Documentation According to Contents (1)

72
Virus Information System 1. INTRODUCTION 1.1 MOTIVATION As the use of the Internet began to grow in the late 1980s and early 1990s, viruses began to be created for different reasons. Although a lot of viruses are written for fame and proof of concept, more viruses began to be created for spying on other people, other companies, and other governments. The term spying does not just refer to spyware, which is a form of malicious code that tracks the actions of users and then sells this information to advertisers. Instead, spying viruses refer to any type of virus that is installed on a computer to allow remote access to a computer by unauthorized persons. These viruses can be in the form of a Trojan horse that creates a backdoor, a virus that installs a key logger for capturing data, or any other type of software that provides unauthorized access to information on a computer system. Due to the above poblems faced by the people or the organisations who are using the personal computer for doning there work have to install an antivirus software into there system which prevents there system form virus. Now a days every one is using an antivirus in there system to project there system from virus. If a virus attacks to a system they are using a antivirus available in the market ofcorce it is hamfull to such but they don’t know what is the correct Tenali Engineering College Page 1

Transcript of Documentation According to Contents (1)

Page 1: Documentation According to Contents (1)

Virus Information System

1. INTRODUCTION

1.1 MOTIVATION

As the use of the Internet began to grow in the late 1980s and early 1990s, viruses

began to be created for different reasons. Although a lot of viruses are written for fame and

proof of concept, more viruses began to be created for spying on other people, other

companies, and other governments. The term spying does not just refer to spyware, which is

a form of malicious code that tracks the actions of users and then sells this information to

advertisers. Instead, spying viruses refer to any type of virus that is installed on a computer to

allow remote access to a computer by unauthorized persons. These viruses can be in the form

of a Trojan horse that creates a backdoor, a virus that installs a key logger for capturing data,

or any other type of software that provides unauthorized access to information on a computer

system.

Due to the above poblems faced by the people or the organisations who are using the

personal computer for doning there work have to install an antivirus software into there

system which prevents there system form virus. Now a days every one is using an antivirus

in there system to project there system from virus. If a virus attacks to a system they are

using a antivirus available in the market ofcorce it is hamfull to such but they don’t know

what is the correct antivirus required to them. So this is the reason why we have developed

this project which give the information to the user about virus and the correct antivirus to the

virus, is provided in our project.

1.2 Problem Defination

Systems such as ebay, tucows, download.com only provide Antivirus downloads .But

they don’t provide information about updates.They don’t contain latest Virus

information.They don’t have all Antivirus developers at one place.Visitor cannot get any

information about the existing virus.Visitor may not get correct information about which

antivirus he has to purchase. Any person cannot post their information with respect to the

Viruses.User cannot update the system.Visitor may face some unnecessary problems.

Feed back may not be taken properly

Tenali Engineering College Page 1

Page 2: Documentation According to Contents (1)

Virus Information System

1.3 Objectives of Project

The main objective of our poject is to provide the information of virus to the users.

Here we proviede the information of various viruses at one place and user can give the

feedback about the project and he can upload a virus to which he need an antivirus not only

that if any user developed an antivirus he can upload it into our site so it can be used by the

other users who need it.

1.4 Limitations of Project

As this project is about giving the information of virus to the users which is usefull to

them but there is a drwaback in our porject that every one may use our site and there is no

security porvided to them in this site. At present in our project the antivirus available to the

user are not lisensed so they may cause problem to the user system who download them.

1.5 Organisation of Documentation

In this project documentation we have initially put the definition and objective

of the project as well as the design of the project which is followed by the

implementation and testing phases. Finally the project has been concluded

successfully and also the future enhancements of the project were given in this

documentation.

Tenali Engineering College Page 2

Page 3: Documentation According to Contents (1)

Virus Information System

2. LETERATURE SURVEY2.1 INTODCUTION

1981/82, the first computer viruses in a wild have been developed. The programs

infect Apple 11 disks without deleting data. It is called Elk Cloner. In 1983, the first

documented experimental virus has been developed by Fred Cohen. Ralf Burger from

Germany has presented Virdem virus during Chaos Computer Club conference. It establishes

itself in the disk's boot sector. A small Pakistani computer firm developed Brain virus whose

purpose is to foster customer loyalty. In 1987, Lehigh virus becomes the first virus to infect

command.com. Jerusalem or also known as Friday the Thirteenth is the first virus to establish

itself in the main memory (RAM). It affects the computer in two ways: On any thirteenth day

of the month falling on Friday and on all other days, the virus reduces computer speed after

30 minutes. In 1988, Denny Yanuar Ramdhani from Bandung, Indonesia has developed Zuk;

the first anti-virus. It recognizes and removes the Brain virus and then replaces it with a copy

itself. The first memory resident virus; Cascade, loose into the wilderness in 1988. This virus

has been developed by anonymous from Germany. In 1989, the first polymorphic virus is

discovered. It is called as Washburn or V2Px 1260.

Symantec introduces Norton Anti-virus in 1990. This is the first anti-virus programs

developed by a large Internet company. In 1990, Verband Deutscher Virenhebhaber has

developed the first virus construction kit for DOS systems. This kit enables someone to

assemble new viruses. Mutation Engine program has been developed by Dark Avenger. This

program can be used to generate polymorphic viruses from simple viruses. This program has

been introduced in 1992. In 1993, the anti-virus industry presents its first wild list. This is a

list of all computer viruses which surface "in the wild" that is directly on the user's PC.

Goodd Times is the first hoax. This virus supposedly causes the entire contents of the hard

disk to be deleted, merely by reading the message. This virus was launched on 1994. In 1995,

the first macro virus which infects Microsoft Word documents was introduced. It is called

Concept. WM/Concept was the first virus specifically written for the Microsoft Word system

and discovered "in the wild". In 1995, the first Windows 95 virus; Boza was launched. On

the 31"' of each month it issues a message regarding its creators; Quantum. Beside that,

XM.Laroux; the first Excel virus make sits appearance in Alaska and Africa. Staog, the first

Linuc virus is found in the lab but it is never spotted in the wild. Linux Bliss is the first Linux

Tenali Engineering College Page 3

Page 4: Documentation According to Contents (1)

Virus Information System

virus in the wild found in 1997. It searches for programs for which current process has write

permission and then overwrite such files with its viral code. In 1998, the first VB script virus;

VBS.Rabbit was found.

