Intelligent adware blocker symantec
View more presentations from Pednekar Prajakta
I have created this blog to keep track and record of our BE project work. Now its easy for my project team to analyse and plan our work...
Welcome to all my BE project team.......
Intelligent Adware Blocker
Date | Subject |
7 May 2011 | Software Architecture oral |
14 May 2011 | Computer Lab Oral – II |
4 June 2011 | System Operation and Maintenance |
7 June 2011 | Distributed System |
9 June 2011 | Information Retrieval |
11 June 2011 | Software Architecture |
Prajakta | Creation of XML file from HTML pages using servlet technology | Yes |
Aditi | DOM and Xerses parser | No |
Chaitali | Modification of GUI | No |
Team members | Installation and configuration of SNORT using MySQL database. | No |
Team members | 1) TCP Client Server program using fork system call and Multithreading |
2) Dummy model with database and server program to test regular expression program for URL | |
3) How squid will redirect (Forward) all incoming traffic from webserver to specific port number | |
Chaitali | 3) Modification of GUI |
Prajakta | 4) Daemon process (To check child process status) |
1) Installation of JDK, JRE and Apache tomcat on RHEL |
2) Installation of Mysql on RHEL and creation of database |
3) Study of URL pattern using Wireshark |
4) Find out ways to know squid's dynamic port |
5) Implementation of changes in GUI |
6) Study of Putty application |
7) IPtable for SSH new, established connection |
8) Modification of Client Server program (many clients and one server) |
9) Timestamp format in squid.access.log file |
1) Study of Packet flow in Squid Proxy |
2) Client Server socket programming |
3) NETSTAT command |
4) IPTABLES and TCP reset |
5) Database Design |
6) GUI Design |
7) Regular Expression for pop-up and pop-under URL |
8) Preparation of Flowchart |
Packet flow in Squid Proxy | |
Client Server socket programming | |
NETSTAT command | |
IPTABLES and TCP reset | |
Database Design | |
GUI Design | |
Regular Expression for pop-up and pop-under URL |