Mailing System Project Report(PHP)

42
CHAPTER 1 INTRODUCTION 1.1 Purpose MAILBOX SITE . This system will help the users to know automatically make account once they have registered with the website. It will also help the users to know the latest mails of their interests. 1.2 Scope There are three basic users – Anonymous, Registered Members (customers), and Administrator. The mobile interaction to aware the customers about new communication technology. The user, through the process of account creation, will have the option to Become a registered user of the site. The system will allow customers to send, receive, save mails and view sent mails... Admin has the authority to add/delete users, grant permission to members. ABOUT MAILBOX The portal’s purpose is to connect businesses seeking mailing and marketing service providers with those providers who match their needs. The portal also is an online directory of service providers based on their core competencies, abilities, and location. Mymail Connection gives higher visibility to service providers than a generic online search would produce, and connects providers to businesses across the world.

description

Mailing system industrial project report.

Transcript of Mailing System Project Report(PHP)

CHAPTER 1

INTRODUCTION

1.1 Purpose

MAILBOX SITE . This system will help the users to know automatically make account once they have registered with the website. It will also help the users to know the latest mails of their interests.

1.2 Scope

There are three basic users – Anonymous, Registered Members (customers), and Administrator.

The mobile interaction to aware the customers about new communication technology.

The user, through the process of account creation, will have the option to Become a registered user of the site. The system will allow customers to send, receive, save mails and view sent

mails... Admin has the authority to add/delete users, grant permission to members.

ABOUT MAILBOX

The portal’s purpose is to connect businesses seeking mailing and marketing service providers with those providers who match their needs. The portal also is an online directory of service providers based on their core competencies, abilities, and location. Mymail Connection gives higher visibility to service providers than a generic online search would produce, and connects providers to businesses across the world.

Our aim is to deliver your mail to you as efficiently as possible on every occasion. If something goes wrong with your e-mail account, or you have difficulty accessing any of our services, please contact us as soon as possible. Mymail is usually the best.

1.3 Definitions, Acronyms and Abbreviations

Admin:

Administrator: He has the authority to add/delete users, grant permission to members and users.

HTML:

HYPER TEXT MARKUP LANGUAGE:

Is a standard language for making web pages.

HTTP Hypertext Transfer Protocol:

It’s a service protocol.

CSS CASCADING STYLESSHEET:

Is the latest and used for designing the styling positions of WebPages.

1.4 Technologies to be used

Programming languages:

PHP (Hypertext Preprocessor)

PHP is best summarized as an embedded server-side Web-scripting language that provides developers with the capability to quickly and efficiently build dynamic Web applications.

Tools & Development Environment

MYSQL

In today's connected world, data and the systems that manage that data must always be secure yet available to our users. With MySQL, users and information technology (IT) professionals across your organization will benefit from reduced application downtime, increased scalability and performance, and tight yet flexible security controls. MySQL also includes many new and improved capabilities to help make your IT staff more productive.

In our site MYSQL plays a vital role in sending, receiving, saving mails.

OPERATING SYSTEM-Windows Xp, 2007:

Windows XP is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops and media centers. First released to computer manufacturers on August 24, 2001, it is the second most popular version of Windows, based on installed user base. The name "XP" is short for "experience.

1.5 References

Wikipedia - www.wikipedia.com www.techterms.com www.google.com www.w3school.com

1.6 Overview

Drawbacks:

No webcam support People who doesn’t have a knowledge of computer and internet cannot use the

system

Proposed System:

Registration for users(customers)in few seconds. Communication by sending and receiving is easy.. User friendly.

Our Plan:

Registration for members. Online maintenance of site.

CHAPTER 2

SYSTEM STUDY

2.1. Software Interface

Client on Internet Web Browser, Operating System(any)

Web Server WAMP

Data Base Server MYSQL

2.2. Hardware Interface

Minimum Requirements:

CLIENT:

Processor : Pentium-1 (or above)

RAM : 64 MB (or above).

HDD : 10 GB (or Above).

SERVER SIDE:

Processor : Pentium-1

(or above).

RAM : 128 MB (or above).

HDD : 20 GB (or Above).

2.3. Communication Interface

www- world wide web helps in running the website.

The HTTP protocol will be used to facilitate communication between the client and server.