2.2 Existing System:

Systems such as ebay, tucows, download.com only provide Antivirus downloads .But

they don’t provide information about updates.They don’t contain latest Virus

information.They don’t have all Antivirus developers at one place.

2.3 Disadvantages of Existing System:

1. Visitor cannot get any information about the existing virus.

2. Visitor may not get correct information about which antivirus he has to purchase

3. Any person cannot post their information with respect to the Viruses.

4. User cannot update the system.

5. Visitor may face some unnecessary problems.

6. Feed back may not be taken properly

2.4 Proposed System:

This system allows the users to report about new viruses and their symptoms.Allows

freelance developers to develop antivirus.Provide latest updates.Take Feedbacks to optimize

the system.Give performance rankings to the members

2.5 Advantages of Proposed System

1. Time & money can be saved

2. Can access any type of information required by anyone.

3. User can upload the antiviruses which he have.

4. Employees week ness & strengths can be known online

5. Features are added with respect to the feedback sent.

2.6 CONCLUSION

In this we specify the how proposed system is more usefull than the existing system.

It is operationally feasible because now a days every one uses system and internet so every

one can easily use this porject

Tenali Engineering College Page 4

Page 5: Documentation According to Contents (1)

Virus Information System

3. ANYALYSIS

3.1 Introduction

After analyzing the requirements of the task to be performed, the next step is to

analyze the problem and understand its context. The first activity in the phase is studying

the existing system and other is to understand the requirements and domain of the new

system. Both the activities are equally important but the first activity serves as a basis of

giving the functional specifications and then successful design of the proposed system.

Understanding the properties and requirements of a new system is more difficult and

requires creative thinking as well as understanding of existing system is also difficult.

Improper understanding of present system can lead diversion from solution.

Technical Feasibility

This project, Employee Performance and Recognition Portal needs the support to

average technology already being implemented for other useful systems in a company. It

requires PC’s and a modem with normal configuration for Internet access. Almost all

administrators have their own PC on their desk. Thus it is technically feasible to implement

the new system here.

Economic Feasibility

“Employee Performance and Recognition Portal” is a mid-scale project. It is very

much useful to employees as well as admin people in reducing manual work which increases

the productivity of the company. The infrastructure for the development of their new system

is available in the company. The system is developed at no additional cost. Hence it is

economically feasible for the new system to be implemented.

Operational Feasibility

This system is being automated on the request of the employees of a company and the

management people. This new system meets their requirement and covers all aspects

required much better than the old manual system. Most of the people involved in this

company are computer literates and do not need much training if this system is implemented.

Hence it is operationally feasible.

Tenali Engineering College Page 5

Page 6: Documentation According to Contents (1)

Virus Information System

3.2 Software Requirement Specification

3.2.1 User requirement

Personal computer with modem connection

Username and password for the purpose of logining into the site and download an

antivirus

3.2.2 Software requirement

Operating System : Windows 2000/xp Professional

Operating environment : HTML

Front End : JAVA

Back End : Oracle 10g

Server Side Programming Tool : JSP

Web Server : Apache Tomcat 5.0

3.2.2.1 HTML

Hyper Text Markup Language (HTML) is a language used to create hypertext

documents that have hyper links embedded in them. It consists of tags embedded in the text

of a document with HTML. We can build web pages or web document s. it is basically a

formatting language and not a programming language. The browser reading the document

interprets mark up tags to help format the document for subsequent display to a reader.

HTML is a language for describing structured documents. HTML is a platform independent.

WWW (World Wide Web) pages are written using HTML. HTML tags control in part the

representation of the WWW page when view with web browser. The browser interprets

Tenali Engineering College Page 6

Page 7: Documentation According to Contents (1)

Virus Information System

HTML tags in the web document and displays it. Different browsers show data differently.

Examples of browsers used to be web pages include:

Netscape

Internet Explorer

HTML: What It Is

HTML is a document-layout and hyperlink-specification language. It defines the

syntax and placement of special, embedded directions that aren't displayed by the browser,

but tell it how to display the contents of the document, including text, images, and other

support media. The language also tells you how to make a document interactive through

special hypertext links, which connect your document with other documents--on either your

computer or someone else's, as well as with other Internet resources, like FTP and Gopher.

IMAGE HTML TAG:

This command presents Select File dialog box to select image file. If you want to

insert the image tag directly without the dialog box, hold down Shift key when running this

command.

<IMG SRC="" ALT="">

The Table Generator helps you to insert table tag into the HTML document very easily. Press

left mouse button on a table cell and drag to the desired size then release the mouse button.

Inserts Frame HTML tag:

<FRAMESET ROWS="," COLS=",">

<FRAME NAME="" SRC="" SCROLLING="">

<FRAME NAME="" SRC="" SCROLLING="">

</FRAMESET>

Inserts Font HTML tag:

<FONT SIZE=""></FONT>

This command presents Heading popup menu. Heading 1 - 6 tags are available on heading

popup menu.

Tenali Engineering College Page 7

Page 8: Documentation According to Contents (1)

Virus Information System

Inserts Horizontal Ruler HTML tag:

<HR>

This command presents List tag popup menu. Unordered list, ordered list and Definition list

are available on List tag popup menu.

Inserts List Box HTML tag:

<SELECT NAME=""></SELECT>

Inserts Ordered List HTML tag.

<OL>

<LI>

</LI>

</OL>

With all its multimedia-enabling, new page layout features, and the hot technologies

that give life to HTML documents over the Internet, it is also important to understand the

language's limitations: HTML is not a word processing tool, a desktop publishing solution, or

even a programming language, for that matter. That's because its fundamental purpose is to

define the structure and appearance of documents and document families so that they might

be delivered quickly and easily to a user over a network for rendering on a variety of display

devices.

