want to speak to someone who is also uses Voice Over IP, then you are able to talk for as long as you want without having to pay a single cent. This is because your voice is actually transformed into digital data packets rather than audio, and the data is transferred in a similar fashion to that of email. Voice Over IP also makes it very easy and cheap to conduct conference calls and video calls.

There are, of course, some minor disadvantages to using VOIP and you should consider these before you embark on setting up Voice Over IP. Since Voice Over IP is a relatively recent and largely untapped technology, Voice Over IP is prone to experience more errors than using a normal phone would. In addition, if you experience a power failure, then you would be unable to make a call, like you could with a traditional analogue phone. In any event, Voice Over IP is something that you should investigate for your own home and business needs and you should consider it soon while the rates are cheap and the deals are good.

SOURCE CODE FREE DOWNLOAD:

Project on Network Protocol Simulation, Network Protocol Simulation Using Java, Free Download Network Protocol Simulation Using Java

The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. Today's IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the Internet and LANs (Local Area Networks), which emerged in the mid- to late-1980s, together with the advent of the World Wide Web in the early 1990s.


The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.


The Internet Protocol Suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the early 1970s. After initiating the pioneering ARPANET in 1969, DARPA started work on a number of other data transmission technologies. In 1972, Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks, and recognized the value of being able to communicate across both. In the spring of 1973, Vinton Cerf, the developer of the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET.

By the summer of 1973, Kahn and Cerf had worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common internetwork protocol, and, instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible. Cerf credits Hubert Zimmerman and Louis Pouzin, designer of the CYCLADES network, with important influences on this design.

The design of the network included the recognition that it should provide only the functions of efficiently transmitting and routing traffic between end nodes and that all other intelligence should be located at the edge of the network, in the end nodes. Using a simple design, it became possible to connect almost any network to the ARPANET, irrespective of their local characteristics, thereby solving Kahn's initial problem. One popular saying has it that TCP/IP, the eventual product of Cerf and Kahn's work, will run over "two tin cans and a string."

A computer called a router (a name changed from gateway to avoid confusion with other types of gateways) is provided with an interface to each network, and forwards packets back and forth between them. Requirements for routers are defined in (Request for Comments 1812).

The idea was worked out in more detailed form by Cerf's networking research group at Stanford in the 1973–74 period, resulting in the first TCP specification (Request for Comments 675) . (The early networking work at Xerox PARC, which produced the PARC Universal Packet protocol suite, much of which existed around the same period of time, was also a significant technical influence; people moved between the two.)

DARPA then contracted with BBN Technologies, Stanford University, and the University College London to develop operational versions of the protocol on different hardware platforms. Four versions were developed: TCP v1, TCP v2, a split into TCP v3 and IP v3 in the spring of 1978, and then stability with TCP/IP v4 — the standard protocol still in use on the Internet today.

In 1975, a two-network TCP/IP communications test was performed between Stanford and University College London (UCL). In November, 1977, a three-network TCP/IP test was conducted between sites in the US, UK, and Norway. Several other TCP/IP prototypes were developed at multiple research centres between 1978 and 1983. The migration of the ARPANET to TCP/IP was officially completed on January 1, 1983, when the new protocols were permanently activated.

In March 1982, the US Department of Defense declared TCP/IP as the standard for all military computer networking. In 1985, the Internet Architecture Board held a three day workshop on TCP/IP for the computer industry, attended by 250 vendor representatives, promoting the protocol and leading to its increasing commercial use.

Here the project can explain about the Network Protocol Simulation using JAVA Language as a GRAPHICAL USER INTERFACE ( GUI ) .This project can be used to explain the TCP / IP Protocols working and can be used to see the detailed working of it.
Free Download Network Protocol Simulation Using Java

Advertising Agency Using JSP,Code for Advertising Agency USING THE JSP

CODE FOR THE Advertising Agency USING THE JSP

Advertising Agency is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. Advertising Agency offers a FREE World Advertising and Marketing News email service, ensuring the top global stories are delivered daily to your inbox. Our free classifieds will expose your ads to local, regional and national buyers in different countries across the globe. Advertising Agency is a full featured classified ad manager website. Advertising Agency is designed to seamlessly integrate ads in this website.