2.4. Product Function

MAILBOX SITE

Some of the features of the product are as follow:

1. It focused on management of client.2. It automated the system with the help of mailbox that informs the user about the

new mail.3. It will ease and speed up the planning decision making process, secure

confidential and reliable reports.4. It helps for addressing problems of security secrecy and confidentially of

customer records.5. Used to check the delays errors inconsistencies in records and access to

historical records.

2.5. Constraints

The information of all the users must be stored in a database that is accessible by the Administrator

It is connected to the computer and is running all 24 hours a day. The users can access the site from any computer that has Internet browsing

capabilities and an Internet connect.

2.6. Assumption and Dependencies

The users have sufficient knowledge of computers. The Computer should have Internet connection and Internet server capabilities. The users know the English language, as the user interface will be provided in

English.

2.7 Use Case Model

Use cases were designed for object oriented software development they focus on what the user need to do with the system. This approach is more powerful as compared to traditional approach. It used a combination of text and pictures in order to improve the understanding of requirements. The use case describe ‘what of a system and not how of a system’. They only give the functional view of the system.

2.8 Sequence diagram

CHAPTER 3

SPECIFIC REQUIREMENT

PHP : Front End

HTML, CSS : Client Side(JAVA Script)

Mysql Server : Back End

3.1 Supplementary Requirement Safety Requirements

Highly recommend Kaspersky 2010 internet security to been Installed in users Pc to prevent the harm that may occurs by unwanted malicious software’s, phishing URLs and all the types of virus attacks during using this application.

Security Requirements

All users should be properly authenticated before allowed entry into the system authentication will be based on an E-mail address, and a password. All activities on the system must be logged.

Non-Functional Requirementso Secure access of confidential data (user’s details). SSL can be used.

24 X 7 availability. Better component design to get better performance at peak time. Flexible service based architecture will be highly desirable for future

extension.

Other Requirements

The user must be agreed with all the term and conditions that have provided by the System Administrator, local authority and Should Obey to the all International standards and Protocols.

CHAPTER 4

PROGRAM STRUCTURE AND CODING

The report should give various lists for ex. Name of variables types used in the program, Data structure, no of modules, pseudo – codes, parameter passing mechanism, files, library uses etc. and also brief explanation of source code and project scheduling. Basically, mostly ASP six objects are used for programming and variant types of variables are used in web page application. Let's see the coding structure of files.

Name of Files in the applicationSN Page Name Purpose1 Index.php Startup file2 Register.php To register 3 Header.php Header of the site4 Footer.php Footer of the site5 Connect.php To connect from database6 Account.php To check your account7 Logout.php To logout from Account8 Compose.php To Compose mail9 Sent.php To check the sent mail10 Draft.php To check the draft11 Read_draft.php To Read the draft12 Functions.php13 Read_mail.php To read the mail14 Delete.php To delete the mail

4.1 Index.php:<?php

if(isset($_POST['login']))

{

$u_name=$_POST['u_name'];

$pass=$_POST['pass'];

if(isset($_POST['cookie']))

{$cookie=$_POST['cookie'];}

include('connect.php');

$query="select u_name,password,first_name,last_name from user_data where u_name='$u_name' and password='$pass'";

$res=mysql_query($query) or die(mysql_error());

$result= mysql_num_rows($res);

$row=mysql_fetch_assoc($res);

if($result != 0)

{

if($cookie=="yes")

{

setcookie("user","$u_name",time()+60*3);

setcookie("pass","$pass",time()+60*3);

setcookie("auth",1,time()+60*3);

setcookie("f_name",$row['first_name'],time()+60*3);

setcookie("l_name",$row['last_name'],time()+60*3);

header("location:account.php");

}

else

{

session_start();

$_SESSION['user']=$u_name;

$_SESSION['pass']=$pass;

$_SESSION['auth']=1;

$_SESSION['f_name']=$row['first_name'];

$_SESSION['l_name']=$row['last_name'];

header("location:account.php");

}

}

else

{

$invalid="<font color=red><center>User name or Password is wrong....</center></font>";

}

}

?>

4.2 Register.php<?php

if(isset($_POST['register']))

{

$fname=$_POST['fname'];

$lname=$_POST['lname'];

$uname=$_POST['uname'];

$pass=$_POST['pass'];

$cfpass=$_POST['cfpass'];

$bd_date=$_POST['bd_date'];

$bd_month=$_POST['bd_month'];

$bd_year=$_POST['bd_year'];

$gender=$_POST['gender'];

$mobno=$_POST['mobile'];

$country=$_POST['country'];