Structure of an HTML Document :

An HTML document consists of text, which defines the content of the document, and

tags, which define the structure and appearance of the document. The structure of an HTML

document is simple, too, consisting of an outer <html> tag enclosing the document header

and body:

<Html>

<Head>

<Title>Barebones HTML Document</title>

</head>

<Body>

Tenali Engineering College Page 8

Page 9: Documentation According to Contents (1)

Virus Information System

………………….………….

……………………………..

</Body>

</Html>

Each document has a head and a body, delimited by the <head> and <body> tags. The head is

where you give your HTML document a title and where you indicate other parameters the

browser may use when displaying the document. The body is where you put the actual

contents of the HTML document. This includes the text for display and document control

markers (tags) that advise the browser how to display the text. Tags also reference special-

effects files including graphics and sound, and indicate the hot spots (hyperlinks and

anchors) that link your document to other documents.

Basic HTML Tags :

<! -- --> Specifies comments

<A>……….</A> Creates hypertext links

<B>……….</B> Formats text as bold

<BIG>………. </BIG> Formats text in large font.

<BODY>…</BODY> Contains all tags and text in the HTML document

<CENTER>...</CENTER> Creates text

<DD>…</DD> Definition of a term

<DL>...</DL> Creates definition list

<FONT>…</FONT> Formats text with a particular font

<FORM>...</FORM> Encloses a fill-out form

<FRAME>...</FRAME> Defines a particular frame in a set of frames

<H#>…</H#> Creates headings of different levels

<HEAD>...</HEAD> Contains tags that specify information about a

document

<HR>...</HR> Creates a horizontal rule

<HTML>…</HTML> Contains all other HTML tags

<META>...</META> Provides meta-information about a document

<SCRIPT>…</SCRIPT> Contains client-side or server-side script

Tenali Engineering College Page 9

Page 10: Documentation According to Contents (1)

Virus Information System

<TABLE>…</TABLE> Creates a table

<TD>…</TD> Indicates table data in a table

<TR>…</TR> Designates a table row

<TH>…</TH> Creates a heading in a table

Advantages

A HTML document is small and hence easy to send over the net. It is small

because it does not include formatted information.

HTML is platform independent.

HTML tags are not case-sensitive.

3.2.2.2 JAVA

About JAVA:

Java was conceived by James Gosling, Patrick Naughton, Chris Warth, Ed Frank and

Mike Sheridan at SUN Micro Systems Incorporation in 199I.It took 18 months to develop the

first working version .This language initially called "OAK", but was renamed " JAVA " In

1995.Beforde the initial implementation of OAK in 1992 and the public announcement of

Java in 1995, many more contributed to the design and evolution of the language.

JAVA Overview:

Java is a powerful but lean object oriented programming language. lt has generated a

lot of excitement because it makes it possible to program for internet by creating applets.

Programs that can be embedded in a web page. The context of an applet is limited only by

one's imagination. For example an applet can be an animation with sound, an interactive

game or a ticker tape with constantly updated stock prices. Applets can be just little de-

corations to liven up web page, or they can be serious applications like word processors or

spreadsheets. But Java is more than programming language for writing applets. It is being

used more and more for writing standalone application as well. It is becoming so popular that

many people believe it will become standard language for both general purpose and internet

programming.

Tenali Engineering College Page 10

Page 11: Documentation According to Contents (1)

Virus Information System

JAVA is Robust:

The multiplatform environment of the Web places extraordinary demands on a

program, because it must execute reliably in a variety of systems. Thus the ability to create

robust programs was given a high priority in the design of java. To gain reliability Java

restricted you in a few key areas to force you to find your mistakes early in program

developments. At the same Java frees you from having to worry about many of the most

common causes of programming errors. Because Java is strictly typed language, it checks

your code at compile time.

JAVA Scales Well:

Java platform is designed to scale well, for portable consumer electronic devices to

powerful desktop and several machines. The virtual machine takes a small foot print and Java

byte code is optimized to be small and compact. As a result java accommodates the need for

low storage and bandwidth transmission over the internet.

JAVA is Multithreaded:

Multithreading is simply the ability of a program to do more than one thing at a time.

For example an application could be faxing documentation at the same time is printing

another document. Multithreading is particularly important in multimedia: a multimedia

program might often be running a movie, running an audio track and displaying text at the

same time.

JAVA is Extensible:

A big plus for Java is the fact it can be extended. lt was purposely written to be lean

with the emphasis on doing what it does very well: instead of typing of trying to do

everything from the beginning, it was written so that extending it is very easy.

JAVA is Secure:

The Java platform builds security in four ways.

1 .The way memory is allocated and laid out.

2. The way incoming code checked.

3. The classes are loaded

4. The way access is restricted for untrusted code.

JAVA performs well:

Java's performs is better than one might expect. Java's many advantages, such as

having built-in security and being interpreted as well as compiled, does have a cost attached

Tenali Engineering College Page 11

Page 12: Documentation According to Contents (1)

Virus Information System

them. However, various optimizations have been built-in, and the byte code interpreter can

run very fast the cost it does not have to do any checking.

No pointers:

Eliminates big source errors by using object references instead of memory pointers,

problems with pointer arithmetic are eliminated and problems with in adversely accessing the

wrong memory address are greatly reduced.

Strong Typing:

Cuts down on runtime errors because Java enforces strong type checking, many errors

are caught when code is compiled. Dynamic binding is possible and often very useful but

static binding with strict type checking is used when possible.

Simplicity:

Makes Java easier to learn and correctly Java keeps it simple by having just one way

to do something instead of having several alternatives as in some languages Java also stays

lean by not including multiple inheritance which eliminates the errors and ambiguity that

arise when you create a subclass that inherits from two or more classes.

JAVA includes a Library of classes and interfaces:

The Java platform includes an extensive class library so that programmers can use

already existing classes it is create sub classes to modify existing classes or implements

interfaces to augment the capabilities of classes.

