- Hostel Management System
- mydbaccess is a GUI for MySQL databases
- Bank Account Validator
- Computerized Internal Evaluation Test
- BugTracking System-PHP Project
- PHPProjectMaster--PHP/MySQL+XHTML/Ajax.
- WorkBench is a powerful php/mySQL bug tracking application
- SimpleTracker is a time tracking program
- Production and In-house Manufacturing Project tracking database in PHP and MySQL.
- Chess Game - PHP Project
- Small PHP Tool - PHP Project
- A web application written in PHP and MySQL
- Time Accounting Management Software
- Bug Tracking system
- A Free Hosting Control Panel for Linux
- content management system e107 - PHP Project
- Athena is a light-weight PHP & MySQL note keeper
Labels
- aicte (3)
- aieee (2)
- aiims (1)
- aipvt (1)
- apdept (1)
- appsc (9)
- bankclerks (28)
- blackberry (3)
- cardio (1)
- cdac (1)
- cinema (4)
- compitetiveexams (7)
- computer (1)
- cricket (4)
- CSE (1)
- dotnet (2)
- dotnet code snippets (1)
- dsc (1)
- eamcet (5)
- education (267)
- ekadasi (1)
- Engineering (2)
- Epass (2)
- Facinating facts (4)
- govtjobs (94)
- greetings (30)
- halltickets (1)
- hardware (1)
- holi (1)
- home (54)
- icet (4)
- ignca (1)
- iim (1)
- INDEPENDENCE DAY (1)
- IT (1)
- javaprojects (4)
- kavali (4)
- majorprojects (11)
- MCA (1)
- miniprojects (10)
- mobiles (17)
- n (1)
- news (288)
- newyeargreetings (10)
- nokia (3)
- ntpc (1)
- Nutch (1)
- pan (1)
- phpprojects (1)
- placements (80)
- projects (17)
- pvtjobs (67)
- Recruitmentgovtjobs (5)
- Recruitments (165)
- results (230)
- sankrati (7)
- Seminars (4)
- shivaratri (1)
- software products (11)
- sriramanavami (1)
- tan (1)
- technical issue (1)
- valentinesday (5)
- vbprojects (2)
- videocon (7)
- xmasgreetings (3)
Projects on PHP,PHP Projects,Projects using PHP,Projects in PHP,List of the PHP Projects,PHP Projects List,list of the Projects using PHP
01 March 2010Posted by bujjigadu 0 comments
Labels: majorprojects, phpprojects, projects
ieee projects free download using .NET,projects download,free download projects,B.tech mca degree projects,Projects download
09 January 2010
Free Download ieee DOT NET Projects :
- pFusion/Content Based Search. (.net)
- Query Processin in peer to peer networks. (.net)
- Efficient Retrieval files from Cluster based web servers. (.net)
- Student Information Maintenance system (.net)
- Three party Authentication using Quantum key distributtion protocol. (.net)
- XML database Migration. (.net)
Posted by bujjigadu 0 comments
Labels: education, majorprojects, projects, Seminars
ieee projects free download using JAVA,projects download,free download projects,B.tech mca degree projects,Projects download
Free Download ieee JAVA Projects :
- A wireless Intrusion System and a New Model. (java)

- Coupling Based Metrics for Measuring the Quality of the software. (java)
- Distributive Collaborative key agreement protocols for dynamic peer groups. (java)
- Dynamic Parallel Access. (java)
- Face Recognition Using Laplacian faces. (java)
- Hiding Sensitive Association rules. (java)
- Online Calligraphic Manuscript Recognition. (java)
- Real Time Group Editors. (java)
- Route reservation in Inter- Networks. (java)
- Secure Multisignature generation for Group key Generation. (java)
Posted by bujjigadu 0 comments
Labels: education, majorprojects, projects
Source code for Gym Application,Code for Gym Application,Download the Gym Application code,Gym Application Free Download
05 January 2010For Free Download:
- Source code for Gym Application
- Code for Gym Application
- Download the Gym Application code
- Gym Application Free Download
Posted by bujjigadu 0 comments
Labels: miniprojects, projects, vbprojects
Source code for ADO PRIMER,Download ADO PRIMER Code,Code for ADO PRIMER,Download ADO PRIMER

For source code download :
Posted by bujjigadu 0 comments
Labels: majorprojects, miniprojects, projects, vbprojects
Source code for Blowfish Algorithm,Code for Blowfish Algorithm,Download Blowfish Algorithm,Free Download Blowfish Algorithm
04 January 2010Blowfish Algorithm :
Blowfis
h has a 64-bit block size and a variable key length from 32 up to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. It is similar in structure to CAST-128, which uses fixed S-boxes. The diagram to the left shows the action of Blowfish. Each line represents 32 bits. The algorithm keeps two subkey arrays: the 18-entry P-array and four 256-entry S-boxes. The S-boxes accept 8-bit input and produce 32-bit output. One entry of the P-array is used every round, and after the final round, each half of the data block is XORed with one of the two remaining unused P-entries. The diagram to the upper left shows Blowfish's F-function. The function splits the 32-bit input into four eight-bit quarters, and uses the quarters as input to the S-boxes. The outputs are added modulo 232 and XORed to produce the final 32-bit output. Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order. This is not so obvious because xor is commutative and associative. A common mistake is to use inverse order of encryption as decryption algorithm (i.e. first XORing P17 and P18 to the ciphertext block, then using the P-entries in reverse order).For Free Download :