/*echo $fname."<br>";

echo $lname."<br>";

echo $uname."<br>";

echo $pass."<br>";

echo $cfpass."<br>";

echo $bd_date."<br>";

echo $bd_month."<br>";

echo $bd_year."<br>";

echo $gender."<br>";

echo $mobno."<br>";

echo $country."<br>";*/

if(($pass==$cfpass) && ($bd_date > 0 && $bd_date < 32) && ( $bd_month != -1 && $bd_year != -1))

{

include('connect.php');

$query= "insert into user_data values('','$fname','$lname','$uname','$pass',$bd_date,'$bd_month',$bd_year,'$gender',$mobno,'$country')";

//$query= "insert into user_data values('','rakesh','Bhatt','raj123','123456',12,'January',2012,'male',8487490300,'Austria')";

mysql_query($query) or die('could not insert data');

}

else

{

echo "Something went wrong in password or birthdate.<br>Please go back and fill proper data...";

die();

}

}

?>

4.3 Header.php

<div id="header_bar">

<div class="content">

<img class="logo" src="images/logo.jpg" alt="google"></img>

<span class="sign_out">

<a href="logout.php">LOG OUT</a></span>

</div>

</div>

4.4 Footer.php <div class="footer-bar">

<div class="footer content clearfix" align="center">

<ul>

<li><b><font size="+1">© mailBOX.com 2013</font></b></li>

</ul>

</div>

</div>

4.5 Connect.php<?php

mysql_connect("localhost","root","") or die('could not connect to database');

mysql_select_db("gmail") or die('could not select database');

?>

4.6 Account.php<?php

session_start();

if(isset($_SESSION['auth']))

{

$f_name=$_SESSION['f_name'];

$l_name=$_SESSION['l_name'];

//echo "hello! &nbsp;".$f_name." &nbsp;you are logged in via session";

//echo "<a href='logout.php'>Logout</a>";

}

elseif(isset($_COOKIE['auth']))

{

$f_name=$_COOKIE['f_name'];

$l_name=$_COOKIE['l_name'];

//echo "hellow ".$_COOKIE['user']."you are logged in via cookie";

//echo "<a href='logout.php'>Logout</a>";

}

else

{

echo "you don't have credential...";

header("location:index.php");

}

$mail_glue= rand(10000,99999);

$_SESSION['mail_glue']=$mail_glue;

$_SESSION['inbox']= 1;

unset($_SESSION['sent_box']);

unset($_SESSION['draft']);

//echo $_SESSION['mail_glue'];

//print_r($_SESSION);

?>

4.7 Logout.php<?php

session_start();

session_destroy();

setcookie("auth","",time()-60);

header("location:index.php");

?>

4.8 Compose.php<?php

session_start();

if(isset($_SESSION['auth']))

{

$f_name=$_SESSION['f_name'];

$l_name=$_SESSION['l_name'];

//echo "hello! &nbsp;".$f_name." &nbsp;you are logged in via session";

//echo "<a href='logout.php'>Logout</a>";

}

else if(isset($_COOKIE['auth']))

{

$f_name=$_COOKIE['f_name'];

$l_name=$_COOKIE['l_name'];

//echo "hellow ".$_COOKIE['user']."you are logged in via cookie";

//echo "<a href='logout.php'>Logout</a>";

}

else

{

echo "you don't have credential...";

header("location:index.php");

}

if(isset($_POST["send-mail"]))

{

include("connect.php");

$to=$_POST["to"];

$from=$_POST["from"];

$subject=$_POST["subject"];

$message=$_POST["message"];

$query="insert into mails(sender,receiver,subject,message,flag) values('$from','$to','$subject','$message','')";

mysql_query($query);

$_SESSION['note']="sn";

header("location:sent.php");

}

if(isset($_POST['draft']))

{

include("connect.php");

$to=$_POST["to"];

$from=$_POST["from"];

$subject=$_POST["subject"];

$message=$_POST["message"];

$query="insert into mails(sender,receiver,subject,message,flag) values('$from','$to','$subject','$message','draft')";

mysql_query($query);

$_SESSION['note']="dr";

header("location:account.php");//use draft.php instead *******CORRECTED********

}

?>

4.9 Sent.php<?php

session_start();

if(isset($_SESSION['auth']))

{

$f_name=$_SESSION['f_name'];

$l_name=$_SESSION['l_name'];