3.2.2.3 Java Server Pages:

A server side technology, Java Server Pages are an extension to the Java servlet

technology that was developed by Sun.JSPs have dynamic scripting capability that works in

tandem with HTML code, separating the page logic from the static elements -- the actual

design and display of the page -- to help make the HTML more functional (i.e. dynamic

database queries).

A JSP is translated into Java servlet before being run, and it processes HTTP requests

and generates responses like any servlet. However, JSP technology provides a more

convenient way to code a servlet. Translation occurs the first time the application is run. A

JSP translator is triggered by the .jsp file name extension in a URL. JSPs are fully

interoperable with servlets. You can include output from a servlet or forward the output to a

servlet, and a servlet can include output from a JSP or forward output to a JSP.

Tenali Engineering College Page 12

Page 13: Documentation According to Contents (1)

Virus Information System

JSPs are not restricted to any specific platform or server. It was originally created as

an alternative to Microsoft's ASP’s(Active Server Pages). Recently, however, Microsoft has

countered JSP technology with its own ASP.NET, part of the .NET initiative.

Java Server Pages (JSP) is a technology that lets you mix regular, static HTML with

dynamically-generated HTML. Many Web pages that are built by CGI programs are mostly

static, with the dynamic part limited to a few small locations. But most CGI variations,

including servlets, make you generate the entire page via your program, even though most of

it is always the same. JSP lets you create the two parts separately

Advantages of JSP?

Vs. Active Server Pages (ASP). ASP is a similar technology from Microsoft. The

advantages of JSP are twofold. First, the dynamic part is written in Java, not Visual

Basic or other MS-specific language, so it is more powerful and easier to use. Second,

it is portable to other operating systems and non-Microsoft Web servers.

Vs. Pure Servlets. JSP doesn't give you anything that you couldn't in principle do

with a servlet. But it is more convenient to write (and to modify!) regular HTML than

to have a zillion println statements that generate the HTML. Plus, by separating the

look from the content you can put different people on different tasks: your Web page

Tenali Engineering College Page 13

Page 14: Documentation According to Contents (1)

Virus Information System

design experts can build the HTML, leaving places for your servlet programmers to

insert the dynamic content.

Vs. JavaScript. JavaScript can generate HTML dynamically on the client. This is a

useful capability, but only handles situations where the dynamic information is based

on the client's environment. With the exception of cookies, HTTP and form

submission data is not available to JavaScript. And, since it runs on the client,

JavaScript can't access server-side resources like databases, catalogs, pricing

information, and the like.

Vs. Static HTML. Regular HTML, of course, cannot contain dynamic information.

JSP is so easy and convenient that it is quite feasible to augment HTML pages that

only benefit marginally by the insertion of small amounts of dynamic data.

Previously, the cost of using dynamic data would preclude its use in all but the most

valuable instances.

Steps in the execution of a JSP Application:

1. The client sends a request to the web server for a JSP file by giving the name of the

JSP file within the form tag of a HTML page.This request is transferred to the

JavaWebServer. At the server side JavaWebServer receives the request and if it is a

request for a jsp file server gives this request to the JSP engine.

Tenali Engineering College Page 14

Page 15: Documentation According to Contents (1)

Virus Information System

2. JSP engine is program which can understands the tags of the jsp and then it converts

those tags into a Servlet program and it is stored at the server side. This Servlet is

loaded in the memory and then it is executed and the result is given back to the

JavaWebServer and then it is transferred back to the result is given back to the

JavaWebServer and then it is transferred back to the client.

3.2.2.4 ABOUT ORACLE:

Database Management System (DBMS):

A Database is an integrated collection of user related data stored with minimum

redundancy, serves many users/application quickly and efficiency.

A Database system is basically a computerized record keeping system, i.e. it is a

computerized system whose coverall purpose is to maintain information and make that

information available on demand.

DBMS is a collection of inter-related data and set of programs that allow several users to

access and manipulate data. Its main purpose is to provide users with an abstract view of

the data, i.e. the system hides certain details of how the data is stored and maintained.

Database Management System is divided into 4 main components.

Database

Hardware

Software

User

Database:

It consists of collection of persistent data that is used by the application system.

Hardware: The processor (s) and associated main memory that are used to support

the execution of database system software.

Software: The layer between the physical database and the users that handle all

requests from the user for access to the database.

User: There are three types of users

Tenali Engineering College Page 15

Page 16: Documentation According to Contents (1)

Virus Information System

Application Programmers

End User

Database Administrator (DBA)

TYPES OF DBMS:

There are four major categories of DBMS data models.

Hierarchical

Network

Inverted

Relational

3.2.2.5 STRUCTURED QUERY LANGUAGE:

SQL (pronounced “SEQUEL”) stands for Structured Query Language, which is used

to communicate with relational database, which are in turn a set of related information stored

in the form of tables.

SQL is a non-procedural language because it process sets of record rather than just

one data at a time and also provides automatic navigation to the data. Here one can

manipulate a set or rows rather than one at a time. SQL commands accept a set or rows as

input and return sets as outputs. The set property of SQL allows the results of one SQL

statement to be used as input to another. Here one need not specify the access method of the

data.

SQL is utilized as the communication language with the database among the database

user like database administrators, System administrators, security administrators and

application programmers. SQL provides command for a variety of tasks including:

1. Inserting, updating, and deleting rows in an object.

2. Creating, replacing, altering and dropping objects.

3. Controlling access to the database and its objects.

4. Guaranteeing database consistency and integrity.

Tenali Engineering College Page 16

Page 17: Documentation According to Contents (1)

Virus Information System

The commands in SQL is subdivided according to their functions as follows:

Data Definition Language (DDL)-create, alter, drop,

Truncate, rename

Data Manipulation Language (DML)-insert, update, delete

Data Control Language (DCL)-grant, revoke

Data Retrival Language (DRL)-select

Transaction Control Language (TCL)-commit, savepoint, rollback

SQL*PLUS is a program or a tool available for working with an ORACLE

Database. It allows the user to:

1. Create tables in a database.

2. Stores information in the tables.

3. Changes information in the tables.

4. Retrieve the information in the form we choose,

5. performing calculations on it and combining it in new ways.