Posted by bujjigadu 0 comments
Labels: javaprojects, majorprojects, miniprojects, projects
Source code for PORT SCANNER,Download PORT SCANNER code,Free Download PORT SCANNER,Code for PORT SCANNER,Download PORT SCANNER
For free download the Source code :
Posted by bujjigadu 0 comments
Labels: javaprojects, majorprojects, miniprojects, projects
Source code for password retriever,Download code password retriever,Free download password retriever,Code for Password retriver
For Download :
Posted by bujjigadu 0 comments
Labels: majorprojects, miniprojects, projects
A Project on "Steganography" for the B.TECH CSE AND IT STUDENTS,lsb steganography, application
29 December 2009Least Significant Bit steganography. An image is nothing more than strings and strings of bytes, each byte representing a different color. The last few bits in a color byte, however, do not hold as much significance as the first few. This is to say that two bytes that only differ in the last few bits can represent two colors that are virtually indistinguishable to the human eye.
For example, 00100110 and 00100111 can be two different shades of red, but since it is only the last bit that differs between the two, it is impossible to see the color difference. LSB steganography, then, alters these last bits by hiding a message within them. One way of doing this is as follows. Say I wished to hide the first letter of my first name in a small section of an image.
This letter is ?I,? and the ASCII for I is 01001001. As seen from the illustration, the last bit of every byte is replaced with the corresponding bit from the letter I. The bits that have been altered are underlined.The new image now contains the desired text of the ?I? without degrading the quality of the image since only the least significant bits were altered
DOWNLOAD SOURCE CODE FOR THE Least Significant Bit steganography
Posted by bujjigadu 0 comments
Labels: miniprojects, projects
SOURCE CODE FOR THE INVENTORY MANAGEMENT, CODE FOR THE INVENTORY MANAGEMENT
With 14 Useful Reports created In crystal report.Major Feature is that you can run whole application With keyboard only and that gives ease To User. It has developed by considering all real time business transactions. It store Customer Information so that it can be referred later on that helps In Customer Support System. When you perform any purchase or sales transaction it automatically updates inventory and you can have current stock report. You can also issue bills To customer from this software as soon as you issue sales transaction. Moreover it also have reminder that reminds you On Due bills which is available at the bottom of the software. You can also take back up of your database and later On you can restore it also but be ca
Posted by bujjigadu 0 comments
Labels: miniprojects, projects
Project on DATA ENCRYPTION STANDARD, Download DATA ENCRYPTION STANDARD, source CODE FOR THE DATA ENCRYPTION STANDARD (des), des code
The Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) that was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor. DES consequently came under intense academic scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis.
DES is now considered to be insecure for many applications. This
is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are unfeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES). Furthermore, DES has been withdrawn as a standard by the National Institute of Standards and Technology, which is the the National Bureau of Standards under a newer name. In some documentation, a distinction is made between DES as a standard and DES the algorithm which is referred to as the DEA (the Data Encryption Algorithm).The algorithm as a standard :
Despite the criticisms, DES was approved as a federal standard in November 1976, and published on 15 January 1977 as FIPS PUB 46, authorized for use on all unclassified data. It was subsequently reaffirmed as the standard in 1983, 1988 (revised as FIPS-46-1), 1993 (FIPS-46-2), and again in 1999 (FIPS-46-3), the latter prescribing "Triple DES" (see below). On 26 May 2002, DES was finally superseded by the Advanced Encryption Standard (AES), following a public competition. On 19 May 2005, FIPS 46-3 was officially withdrawn, but NIST has approved Triple DES through the year 2030 for sensitive government information.