//echo "hello! &nbsp;".$f_name." &nbsp;you are logged in via session";

//echo "<a href='logout.php'>Logout</a>";

}

elseif(isset($_COOKIE['auth']))

{

$f_name=$_COOKIE['f_name'];

$l_name=$_COOKIE['l_name'];

//echo "hellow ".$_COOKIE['user']."you are logged in via cookie";

//echo "<a href='logout.php'>Logout</a>";

}

else

{

echo "you don't have credential...";

header("location:index.php");

}

//echo $_SESSION['mail_glue'];

$_SESSION['sent_box']= 1;// for checking the source of the incoming mail id for delete

unset($_SESSION['inbox']);

unset($_SESSION['draft']);

//print_r($_SESSION);

?>

4.10 Draft.php<?php

session_start();

if(isset($_SESSION['auth']))

{

$f_name=$_SESSION['f_name'];

$l_name=$_SESSION['l_name'];

//echo "hello! &nbsp;".$f_name." &nbsp;you are logged in via session";

//echo "<a href='logout.php'>Logout</a>";

}

elseif(isset($_COOKIE['auth']))

{

$f_name=$_COOKIE['f_name'];

$l_name=$_COOKIE['l_name'];

//echo "hellow ".$_COOKIE['user']."you are logged in via cookie";

//echo "<a href='logout.php'>Logout</a>";

}

else

{

echo "you don't have credential...";

header("location:index.php");

}

$_SESSION['draft']= 1;

unset($_SESSION['sent_box']);

unset($_SESSION['inbox']);

?>

4.11 Read_Draft.php<?php

session_start();

if(isset($_SESSION['auth']))

{

$f_name=$_SESSION['f_name'];

$l_name=$_SESSION['l_name'];

//echo "hello! &nbsp;".$f_name." &nbsp;you are logged in via session";

//echo "<a href='logout.php'>Logout</a>";

}

else if(isset($_COOKIE['auth']))

{

$f_name=$_COOKIE['f_name'];

$l_name=$_COOKIE['l_name'];

//echo "hellow ".$_COOKIE['user']."you are logged in via cookie";

//echo "<a href='logout.php'>Logout</a>";

}

else

{

echo "you don't have credential...";

header("location:index.php");

}

if(isset($_POST['send-mail']))

{

include("connect.php");

$m_id=$_POST['del_id'];

$to=$_POST['to'];

$from=$_POST['from'];

$subject=$_POST['subject'];

$message=$_POST['message'];

$query="update mails set flag='' where id=$m_id";

mysql_query($query);

$_SESSION['note']='sn';

header("location:sent.php");

}

/*if(isset($_POST['draft']))

{

include("connect.php");

$to=$_POST['to'];

$from=$_POST['from'];

$subject=$_POST['subject'];

$message=$_POST['message'];

$query="insert into mails(sender,receiver,subject,message,flag) values('$from','$to','$subject','$message','draft')";

mysql_query($query) or die(mysql_error());

mysql_close();

}*/

if(isset($_POST['delete']))

{

include("connect.php");

$m_id=$_POST['del_id']-$_SESSION['mail_glue'];

$query="delete from mails where id=$m_id";

mysql_query($query);

$_SESSION['note']= 1;

header("location:draft.php");

}

if(isset($_GET['mail_id']))

{

$m_id=$_GET['mail_id'];

$_SESSION['mail_id']=$m_id;

header("location:read_draft.php");

}

if(isset($_SESSION['mail_id']))

{

$m_id= $_SESSION['mail_id'] - $_SESSION['mail_glue'];

include("connect.php");

$query="select * from mails where id=$m_id";

$result=mysql_query($query);

while($row=mysql_fetch_assoc($result))

{

$show_to=$row['receiver'];

$show_subject=$row['subject'];

$show_message=$row['message'];

}

}

?>

4.12 Funtions.php<?php

function exploded_string($string,$size)//pass string to be exploded and size for returning words

{

$word_array=explode(" ",$string,$size);

$new_word=implode(" ",$word_arry);

return($new_word);

}

?>

4.13 Read_mail.php<?php

session_start();

if(isset($_SESSION['auth']))

{

$f_name=$_SESSION['f_name'];

$l_name=$_SESSION['l_name'];

//echo "hello! &nbsp;".$f_name." &nbsp;you are logged in via session";

//echo "<a href='logout.php'>Logout</a>";

}

elseif(isset($_COOKIE['auth']))

