You are on page 1of 5

Chapter 1OBJECTIVE OF THE PROJECT1.

1 Abstract
2

 
This Mailing syste is !esigne! t" pr"#i!e a c"$nicati"n channel 
i n s i ! e   a n "rgani%ati"n bet&een !i''erent clients (Organi%ati"n sta'') "n the net&"r*.
The a i n   " b + e c t i # e   " '   t h e   p r " + e c t   i s   t "   ! e # e l " p   a   ' $ l l y  
' $ n c t i " n a l   M a i l i n g ,yste that enhances c"$nicati"ns a"ng the ebers "' the "rgani
%ati"nin a reliable- c"st e''ecti#e an! sec$re &ay. Th$s it helps the "rgani%ati"n
t"ipr"#e the per'"rance "' its teas in the c"rp"rate sect"r. This syste !esign shall be
able t" pr"#i!e the '"ll"&ing 'acilities t" the $sers/1. ,yste shall accept the ails 'r" a$th"ri
%e! $sers pr"#i!ing sec$rity.,$bitte! essages &ill be !eli#ere! t" appr"priate pers"n "nly. It
pr"#i!est h e   ' a c i l i t y   t "   r e # i e &    e s s a g e s   ' r "    t h e   r e s p e c t i # e   ' " l ! e r s .  
E ' ' e c t i # e C"$nicati"n has bec"e an integral part "' "rgani%ati"ns t"!ay. The rapi!!
e#el"pent "' ailing syste (intranets) ay pr"#i!e c"nstr$cti"n an! !
esignt e a  s   & i t h   a n   i n n " # a t i # e   t " " l   ' " r    e e t i n g   t h e s e   g r " & i n g   c "   $ n i c a t i " n ch
allenges.0 .   A   p r " + e c t   s p e c i ' i c    a i l i n g   s y s t e    $ s e s   a   ! a t a b a s e   s e r # e r   t "   s t " r e  
 a i l s in'"rati"n an! the "rgani%ati"nal in'"rati"n s$ch as $sers !etails incl$!ingthe pers"nal
in'"rati"n an! in'"rati"n re2$ests. Teas ebers can be then access this in'"rati"n
$sing the Mailing ,yste. As in'"rati"n changes-the ser#er c"ntent can be easily $p!ate! &ith ne&
"r re#ise! !ata. This
'le3iblea p p r " a c h   a l l " & s   g e " g r a p h i c a l l y   r e  " t e   p r " + e c t   t e a  s   t "   a c c e s s  
t i  e l y - c"nsistent an! acc$rate in'"rati"n &ith"$t e3pensi#e typesetting- printing-!
istrib$ti"n an! ailing charges.
1.0 Ob+ecti#e

,ec$re Mailing/ 
 The objective of this project is to describe the basic features of e-
mailing system and identify the E-mails which consist of offensive, anti-
social elementsthrough some special keywords i.e. managed by administrator and block them.

4etecti"n "' s$spici"$s $ser/ 
I t   h e l p s   i n   i d e n t i f y i n g   t h e s u s p i c i o u s   u s e r   w h o s e n d s suspicious mail that contains
harmful data like spam, virus or executable file.

,ec$rity/ 
It provides security to the organisation that adapts it. embers of the
organisation can securely communicate with each other and can send secure data !
thatshould not share to the outside world" to the other members of the organisation.
3

 

5ser 'rien!ly/ 
I t p r o v i d e s u s e r f r i e n d l y e n v i r o n m e n t .  e m b e r s o f o r g a n i s a t i o n c a n easily use it
without knowing background details of it.

Maintains re!$n!ancy/ 
It maintains redundancy in the database and provides a uni#ueuser id to the user.

C"st E''ecti#e/
 -It is cost effective because organisation do not have to pay 
f o r interacting the employees. $nd user can mail any number of mails.
4
 
 
Chapter 0I6TRO45CTIO6
5

 
Electronic mail !also known as email or e-mail" is one of the most commonly
used serviceso n t h e I n t e r n e t , a l l o w i n g p e o p l e t o s e n d m e s s a g e s t o o n e o r m o r e
r e c i p i e n t s . E m a i l w a s invented by %ay Tomlinson in &'(). any people are now using
various email services tocommunicate with each other. *ut some emails have harmful content in it
that can affect our+, aptop,etc. In this project, suspicious users who send harmful emails are
identified bydetermining the keywords used by him/her. The keywords such as bomb, %01, are found
inthe mails which are sent by the user. $ll these blocked mails are checked by the administratorand
identify the users who sent such mails. This is very useful in real-time scenario in whichyou can resume
the anti-social activities.
0.1 OVERVIE7 OF PROJECT
& "  o g i n    o d u l e )"%egistration odule2"$dministration
 o d u l e 3"anaging harmful keywords odule4 " 5 s e r    o d u l e 6 "  o m p o s i n g
ail odule
0 . 1 . 1 8 " g i n M " ! $ l e
This module is used by administrator and users !who are authenticated" to login into the 7ava8ecure ail.
The login details of the specified person will be entered and hence can enter intot h e 7 a v a 8 e c u r e
 a i l . I f a u s e r i s n o t a u t h e n t i c a t e d t h e n i t n o t i f i e s l o g i n d e t a i l s a r e n o t correct.
0.1.0 Registrati"n M"!$le
This module is used by the unauthenticated users who are unregistered. The
u s e r s m u s t register themselves by uni#ue username such that they can login into the 7ava 8ecure ail.
If
6

