SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2017 > NON IEEE > APPLICATION

    Email Alert on Unauthorized File Access


    Abstract

    Now a day, File protection is very important. This project gives security from unauthorized file Access. Email Alert on Unauthorized File Access aims to develop and secure the LAN. The active and inactive systems in a network can be identified by this system. If the IP address of the system is given as input, the software analyses the status of the system and displays whether it is offline or online. If any other user in the network is trying to open the file or folder then the system itself gives the pop up message. It also gives the alert to the particular user through E-mail and SMS mobile phone. The use of the project ‘Email Alert on Unauthorized File Access’ arises, it handling of various activities in a network becomes tedious and complex for the administrator. When any user uses any application, the file is traced to the system, then the messenger automatically pop up a message to display the particular file is added to the particular drive and according to t


    Existing System

    The private and sensitive data is exposed to attacker. Attackers can add/delete/alter data which affects a lot to genuine user. Such attack mostly leads to illegal activities like transferring money from victim’s account without informing him. Successful attempt of such attack destroys whole security system as attacker is free to act even though remaining shields are firm.


    Proposed System

    Unauthorized Access is defined as when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is “hacking”. Unauthorized access is the same as theft. The specifics for gaining unauthorized access are different for each individual event but it could happen in any number of ways. When unauthorized user is accessing the file, admin can get the e-mail. By that user can know that unauthorized person is opening the file.


    Architecture


    FOR MORE INFORMATION CLICK HERE