{

$f_name=$_COOKIE['f_name'];

$l_name=$_COOKIE['l_name'];

//echo "hellow ".$_COOKIE['user']."you are logged in via cookie";

//echo "<a href='logout.php'>Logout</a>";

}

else

{

echo "you don't have credential...";

header("location:index.php");

}

if(isset($_GET['mail_id']))

{

$m_id=$_GET['mail_id'];

$_SESSION['mail_id']=$m_id;

header("location:read_mail.php");

}

if(isset($_SESSION['mail_id']))

{

$mail_id= $_SESSION['mail_id'] - $_SESSION['mail_glue'];

}

//anyone can read mail who is register of any other persone add securty for this *********not completely but some how fixed*********

//print_r($_SESSION);

?>

4.14 Delete.php<?

session_start();

if(isset($_SESSION['auth']))

{

$f_name=$_SESSION['f_name'];

$l_name=$_SESSION['l_name'];

//echo "hello! &nbsp;".$f_name." &nbsp;you are logged in via session";

//echo "<a href='logout.php'>Logout</a>";

}

elseif(isset($_COOKIE['auth']))

{

$f_name=$_COOKIE['f_name'];

$l_name=$_COOKIE['l_name'];

//echo "hellow ".$_COOKIE['user']."you are logged in via cookie";

//echo "<a href='logout.php'>Logout</a>";

}

else

{

echo "you don't have credential...";

header('location:index.php');

}

if(isset($_POST['del_mail']))

{

include("connect.php");

$m_id=$_POST['del_id']- $_SESSION['mail_glue'];

$query="delete from mails where id=$m_id";

mysql_query($query);

//add identification for the mail whether it is sent or recieved from the account holder and forward to the respective page

}

$_SESSION['note']="dl";

//print_r($_SESSION);

if(isset($_SESSION['inbox']) && $_SESSION['inbox'] ==1)

{

$url="../gmail.com/account.php";

}

if(isset($_SESSION['sent_box']) && $_SESSION['sent_box'] == 1)

{

$url="../gmail.com/sent.php";

}

if(isset($_SESSION['draft']) && $_SESSION['draft'] ==1)

{

$url="../gmail.com/draft.php";

}

//add html form for sending notification via session and pause php script by sleep() and then submit the values by javascript show a processing image while performing this task

?>

CHAPTER 5

SYSTEM ANALYSIS

5. Analysis and Design: -

This section should be included and depicted clearly in the project file such as flow charts, Data flow Diagrams, Use of Decision table, Structural Analysis, ER Diagram etc. This chapter deals with techniques applied in information system analysis, data modeling and normalization. This chapter shows a process of providing full specification of systems to users to help them consider and accept. This specification is also a major information source for designers of the new system. It not only specifies the system's objectives but also describes the work and its constraints to which designers have to comply.

5.1Analysis of structured system

Structural system analysis is a modern approach to different analysis and design phrases of the system development process which is accepted because of its strong points over other traditional approaches. The structural system analysis has the following main characteristics:

The system is developed in the top - down order;

During system analysis and design, several tools, techniques and models are used to record and analyze the current system and new requirements of users, and define a format for the future system;

The major tools used in structural system analysis include: function diagram, data flow diagram, data dictionary, process specification, entity relationship diagram;

Separation between physical model and logical model. A physical model is often used in surveying the current system and designing the new system while a logical model is used in

analyzing system’s requirements. This is a significant advantage brought about by the structural system analysis method;

Acknowledging users’ role in different steps of system development;

Different steps in structural analysis and designing can be carried out at the same time rather than in one by one order. Each step can improve the analysis and designing made in a previous step;

Structural analysis is supported by advanced technology in both hardware and software, therefore system development with this method is less complicated;

Structural analysis when put together with the prototype method can help users and analysts have an idea of the new system and help make best use of both methods.

CHAPTER 6

SYSTEM DESIGN SPECIFICATION

6. System Design:This chapter introduces techniques for the design of interfaces, menus, and databases, based on the requirement specification worked out during the analysis phase (functioning diagram, relationship diagram, data flow diagram...). At the end of this phase, you need to identify the borderline between the computer system and human being and find the answer to the question of how to attain the system's objectives.

The design of an appropriate information system requires that analysts understand the goals and objectives of management. They must also be sensitive to changes that may occur to these goals and objectives over tim e in response to shifts in the competitive environment.