6. Maintain the database itself.

3.2.2.5 Apache Tomcat

Apache tomcat is an open source servlet continer develeped by the apache software

foundation. Tomcat implements the java servlets and the java server pages (jsp) specification

form sun microsystems and provides a pure java. HTTP web server environment for java

code to run.

3.2.2.6 JAVA Database Connectivity:

JDBC is an API developed by Sun Microsystems that provides a standard way to

access data using the Java programming language. Using JDBC, an application can access a

variety of databases and run on any platform with a Java Virtual Machine. It isn’t necessary

to write separate applications to access different database systems, JDBC allows you to write

one application that can send SQL statements to different database systems. SQL is the

standard language for accessing relational databases.

How Does JDBC Work?

JDBC makes it possible to do the following things within a Java application:

Tenali Engineering College Page 17

Page 18: Documentation According to Contents (1)

Virus Information System

Establish a connection with a data source

Send queries and update statements to the data source

Process the results

The following figure shows the components of the JDBC model.

Why Do We Need JDBC?

Why can’t application developers use ODBC (Open Database Connectivity) on the Java

platform? After all, it’s an established standard API for database access. You can use ODBC;

however, ODBC isn’t appropriate for direct use from the Java programming language

because it uses a C interface. The JDBC API was modeled after ODBC, but, because JDBC

is a Java API, it offers a natural Java interface for working with SQL. JDBC is needed to

provide a “pure Java” solution for application development.

Features of JDBC

Following are some of the features that are part of the JDBC 3.0 specification:

Retrieval of auto-generated keys

Blob/Clob Updates

Multiple open result sets

Tenali Engineering College Page 18

Page 19: Documentation According to Contents (1)

Virus Information System

Transactional Save points

Statement Pooling

Types of JDBC Drivers

There are four types of JDBC drivers in use:

Type 1: JDBC-ODBC bridge

Type 2: partial Java driver

Type 3: pure Java driver for database middleware

Type 4: pure Java driver for direct-to-database

Establishing A Connection

The first thing to do, of course, is to install Java, JDBC and the DBMS on your

working machines. Since we want to interface with an Oracle database, we would need a

driver for this specific database as well. Fortunately, we have a responsible administrator

who has already done all this for us on the Leland machines.

To access a database, a connection must be opened between our program (client) and

the database (server). This involves two steps:

Load the vendor specific driver

Why would we need this step? To ensure portability and code reuse, the API was designed to

be as independent of the version or the vendor of a database as possible. Since different

DBMS’s have different behavior, we need to tell the driver manager which DBMS we wish

to use, so that it can invoke the correct driver.

Make the connection

Once the driver is loaded and ready for a connection to be made, you may create an

instance of a Connection object using: The connection returned in the last step is an open

Tenali Engineering College Page 19

Page 20: Documentation According to Contents (1)

Virus Information System

connection which we will use to pass SQL statements to the database. In this code snippet,

con is an open connection, and we will use it below.

Creating JDBC Statements

A JDBC Statement object is used to send your SQL statements to the DBMS, and

should not to be confused with an SQL statement. A JDBC Statement object is associated

with an open connection, and not any single SQL Statement. You can think of a JDBC

Statement object as a channel sitting on a connection, and passing one or more of your SQL

statements (which you ask it to execute) to the DBMS.

An active connection is needed to create a Statement object. The following code

snippet, using our Connection object con, does it for you:

Statement stmt = con.createStatement() ;

At this point, a Statement object exists, but it does not have an SQL statement to pass on to

the DBMS. We learn how to do that in a following section.

Executing SELECT Statements

As opposed to the previous section statements, a query is expected to return a set of

tuples as the result, and not change the state of the database. Not surprisingly, there is a

corresponding method called executeQuery, which returns its results as a ResultSet object:

Transactions

JDBC allows SQL statements to be grouped together into a single transaction. Thus,

we can ensure the ACID (Atomicity, Consistency, Isolation, Durability) properties using

JDBC transactional features. The Connection object performs transaction control. When a

connection is created, by default it is in the auto-commit mode. This means that each

individual SQL statement is treated as a transaction by itself, and will be committed as soon

as it’s execution finished. (This is not exactly precise, but we can gloss over this subtlety for

most purposes).

Handling Errors with Exceptions

The truth is errors always occur in software programs. Often, database programs are

critical applications, and it is imperative that errors be caught and handled gracefully.

Programs should recover and leave the database in a consistent state. Rollback-s used in

conjunction with Java exception handlers is a clean way of achieving such a requirement.

The client (program) accessing a server (database) needs to be aware of any errors returned

Tenali Engineering College Page 20

Page 21: Documentation According to Contents (1)

Virus Information System

from the server. JDBC give access to such information by providing two levels of error

conditions: SQLException and SQLWarning. SQLExceptions are Java exceptions, which, if

not handled, will terminate the application. SQLWarnings are subclasses of SQLException,

but they represent nonfatal errors or unexpected conditions, and as such, can be ignored.

3.2.3 HARDWARE REQUIREMENTS:

Processor : Pentium IV

Ram : 128 MB

Hard Disk : 20 GB

3.5 CONCLUSION

In this phase, we understand the software requirement specifications for the

project. We arrange all the required components to develop the project in this phase itself

so that we will have a clear idea regarding the requirements before designing the project.

Thus we will proceed to the design phase followed by the implementation phase of the

project.

4.DESIGN

4.1 INTODUCTION

It details how the softare rquirements should be implemented and it gives the

programmers a blueprint to follow.Once the software design document is approved by the

appropriate parties, it becomes a baseline for limiting changes in the scope of the project.

4.2 UML DIAGRAMS

Use cases are narrative descriptions of processes that you create early in a

development cycle. They describe the interactions between external actors and your system,

and help to understand the system requirements and the terminology used in the domain area.

