Академический Документы
Профессиональный Документы
Культура Документы
The Address Book is a free, open source contact management system. It is designed for private use by a single user, or to be shared within a larger organization, such as a club, church, or just a group of friends. Also, one of its primary goals is to take advantage the Internet's global connectivity to access contact information from virtually anywhere in the world that has a connection to the World Wide Web.
PROJECT SCOPE
Utilizes the combined power of PHP scripting and MySQL databases Flexible, robust system allows you to add a virtually unlimited number of addresses, phone numbers, and any other type of information to contacts Administration and user-level accounts to share contact information securely with clubs, organizations, co-workers, or friends. Organize contacts to one or more groups for selected listings. Display upcoming birthdays, allowing early preparation for gifts and parties. Support for languages other than English.
Mailing option.
Messages on mobile Scratch pad option.
Mugshot option.
Picture uploading option. Exporting the contacts
Data FlowDiagram
6
E-R DIAGRAM
10
11
12
14
15
16
MD5 Steps
The following five steps are performed to compute the message digest of the message. Step 1. Append Padding Bits Step 2. Append Length Step 3. Initialize MD Buffer Step 4. Process Message in 16-Word Blocks Step 5. Output
17
18
Padding is performed as follows: a single "1" bit is appended to the message, and then "0" bits are appended so that the length in bits of the padded message becomes congruent to 448, modulo 512. In all, at least one bit and at most 512 bits are appended.
19
22
23
Step 5. Output
The message digest produced as output is A, B, C, D. That is, we begin with the low-order byte of A, and end with the high-order byte of D.
24
S.No
Expected Result
Actual Result
Status
Access Granted 1
Conductor entered unregistered Conductor_id and correct Password Access Denied 2 Access Denied Pass
Conductor entered unregistered Conductor_id and wrong password Access Denied 3 Access Denied Pass
Conductor entered registered Conductor_id and wrong password Access Denied 4 Access Denied Pass
Conductor entered Conductor_id which does not start with an alphabet. Invalid Conductor_id 5 Invalid Conductor_id Pass
31
SNAP SHOTS
32
33
34
35
36
37
38
CONCLUSION
The system has successfully does the job of providing training to the user of the site. The expert panel suggestion and the impartment of training by the academician are scheduled properly to make every participant useful and successful. This feature is more powerful to skim the knowledge acquired by the users. There is a mine of gold which can fetch the users the technical feast by the system in the form of User Groups. The user groups contain technically expert solution and unsolved puzzle. MD5 algorithm is proved effective in the encryption and the confidentiality. It makes use of the hashing technique. So it is better to 39 implement.
THANK YOU
QUERIES IF ANY???
40