Our Advertising Agency ad web site is organized using an easy-to-follow index so that you can locate the classified ads you're interested in quickly and easily. We hope you'll enjoy your visit and you will opt this site for placing the ads forever and you will definitely add our site as a bookmark in your web browser. Please come back and visit us again soon.

Welcome to Advertising Agency. We are pleased to be able to offer you free classified advertising over the Internet. Advertising Agency splits your screen up into various sections. At the home page there are list of menu options. These allow you to go straight to a category you want by navigating through the sub options.

There are two types of users who can use this system:

1.Administrator

2.Member

This application allows the administrator us to manage the members through registration. He can also manage the categories and he has the right to place a new on his won, edit the ad or delete the add. Once member is registered he can place the ads in selective category. He can generate a report about which are placed by him, he can edit his ad and he deletes his ad.

It allows the administrator to manage important links information, yellow pages and he can store the ad management tasks using this application, assign the tasks to different employees and check their status. For the

Advertising Agency Using JSP,Code for Advertising Agency USING THE JSP

15 December 2009

CODE FOR THE Advertising Agency USING THE JSP

Advertising Agency is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. Advertising Agency offers a FREE World Advertising and Marketing News email service, ensuring the top global stories are delivered daily to your inbox. Our free classifieds will expose your ads to local, regional and national buyers in different countries across the globe. Advertising Agency is a full featured classified ad manager website. Advertising Agency is designed to seamlessly integrate ads in this website.

Our Advertising Agency ad web site is organized using an easy-to-follow index so that you can locate the classified ads you're interested in quickly and easily. We hope you'll enjoy your visit and you will opt this site for placing the ads forever and you will definitely add our site as a bookmark in your web browser. Please come back and visit us again soon.

Welcome to Advertising Agency. We are pleased to be able to offer you free classified advertising over the Internet. Advertising Agency splits your screen up into various sections. At the home page there are list of menu options. These allow you to go straight to a category you want by navigating through the sub options.

There are two types of users who can use this system:

1.Administrator

2.Member

This application allows the administrator us to manage the members through registration. He can also manage the categories and he has the right to place a new on his won, edit the ad or delete the add. Once member is registered he can place the ads in selective category. He can generate a report about which are placed by him, he can edit his ad and he deletes his ad.

It allows the administrator to manage important links information, yellow pages and he can store the ad management tasks using this application, assign the tasks to different employees and check their status.

For the Source code Download

code for DES , DES using C/C++/JAVA/PASCAL

02 November 2009

DATA ENCRYPTION STANDARD (DES)


Foreword
The Federal Information Processing Standards Publication Series of the National Bureau of Standards (NBS) is the official publication relating to standards, guidelines, and documents adopted and promulgated under the provisions of Public Law 89-306 (Brooks Act) and under Part 6 of Title 15, Code of Federal Regulations. These legislative and executive mandates have given the Secretary of Commerce important responsibilities for improving the utilization and management of computers and automatic data processing in the Federal Government. To carry out the Secretary's responsibilities, the NBS, through its Institute for Computer Sciences and Technology, provides leadership, technical guidance, and coordination of Government efforts in the development of standards, guide-lines and documents in these areas.

Comments concerning Federal Information Processing Standards Publications are welcomed and should be addressed to the Director, Institute for Computer Sciences and Technology, National Bureau of Standards, Gaithersburg, MD 20899.

Abstract

The selective application of technological and related procedual safeguards is an important responsibility of every Federal organization in providing adequate security to its electronic data systems. This publication specifies a cryptographic algorithm which may be used by Federal organizations to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Standard is being made available for use by Federal agencies within the context of a total security program consisting of physical security procedures, good information management practices, and computer system/network access controls. This revision supersedes FIPS 46-1 in its entirety.


Key words:
data encryption standard,computer security, data encryption standard; encryption; Federal Information Processing Standard (FIPS),code for DES , DES using C/C++/JAVA/PASCAL,des

 
 
HTML Hit Counter