During the use case phase, you create use case diagrams.To understand the UML diagrams,

Tenali Engineering College Page 21

Page 22: Documentation According to Contents (1)

Virus Information System

we first need to understand the distinction between a diagram and a model.Models appear in

a hierarchical tree view.Diagrams are views of a model that are represented by icons in the

tree view.

4.2.1 Use case diagram:

 After you can identify the use cases, you can create use case diagrams to put the use

cases in context. Creating a use case diagram involves establishing a system boundary for a

set of use cases and defining the lines of communication between a particular actor and use

case.

    In the early stages of a development project, use case diagrams describe real world

activities and motivations. You can refine the diagrams in later stages to reflect user interface

and design details.

4.2.1.1 OVERVIEW/DFD

Tenali Engineering College Page 22

Page 23: Documentation According to Contents (1)

Virus Information System

Post virus

Logout

Administrator

User

Login

Search virus

Visitor

View virus

4.2.1.2 USECASE FOR ADMINISTRATOR:

Tenali Engineering College Page 23

Page 24: Documentation According to Contents (1)

Virus Information System

Post Anti-virus

View Feedback

Searchvirus

Accept/reject Virus

administrator

Update virus

4.2.1.3 USECASE FOR USER:

Viewvirus

Post anti-virus

download antivirus

send Feedback

SearchVirus

user

Postvirus

4.2.1.4 USECASE FOR VISITOR:

Tenali Engineering College Page 24

Page 25: Documentation According to Contents (1)

Virus Information System

search virus

Send feedbackvisitor

ViewVirus

4.2.2 CLASS DIAGRAM:

1

*

1 *

Visitor

Name : varchar(2)Email : varchar(2)message : varchar(2)

view virus()send feedback()Search virus()

User

ID : varchar(2)password : pwd

View virus()post virus()post antivirus()download antivirus()send feed back()search virus()

Adminstrator

ID : varchar(2)password : pwd

View virus()Accept/reject users()post antivirus()view feedback()search virus()update virus()

4.2.3 SEQUENCE DIAGRAMS:

Tenali Engineering College Page 25

Page 26: Documentation According to Contents (1)

Virus Information System

A type of interaction diagram, a sequence diagram shows the actors of objects

participating in an interaction and the events they generate arranged in a time sequence.

Often, a sequence diagram shows the events that result from a particular instance of a use

case but a sequence diagram can also exist in a more generic form.The vertical dimension in

a sequence diagram represents time, with time proceeding down the page. The horizontal

dimension represents different actors or objects.

4.2.3.1Sequence Diagram for Administrator:

LOGIN POST VIRUS POST ANTIVIRUS

VIEW FEEDBACK

SEARCH VIRUS

LOGOUT : ADMIN

ACCEPT/REJECT USERS

LOGIN

ACCEPT/REJECT

POST VIRUS

POST ANTIVIRUS

VIEW FEEDBACK

SEARCH VIRUS

LOGOUT

4.2.3.2 Sequence Diagram for Visitor:

Tenali Engineering College Page 26

Page 27: Documentation According to Contents (1)

Virus Information System

: VISITOR

VIEW VIRUS SEND FEEDBACK

SEARCH VIRUS

VIEW VIRUS

SEND FEEDBACK

SEARCH VIRUS

4.2.3.3 Sequence Diagram For User:

: USER

LOGIN VIEW VIRUS POSTVIRUS POST ANTIVIRUS

DOWNLOAD ANTIVIRUS

SEND FEEDBACK

SEARCH VIRUS

LOGOUT

LOGINVIEW VIRUS

POST VIRUS

POST ANTIVIRUS

DOWNLOAD ANTIVIRUS

SEND FEEDBACK

SEARCH VIRUS

LOGOUT

4.3 MODULE DESIGN

Tenali Engineering College Page 27

Page 28: Documentation According to Contents (1)

Virus Information System

There are three modules related to this system.

They are

1. visitor module

2. User module

3. administrator module

Visitor module:

He/she can search for virus

He/she can view virus information

He/she can send feedback to administrator

User module:

He/she first login into the system

He/she can upload and download antivirus for the existing virus

He/she can send feedback to the administrator

He/she Can receive virus updates

He/she Can post virus

He/she Can view virus information

He/she Can develop further to the existing system

Administrator module:

He/she Maintains or updates the wholr information system about viruses

antiviruses

He/she Has right to add or remove users

He/she Can upload the antivirus with respect to the virus posted by users

He/she Can view feedbacks that are3 sent by the users and visitors

He/she Can view whole system information that is given by the users.

4.4 CONCLUSION

In this way we can design the layout of the project which is to be implemented during

theconstruction phase. Thus we will have a clear picture of the project before being coded.

Hence any necessary enhancements can be made during this phase and coding can be started.

Tenali Engineering College Page 28

Page 29: Documentation According to Contents (1)

Virus Information System

5. IMPLEMENTATION AND RESULTS

5.1 INTRODUCTION

The implementation part is the most important phase of the project. In this phase, we

code the entire project in the chosen software according to the design laid during the

previous phase. The code has to be in such a way that the user requirements are satisfied

and also not complicated for the user i.e., the user interface or GUI has to be easy to

navigate. The code should be efficient in all terms like space, easy to update, etc. In this

manner, we can complete the coding part of the project and later it can be sent for testing

before being delivered to the customer.

5.2 Methods of Implementation

Installing softwares:

First of all install java(jdk 1.6) next install OracleXE and finally install Apache

tomcat5.0 while installing tomcat give the port number as 8009. You caninstall an IDE like

ECLIPSE or an EditPlus editor to write Java programs (optional). Youcan even write them in

notepad also. For the purpose of Testing you need to install J2MEUNIT testing tool.

Enable Path Settings

Now the path settings have to be enabled so that your system will be able torecognize

the above installed softwares. Note that correct path have to be given otherwiseit may raise

an error. The following picture depicts the method of setting path:

Tenali Engineering College Page 29

Page 30: Documentation According to Contents (1)

Virus Information System

5.2.1 CREATING TABLES

Data Dictionary :

The Data dictionary describes the data base that can be used to manage the

details of the organization. This will provide the administrator and also to the employees

that are work in the organization to know the details whenever they want to retrieve the

details.