The algorithm is also specified in ANSI X3.92, NIST SP 800-67 and ISO/IEC 18033-3 (as a component of TDEA). Another theoretical attack, linear cryptanalysis, was published in 1994, but it was a brute force attack in 1998 that demonstrated that DES could be attacked very practically, and highlighted the need for a replacement algorithm. These and other methods of cryptanalysis are discussed in more detail later in the article. The introduction of DES is considered to have been a catalyst for the academic study of cryptography, particularly of methods to crack block ciphers. According to a NIST retrospective about DES,
The DES can be said to have "jump started" the nonmilitary study and development of encryption algorithms. In the 1970s there were very few cryptographers, except for those in military or intelligence organizations, and little academic study of cryptography. The
re are now many active academic cryptologists, mathematics departments with strong programs in cryptography, and commercial information security companies and consultants. A generation of cryptanalysts has cut its teeth analyzing (that is trying to "crack") the DES algorithm. In the words of cryptographer Bruce Schneier, "DES did more to galvanize the field of cryptanalysis than anything else. Now there was an algorithm to study." An astonishing share of the open literature in cryptography in the 1970s and 1980s dealt with the DES, and the DES is the standard against which every symmetric key algorithm since has been compared.Computation of DES can be shown :
DES exhibits the complementation property, namely that
or equivalently,
Posted by bujjigadu 0 comments
Labels: majorprojects, projects
PROJECT ON THE ADXPRESS/SOURCE CODE FOR THE ADXPRESS/ADXPRESS CODE DOWNLOAD
AdXpress is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. AdXpress offers a FREE World Advertising and Marketing News email service, ensuring the top global stories are delivered daily to your inbox. Our free classifieds will expose your ads to local, regional and national buyers in different countries across the globe. AdXpress is a full featured classified ad manager website. AdXpress is designed to seamlessly integrate ads in
Our AdXpress ad web site is organized using an easy-to-follow index so that you can locate the classified ads you're interested in quickly and easily. We hope you'll enjoy your visit and you will opt this site for placing the ads forever and you will definitely add our site as a bookmark in your web browser. Please come back and visit us again soon.
Welcome to AdXpress. We are pleased to be able to offer you free classified advertising over the Internet. AdXpress splits your screen up into various sections. At the home page there are list of menu options. These allow you to go straight to a category you want by navigating through the sub options.
There are two types of users who can use this system:
2.Member
This application allows the administrator us to manage the members through registration. He can also manage the categories and he has the right to place a new on his won, edit the ad or delete the add. Once member is registered he can place the ads in selective category. He can generate a report about which are placed by him, he can edit his ad and he deletes his ad.
It allows the administrator to manage important links information, yellow pages and he can store the ad management tasks using this application, assign the tasks to different employees and check their status.
There are two types of users who can use this system:
2.Member
This application allows the administrator us to manage the members through registration. He can also manage the categories and he has the right to place a new on his won, edit the ad or delete the add. Once member is registered he can place the ads in selective category. He can generate a report about the which are placed by him, he can edit his ad and he deletes his ad.
Here the existing system is nothing but manual traditional new paper systems in which we can post th
e ads then the customer of new paper can only see these details. In this system the company will store the business information in a record which is not safe. We need assign the tasks and get status of the tasks from an employee manually.Disadvanatges :