 
a user of same username is already exists then it notifies user already exists. If password andconfirm
password is not matched then it notifies password is not matched.
0.1.9 A!inistrati"n M"!$le
This module is used by the administrator to perform the functions lik
e   m a n a g i n g   t h e keywords, entering new keywords and to check out the block list of the discarded
mails.
0.1.:Managing har'$l *ey&"r!s M"!$le
This module is used by the administrator to perform the functions like addition, deletion
andmodification of the harmful keywords. The harmful keywords are sent to the database
andh e n c e   m a n a g e d   b y   t h e   a d m i n i s t r a t o r .   I f   k e y w o r d   a l r e a d y   e x i
s t s   t h e n   i t   t e l l s   t o   t h e administrator.
0 . 1 . ; 5 s e r   M " ! $ l e
This module is used by the users to do operations like composing mail, checking out
themails in inbox and finally sending the mails to the authenticated users by attaching a messageor file.
0.1.<C"p"sing Mail M"!$le
This module is used by the users for composing mail. In this module, user specifies
headerand body of the file and attaches a file. 9eader contains address of the recipient
and subjectof mail. *ody contains actual description of mail. :e can attach any type of file in it. If a
fileis .exe file then it will considers as harmful file. It notifies to the user that mail has sent
ornot.
0.0 Hist"ry
Email is much older than $rpanet or the Internet. It was never invented; it evolved from verysimple
beginnings.
 
Early email was just a small advance on what we know these days as afile directory - it just
put a message in another user<s directory in a spot where they could seeit when they logged
in. 8imple as that. 7ust like leaving a note on someone<s desk. +robablyt h e
first email system of this type was $I*=1,
u s e d   a t    a s s a c h u s e t t s   I n s t i t u t e   o f Technology from &'64. $nother early program to send
messages on the same computer was
7

 
called 8>08?. %ay Tomlinson is credited with inventing email in &'(). ike many of
theI n t e r n e t   i n v e n t o r s ,   T o m l i n s o n   w o r k e d f o r   * o l t   * e r a n e k   a n d   > e w m a n   a s   a n   $
% + $ > E T contractor. 9e picked the @ symbol from the computer keyboard to denote sending
messagesfrom one computer to another. 8o then, for anyone using Internet standards,
it was simply amatter of nominating name-of-the-user@name-of-the-computer. Internet pioneer 7on
+ostel,who we will hear more of later, was one of the first users of the new system, and is
creditedwith describing it as a Anice hackA. It certainly was, and it has lasted to this day.* y & ' ( 3
there were hundreds of military users of email because $%+$>ET
eventuallyencouraged it. Email became the savior of $rpanet, and caused a
r a d i c a l s h i f t i n $ r p a < s  purpose. Things developed rapidly from there. arry %oberts invented
some email folders forhis boss so he could sort his mail, a big advance. In &'(4 7ohn Bital developed some
softwareto organiCe email. *y &'(6 email had really taken off, and commercial packages
began toa p p e a r .   : i t h i n   a   c o u p l e   o f   y e a r s ,   ( 4 D   o f   a l l   $ % +
$ > E T   t r a f f i c   w a s   e m a i l . Email took us from $rpanet to the Internet. 9ere was
something that ordinary people all overthe world wanted to use.=ne of the first new developments when
personal computers came on the scene was Aoffliner e a d e r s A . = f f l i n e r e a d e r s a l l o w e d e m a i l
users to store their email on their own personalcomputers, and then read it
a n d p r e p a r e r e p l i e s w i t h o u t a c t u a l l y b e i n g c o n n e c t e d t o t h e network - sort of like
icrosoft =utlook can do today. The first important email standard wascalled 8T+, or simple message
transfer protocol. 8T+ was very simple and is still in use -however, as we will hear later in this
series, 8T+ was a fairly nave protocol, and made noa t t e m p t t o f i n d o u t w h e t h e r t h e
p e r s o n c l a i m i n g t o s e n d a m e s s a g e w a s t h e p e r s o n t h e y  purported to be. Forgery was !
and still is" very easy in email addresses. These basic flaws inthe protocol were later to be
exploited by viruses and worms, and by security frauds andspammers forging identities. 8ome
of these problems are still being addressed in )GG3. *ut
asi t   d e v e l o p e d   e m a i l   s t a r t e d   t o   t a k e   o n   s o m e   p r e t t y   n e a t   f e a t u r e s .   = n e  
o f   t h e   f i r s t   g o o d commercial systems was Eudora, developed by 8teve 0orner in &'HH. >ot long
after +egasusmail appeared.:hen Internet standards for email began to mature the +=+ !or +ost =ffice
+rotocol"
servers began to appear as a standard - before that each server was a little different. +=+ was animporta
nt standard to allow users to develop mail systems that would work with each other.These
were the days of per-minute charges for email for individual dialup users. For most
8

 
 people on the Internet in those days email and email discussion groups were the main uses.These were
many hundreds of these on a wide variety of topics, and as a body of newsgroupsthey became known
as 58E>ET.
0.9 =l"bal $se
 0espite what the :orld :ide :eb offers, email remains the most important application oft h e
Internet and the most widely used facility it has. >ow more than 6GG million
p e o p l e internationally use email. :ith the :orld :ide :eb, email started to be made available withfriendly
web interfaces by providers such as ahoo and 9otmail. 5sually this was withoutcharge.
>ow that email was affordable, everyone wanted at least one email address,
and themedium was adopted by not just millions, but hundreds of millions of people.Email remainst h e
>o. & form of communication in >orth $merica and Europe, cited by H(D and
( 3 D respectively of those polled its use as a main communications channel in the $sia-
+acificregion is at just 4HD, according to EpsilonJs K?lobal onsumer Email 8tudy.L
9

 
 Chapter 9Pr"ble ,tateent
$ great deal of business communication and workflow is centered on email, but we #uestionwhether
email is the ultimate long term solution for communication and workflow processes.:hile email is a good
method for anyone in the world to contact
10

You might also like