Table Name: User

Table Name: Administrator

Tenali Engineering College Page 30

Sno Column name Data type Constraints Description

1 Uno Number(6) Primary key Userno

2 Uname Varchar2(20) Not null Username

3 Password Varchar2(15) Not null Password

4 Gender Varchar2(6) Not null Gender

5 Address Varchar2(40) Not null Address

6 Emailid Varchar2(25) Emailid

7 Qualification Varchar2(20) Not null Qualification

Page 31: Documentation According to Contents (1)

Virus Information System

Table Name: Visitor

Sno Column name Data type Constraints Description

1 Vno Varchar2(20) Primary key Virus no

2 Vname Varchar2(15) Not null Virus name

3 Gender Varchar2(6) Not null Gender

4 Address Varchar2(40) Not null Address

5 Emailid Varchar2(25) Emailid

6 Comments Varchar2(40) Comments

Table Name: Upload

Tenali Engineering College Page 31

Sno Column name Data type Constraints Description

1 Adname Varchar2(20) Primary key Admin name

2 Password Varchar2(15) Not null Password

3 Gender Varchar2(6) Not null Gender

4 Address Varchar2(40) Not null Address

5 Emailid Varchar2(25) Emailid

Page 32: Documentation According to Contents (1)

Virus Information System

Table Name: Virus

Table Name: Anti Virus

Sno Column name Data type Constraints Description

1 Avno Number(6) Primary key Anti virusno

2 Avname Varchar2(15) Not null Antivirus name

3 Avtype Varchar2(15) Not null Antivirus type

4 Date Posted Date Not null Date Posted

5 Locate File Varchar2(40) Not null Locate File

6 Posted By Number(6) Not null Posted By

Table Name: User Feedback

Tenali Engineering College Page 32

Sn

oColumn name Data type Constraints Description

1 Vno Number(6) Primary key Virus no

2 Vname Varchar2(15) Not null Virus name

3 Vtype Varchar2(15) Not null Virus type

4 Date Posted Date Not null Date Posted

5 Posted By Number(6) Not null Posted By

6 Effected Files Varchar2(40) Not null Effected Files

7 Effected Date Date Not null Effected Date

8 Other Details Varchar2(30) Other Details

Sno Column name Data type Constraints Description

1 Id Number(6) Primary key Id

2 Vname Varchar2(100) Not null Virusname

Sno Column name Data type Constraints Description

1 Uno Number(6) Primary key User no

2 Send By Varchar2(15) Not null Send By

3 Address Varchar2(15) Not null Address

4 Email Id Varchar2(25) Not null Email Id

5 Comments Varchar2(50) Not null Comments

Page 33: Documentation According to Contents (1)

Virus Information System

Table Name: Visitor Feedback

Table Name: Antivirus for Virus

5.2.2 Output Screens

HOME PAGE SCREEN

Tenali Engineering College Page 33

Sno Column name Data type Constraints Description

1 Vno Number(6) Primary key Virus no

2 Visitor name Varchar2(15) Not null Visitor name

3 Address Varchar2(15) Not null Address

4 Email Id Varchar2(25) Not null Email Id

5 Comments Varchar2(50) Not null Comments

Sno Column name Data type Constraints Description

1 Vno Number(6) Primary key Virus no

2 Vname Varchar2(15) Not null Virus name

3 Avname Varchar2(15) Not null Antivirus name

4 Avcost Varchar2(25) Not null Antivirus cost

Page 34: Documentation According to Contents (1)

Virus Information System

HOME PAGE

Tenali Engineering College Page 34

Page 35: Documentation According to Contents (1)

Virus Information System

ADMIN LOGIN SCREEN

ADMINSTRATOR MODULES SCREEN

Tenali Engineering College Page 35

Page 36: Documentation According to Contents (1)

Virus Information System

POST VIRUS SCREEN

ACCEPT/REJECT SCREEN

Tenali Engineering College Page 36

Page 37: Documentation According to Contents (1)

Virus Information System

POST ANTIVIRUS SCREEN

USER FEEDBACK SCREEN

Tenali Engineering College Page 37

Page 38: Documentation According to Contents (1)

Virus Information System

SEARCH VIRUS SCREEN

LOGOUT SCREEN

Tenali Engineering College Page 38

Page 39: Documentation According to Contents (1)

Virus Information System

NEWUSER REGISTRATION SCREEN

USER LOGIN SCREEN

Tenali Engineering College Page 39

Page 40: Documentation According to Contents (1)

Virus Information System

VIRUS INFORMATION SCREEN

ANTIVIRUS INFORMATION SCREEN

Tenali Engineering College Page 40

Page 41: Documentation According to Contents (1)

Virus Information System

NEW ANTIVIRUS UPLOAD SCREEN

USER ANTIVIRUS INFORMATION SCREEN

Tenali Engineering College Page 41

Page 42: Documentation According to Contents (1)

Virus Information System

DOWNLOAD ANTIVIRUS SCREEN

USER FEEDBACK FORM

Tenali Engineering College Page 42

Page 43: Documentation According to Contents (1)

Virus Information System

NEW USER DETAILS

5.2.3 Result Analysis

Tenali Engineering College Page 43

Page 44: Documentation According to Contents (1)

Virus Information System

This system allows the users to report about new viruses and their symptoms.Allows

freelance developers to develop antivirus.Provide latest updates.Take Feedbacks to optimize

the system.Give performance rankings to the members.

5.3 Conclusion

In this way we implement the project successfully using java server pages for an easy

interaction of the user to virus information with less effort work . we proceed to the next

phase i.e.,testing which is very important while delevering the porject.

Tenali Engineering College Page 44

Page 45: Documentation According to Contents (1)

Virus Information System

6.SYSTEM TESTING

6.1 INTRODUCTION:

Testing is performed after the coding phase. It is a major software quality control

measure employed during software development. Its basic function is to detect the errors in

the software. The goal of the testing is to uncover required design and coding errors in the

programs. The input phase of the testing is the written code. Testing is performed with unit

testing which detects errors in each module. These modules are integrated into subsystems

and tested for integration. Eventually the overall system is tested which is called system

testing. At the end, the system is tested with the real data at the place of installation called as

acceptance testing.