1. Ad info can accessible for the customers of our new paper
2. Allows to post limited no of ads
3. Difficulty in managing different ads in different categories
4. Difficulty in updated the new links for each and every time
5. Difficulty in updated the yellow pages information
6. Difficulty in managing daily business activities of the company
7. Difficulty in tracking the tasks.
- To download the source code goto this link : ADXPRESS
- To download the documentation goto this link : DOCUMENTATION
- To download the UML representation of the ADXPRESS goto this link : UML REPRESENTATION
Posted by bujjigadu 0 comments
Labels: majorprojects, miniprojects, projects
VOIP DOWNLOAD, VOICE OVER IP FREE DOWNLOAD, SOURCE CODE FOR VOICE OVER IP (VOIP)
26 December 2009
ans you won't need to pay for calls if the people you are calling and speaking to are also using the same VOIP system.Voice Over IP runs on several different types of infrastructure. This is the main reason why you should take the time to do your homework and find out how it works and what is involved, before you even consider setting up a Voice Over IP network at your home or place of business. When you do your homework you will see that invariably VOIP offers lots of advantages over and above the standard traditional telephone based analogue service that most people are currently using. Let's take a moment to examine some of the advantages of using Voice Over IP.

The main advantage of Voice Over IP is to be honest - the cost - the cost benefit goes directly back into your pocket. And because Voice Over IP uses the infrastructure of the Internet to make outgoing calls, you will never need to pay your traditional phone provider to maintain a telephone line or for phone and line rental. In addition, many Voice Over IP service providers allow customers to make long distance calls that attract minimal or no long distance charges at all. Many service providers even offer customer VOIP packages that allow you to opt for discounted internet call rates so you can save even more.
But what about this for a benefit? If you have Voice Over IP software installed on your PC and you want to speak to someone who is also uses Voice Over IP, then you are able to talk for as long as you want without having to pay a single cent. This is because your voice is actually transformed into digital data packets rather than audio, and the data is transferred in a similar fashion to that of email. Voice Over IP also makes it very easy and cheap to conduct conference calls and video calls.
There are, of course, some minor disadvantages to using VOIP and you should consider these before you embark on setting up Voice Over IP. Since Voice Over IP is a relatively recent and largely untapped technology, Voice Over IP is prone to experience more errors than using a normal phone would. In addition, if you experience a power failure, then you would be unable to make a call, like you could with a traditional analogue phone. In any event, Voice Over IP is something that you should investigate for your own home and business needs and you should consider it soon while the rates are cheap and the deals are good.
SOURCE CODE FREE DOWNLOAD:
Posted by bujjigadu 0 comments
Labels: majorprojects, miniprojects, projects
Project on Network Protocol Simulation, Network Protocol Simulation Using Java, Free Download Network Protocol Simulation Using Java
The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. Today's IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the Internet and LANs (Local Area Networks), which emerged in the mid- to late-1980s, together with the advent of the World Wide Web in the early 1990s.
The Internet Protocol Suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the early 1970s. After initiating the pioneering ARPANET in 1969, DARPA started work on a number of other data transmission technologies. In 1972, Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks, and recognized the value of being able to communicate across both. In the spring of 1973, Vinton Cerf, the developer of the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET.
By the summer of 1973, Kahn and Cerf had worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common internetwork protocol, and, instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible. Cerf credits Hubert Zimmerman and Louis Pouzin, designer of the CYCLADES network, with important influences on this design.

The design of the network included the recognition that it should provide only the functions of efficiently transmitting and routing traffic between end nodes and that all other intelligence should be located at the edge of the network, in the end nodes. Using a simple design, it became possible to connect almost any network to the ARPANET, irrespective of their local characteristics, thereby solving Kahn's initial problem. One popular saying has it that TCP/IP, the eventual product of Cerf and Kahn's work, will run over "two tin cans and a string."
A computer called a router (a name changed from gateway to avoid confusion with other types of gateways) is provided with an interface to each network, and forwards packets back and forth between them. Requirements for routers are defined in (Request for Comments 1812).
The idea was worked out in more detailed form by Cerf's networking research group at Stanford in the 1973–74 period, resulting in the first TCP specification (Request for Comments 675) . (The early networking work at Xerox PARC, which produced the PARC Universal Packet protocol suite, much of which existed around the same period of time, was also a significant technical influence; people moved between the two.)
DARPA then contracted with BBN Technologies, Stanford University, and the University College London to develop operational versions of the protocol on different hardware platforms. Four versions were developed: TCP v1, TCP v2, a split into TCP v3 and IP v3 in the spring of 1978, and then stability with TCP/IP v4 — the standard protocol still in use on the Internet today.