6.1. Input Design

6.1.1. Registration of clientThis section register client information and register mail ID for specific domain.

6.1.2. Login BoardBasically, For security purpose to view mails we should login site and can see our personal mails only.

6.1.3. Mail listMail list show the list of mail in box that are sent by others.

6.1.4. Compose mailThis section contain about composing mail and sending only.

6.2.Output DesignA number of basic design principles ensure that the output is presented in a way that is easy to understand and interpret. Notes, headings, and output formats should be standardized whenever possible. Format consistency is an attribute of ‘user-friendly’ output. Users feel comfortable. With familiar layouts. Acronyms and abbreviations in output should be avoided especially when the output will serve novice users. Define words that may be unfamiliar to the user. Algorithms and assumptions on which calculations are based should be available to users of the output. This assures correct interpretation of output.

6.3.Database Design

A specialized set of programs, called a Data Base Management System (DBMS) is generally acquired to help computer users access and manipulate the data in a data base system. Most DBMSs include a special query language that allow users to access the data base.

Retrieve information from data base without having to write a program. Data can be added, retrieved, updated, and deleted from data base using DBMS functions. If writing an application program for a transactional system n batch, the programmer accesses and uses the data base by writing the program in a record-level language provided by the DBMS, which is called the host language. An important function provided by a DBMS is data independence. Data independence means that users and programmers are insulated from database. They do not know how the physical database is stored. Since all access to data is made via the DBMS, data base management systems can perform another important function- da ta access protection. For example, the DBMS might be programmed to refer to an internal security matrix to determine which data elements a particular user is permitted to access and what type of operations that users can perform- read only, write only, or read, write and delete.

6.4. Module level Design

6.5. Design MethodologyThere are many ways to approach system design and many tools and techniques that contribute to the design process. In this part we will find a discussion of still other methodologies that are comely used by analysts.

6.5.1. Information System Design and Optimization System (ISDOS):-

Will be able to generate system specifications from user requirements recorded in a machine- readable form, design an optimal system to meet these specifications, and construct code for operational system.

6.5.2. Pseudocode:Pseudocode can be used to describe an algorithm. Although pseudocode resembles structured English (SE) in using a restricted subset of English, it may be coded and more closely resemble a programming language.

6.5.3. Structured Design (SD)Nature of SD is achieved (implemented) by dividing the system in independent modules (separate pieces) that can be designed, implemented and modified with no (or little) effect on other modules of the system. Coarse (tho) program structure, based on DFD, is depicted by means of a structure chart. This structure chart, which resembles an organization chart, show relationships between units or modules, and how modules are combined to achieve systems (organization) and design goals.

6.5.4. Jackson Design Methodology (JDM)The JDM is a three-step design technique. In essence, it decomposes the design process itself.

6.5.5. Hierarchy Plus Input, Process, and Output (HIPO)

HIPO is a graphic technique that can be used to describe a system. A series of drawings are prepared by analysts that show the function of the system starting with general overview diagrams, then proceeding to detailed diagrams of each specific function.

6.6. Structure Chart

6.7. Transaction Analysis

6.8. Specific Data Abstraction, Information Hiding

6.9. System Flow

6.9.1. Home pagePurpose Over all information of web site.Sample screen

6.9.2. Registratio n client

Purpose Captures the account information of client

Sample Screen

6.9.3. Login

6.9.4. Check mail

Purpose Captures the list of mails

Sample Screen

6.9.5. Compose mail

Purpose Captures the mail out going information

Purpose Captures the major mail accountSample screen

Sample Screen

CHAPTER 7

SECURITY

7.1 Physical SecuritySource file is existed in web server so client computer can just access a copy of web page allotted by web server.

7.2 Operating System Level Security,

Use name and password project the data of individual and session object control the session which is highly used for session security. After finishing the session data cannot be accessed.

7.3 Database Security,

Database has its own username and password which save the data of database. Database consists of all the data and mail of users.

7.4 Application Security,

It’s a web base application and it depends upon the web server security. It can get all the security provided by web server.

7.5 Transaction Security,

Session is used to more secure the transaction.

7.6 Authorization of Transaction and Periods End Runs

7.7 Master File and Parameter Maintenance

7.8 System Administration

Developer himself can manage the administrative work.

CHAPTER 8

CONCLUSION

Using all of the described tools, PHP Security provides a secure environment in which users and Web Services communicate and interact.

The ultimate goal of the project is to achieve the mailing service to all individual users.