Testing involves selection of test cases on the basis of two methods. Functional

testing, which involves selection test cases for testing the specifications of the system or the

module. Structural testing, which involves testing the internal structure of the system or

module. The goal of the testing is to select the test cases such that maximum number of

errors can be detected by making use of minimum number of test cases. For this reason we

generate the test cases on the basis of the test criteria.

A criterion is valid if any error in the software can be revealed by the same test case

satisfying the criteria.

6.2 Design of testcases:

Testing means quality test. Testing is a process of executing a program with the intent

of finding an error. A good test case is one that has a high probability of finding an as yet

undiscovered error. Objective should be to design test that systematically uncovers different

classes of error. And to do with a minimum amount of time and effort. Testing cannot show

the absence of Defects, it can only show that soft wear defects are present. It is important to

keep this statement in one of these ways knowing the specific function that a product has

been designed to perform, test can be conducted that demonstrate each function is fully

operational. This approach is called ‘black box testing’. Knowing the internal working of the

product, test can be conducted to ensure that “all gears mesh” that internal operation of the

product performs according to specification and all internal components have been

adequately exercised. This Approach is call “white box testing”.

Tenali Engineering College Page 45

Page 46: Documentation According to Contents (1)

Virus Information System

TESTING PROCESS:

Testing performs a very critical role for quality assurance and ensuring the reliability

of the software. During testing, the program to be tested is executed with a set of test cases

and output of the program for the test case is evaluated to determine if the program is

performing as it is expected to.

Testing is a process of executing a program with the intent of finding errors.

A good test case is one that has a high probability of finding as yet undiscovered

error.

A successful test is one yet uncovers as yet-undiscovered error.

TESTING TYPES:

Black box Testing focuses on the input/output behavior of the component. Black box tests

do not deal with the internal aspects of the component nor with the behavior or the structure

of the component.

White box Testing focuses on the internal structure of the component. A white box test

makes sure that every state in the

dynamic model of the object and interactions among the objects are tested.

Types of Testing

Tenali Engineering College Page 46

Client Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

Page 47: Documentation According to Contents (1)

Virus Information System

6.3 Testcases:

TEST

CASE

ID

TEST CASE EXPECTING

BEHAVIOUR

EXHIBITING

BEHAVIOUR

RES

ULT

VIS_01 Enter the wrong username

and password for Admin

Error Message has to

be displayed

Error Message is

displaying

Pass

VIS_02 Login as Admin and Try

to Add the new virus

It has to Add the new

virus

It is Adding

successfully

Pass

VIS_03 Login as Admin and Try

to View the virus Details

It has to Display all

virus details

It is Displaying all

virus details

Pass

VIS_04 Enter Registration first to

access the site

It has to add the user

details

It is adding

registration details

Pass

VIS_05 Enter the wrong username

and password for User

Error Message has to

be displayed

Error Message is

displaying

Pass

VIS_06 Login as User and try to

View virus

It has to Display

all Virus Details

It is Displaying all

Virus Details

Pass

VIS_07 Login as User and try to

add virus

It has to add new virus

details

It is adding virus

details

Pass

VIS_08 Login as User and try to

add antivirus information

It has to add new

antivirus information

It is adding

antivirus

information

Pass

VIS_09 Login as User and try to

download antivirus

It has to download

antivirus information

It is downloaded

antivirus

information

Pass

10 Login as User and try to

Search virus

It has to display the

virus information

It id displaying

virus information

Pass

Tenali Engineering College Page 47

Page 48: Documentation According to Contents (1)

Virus Information System

6.3 VALIDATION

Validation aims to demonstrate that the software functions in a manner that can be

reasonably expected by the customer. This tests conformance the software to the

Software Requirements Specification.

Here an experiment has done for checking the consistency for the user

requirements regarding the username and password which should be validated through

the server and the username and password should be matched and also the method

Steganography implemented also checked for its consistency to provide security.

6.4 CONCLUSION:

In this way we also completed the testing phase of the project and ensured that the

system is ready to go live

Tenali Engineering College Page 48

Page 49: Documentation According to Contents (1)

Virus Information System

7.CONCLUSION & FUTURE SCOPE

CONCLUSION:

Using this project we can maintain all the information about viruses and details of

different antivirus programs developed to counter and quarantine them.

This project is a web application which runs on a web server so that users of any

platform can access the system to utilize its resources and features.

We have given centralized control of the system to the administrator so that he can

act as a moderator between users and members of the system and they can have total

abstraction of the internal details. The User interface is made user friendly so that novices

can also access it.

We have fulfilled all the requirements that are specified in the project abstract and all

the necessary steps are taken for further development.

FUTURE SCOPE:

In Feature this application can be developed with effectively with Security

implementation.

It also implemented with different new tools also used for development.

In feature the users can provide the different tips for the virus removal

In feature the administrator can also upload the licensed antivirus for user access

to purchase from the site.

In feature it can also implemented to provide more security for the application.

Tenali Engineering College Page 49

Page 50: Documentation According to Contents (1)

Virus Information System

BIBLIOGRAPHY

S. No Author of the Book Name of the Book Publisher Magazine Edition Year

01 Herbert Shieldt The Complete Gold 2 2003

Reference of Java

02 Ivan Bayross Web Enabled TatMcGrahil 6 2001

Commercial

Application

Development

03 Subramanyam Professional Java Pattern And Java 2 1999

Allam Raju Programming

04 Roger Pressman Software Engineering Pearson Edition 6 1996

05 Roger S.Pressman Software Engineering MC-Graw-Hill 3 1992

International

06 Bernerd Object-Oriented Wiley Edition 2 2000

Bruegge Soft ware

Engineering

WEBSITES:

www.java2s.com

www.javascript.internet.com

www.freecsstemplates.org

www.roseindia.net

Tenali Engineering College Page 50