In 1975, a two-network TCP/IP communications test was performed between Stanford and University College London (UCL). In November, 1977, a three-network TCP/IP test was conducted between sites in the US, UK, and Norway. Several other TCP/IP prototypes were developed at multiple research centres between 1978 and 1983. The migration of the ARPANET to TCP/IP was officially completed on January 1, 1983, when the new protocols were permanently activated.
In March 1982, the US Department of Defense declared TCP/IP as the standard for all military computer networking. In 1985, the Internet Architecture Board held a three day workshop on TCP/IP for the computer industry, attended by 250 vendor representatives, promoting the protocol and leading to its increasing commercial use.
Here the project can explain about the Network Protocol Simulation using JAVA Language as a GRAPHICAL USER INTERFACE ( GUI ) .This project can be used to explain the TCP / IP Protocols working and can be used to see the detailed working of it.
Posted by bujjigadu 0 comments
Labels: majorprojects, projects
Advertising Agency Using JSP,Code for Advertising Agency USING THE JSP
Advertising Agency is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. Advertising Agency offers a FREE World Advertising and Marketing News email service, ensuring the top global stories are delivered daily to your inbox. Our free classifieds will expose your ads to local, regional and national buyers in different countries across the globe. Advertising Agency is a full featured classified ad manager website. Advertising Agency is designed to seamlessly integrate ads in this website.
Our Advertising Agency ad web site is organized using an easy-to-follow index so that you can locate the classified ads you're interested in quickly and easily. We hope you'll enjoy your visit and you will opt this site for placing the ads forever and you will definitely add our site as a bookmark in your web browser. Please come back and visit us again soon.
Welcome to Advertising Agency. We are pleased to be able to offer you free classified advertising over the Internet. Advertising Agency splits your screen up into various sections. At the home page there are list of menu options. These allow you to go straight to a category you want by navigating through the sub options.
1.Administrator
2.Member
Posted by bujjigadu 0 comments
Labels: miniprojects, projects
Advertising Agency Using JSP,Code for Advertising Agency USING THE JSP
15 December 2009Advertising Agency is the largest single source of online intelligence for marketing, advertising, media and research communities worldwide. Advertising Agency offers a FREE World Advertising and Marketing News email service, ensuring the top global stories are delivered daily to your inbox. Our free classifieds will expose your ads to local, regional and national buyers in different countries across the globe. Advertising Agency is a full featured classified ad manager website. Advertising Agency is designed to seamlessly integrate ads in this website.
Our Advertising Agency ad web site is organized using an easy-to-follow index so that you can locate the classified ads you're interested in quickly and easily. We hope you'll enjoy your visit and you will opt this site for placing the ads forever and you will definitely add our site as a bookmark in your web browser. Please come back and visit us again soon.
Welcome to Advertising Agency. We are pleased to be able to offer you free classified advertising over the Internet. Advertising Agency splits your screen up into various sections. At the home page there are list of menu options. These allow you to go straight to a category you want by navigating through the sub options.
There are two types of users who can use this system:
1.Administrator
2.Member
This application allows the administrator us to manage the members through registration. He can also manage the categories and he has the right to place a new on his won, edit the ad or delete the add. Once member is registered he can place the ads in selective category. He can generate a report about which are placed by him, he can edit his ad and he deletes his ad.
It allows the administrator to manage important links information, yellow pages and he can store the ad management tasks using this application, assign the tasks to different employees and check their status.
For the Source code Download
Posted by bujjigadu 0 comments
Labels: CSE, Engineering, IT, MCA, projects
code for DES , DES using C/C++/JAVA/PASCAL
02 November 2009DATA ENCRYPTION STANDARD (DES)
Comments concerning Federal Information Processing Standards Publications are welcomed and should be addressed to the Director, Institute for Computer Sciences and Technology, National Bureau of Standards, Gaithersburg, MD 20899.
The selective application of technological and related procedual safeguards is an important responsibility of every Federal organization in providing adequate security to its electronic data systems. This publication specifies a cryptographic algorithm which may be used by Federal organizations to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Standard is being made available for use by Federal agencies within the context of a total security program consisting of physical security procedures, good information management practices, and computer system/network access controls. This revision supersedes FIPS 46-1 in its entirety.
Key words:
data encryption standard,computer security, data encryption standard; encryption; Federal Information Processing Standard (FIPS),code for DES , DES using C/C++/JAVA/PASCAL,des
Posted by bujjigadu 0 comments
Labels: projects

