Java Projects

1) HB’s Antivirus Tool (HAT) :-

HB’s Antivirus Tool (HAT) is application software that provide the security from the threats of viruses, worms, Trojans, malwares, etc. It scans the system and removes the corrupted files and makes data secure. It not only scan total system but it also scans specific drive folder or file and so on as per the requirement. It scans removable drive as soon as it is attached to the system. It scans autorun.inf, desktop.inf, etc. files and blocks them as soon as found. It contains large amount of virus and malware database which are used to scan and detect various kinds of threat and abnormal corrupt files in the system. It provides vault facility in the case of emergency or exceptional condition where infected files and be kept safe for further use. It also perform complementary tasks such as cleaning computer by cleaning recycle bin, SysRes, temp files, etc. It also provides a task manager to improve performance of the system by ending processes that are not required and view CPU usage.
Many times it is seen that in achieving large and important jobs most of the time small but, crucial jobs are left undone. So antivirus software are many in number and also have large and significant databases but always have some or the other vulnerability’s which may lead to data loss and threat may do its work. So considering this files such as autorun.inf, etc are been blocked so as to prevent from further bigger problems.

Main characteristics:-
1)    To scan, detect and kill virus, worms, malwares, Trojans, etc and make data and communication secure.
2)    It not only scan total system but it also scans specific drive folder or file and so on as per the requirement.
3)    It scans removable drive as soon as it is attached to the system.
Complementary characteristics:-
1)    To clean computer system by cleaning recycle bin, sysres, temp files, etc.
2)    To give each drive details and other information about used size and free space.
3)    To provide facility to view log files, status, virus list, infected file and other such information.
4)    To provide a task manager to improve performance of the system by ending processes that is not required and view CPU usage.
5)    To provide vault facility in the case of emergency or exceptional condition where infected files and be kept safe for further use.

2) DATA OPERATING TOOL (D.O.T.) :-

The system software ‘data operating tool (dot)’ performs five different operations on data for data secure transferring and size related processing.
During the process of downloading data via internet the end user face many problems such as power failure, corruption of data, network problem, etc. Which results into breakage of the downloading process. So as to overcome this problem the download manager module helps to download data continuously without any obstacles. It is a module dedicated to the task of downloading (and sometimes uploading) possibly unrelated stand-alone files from (and sometimes to) the internet for storage. The typical download manager at a minimum provides means to recover from errors without losing the work already completed, and can optionally split the file to be downloaded (or uploaded) into 2 or more segments, which are then moved in parallel, potentially making the process faster within the limits of the available bandwidth.
During the process of transferring a file or data from one stand-alone computer to another, pen drives or flash drives are the means used for portability.but, still large amount of the data cannot be transferred. So a limit is paced on the size of the data.similarly, many email systems place a limit on the size of an email message. If one wants to email someone a file that is larger than the maximum size, spliting the file into pieces smaller than the limit and email the individual pieces becomes simpler task. So the splitter module helps to split these files into the smaller segments essential for the transferring processes.
But, still the problem of the space and size complexity may not be solved completely. Hence, the compressor module gives a hand to such problems. The process of decreasing size of the files or other contents is called “compressing”. Compression works by finding patterns in the data, then replacing these patterns with a special smaller patterns.
    Many times image processing is needed for security and size problems to overcome. Image cropping crops a specific part of an image. For example, it helps in cropping profile pic out of a group photo.
    Image steganography is used to hide the data behind a required image. There are many ways for secure data transfer form which image steganography is one.
    This system software combines many user defined aspects related to data mainly its size and transfer.

Download Manager

Download managers include one or more of the following features:
  1. Pausing the downloading of large files.
  2. Resuming broken or paused downloads (especially for very large files).
  3. Downloading files on poor network and other connections.
  4. Downloading several files from a site automatically according to simple rules (file types, updated files, etc. - see also offline browser).
  5. Automatic recursive downloads (mirroring).
  6. Scheduled downloads (including, automatic hang-up and shutdown).
  7. Searching for mirror sites, and the handling of different connections to download the same file more quickly (segmented downloading).
  8. Variable bandwidth usage.
  9. Automatic subfolder generation.
  10. Provides data security from corruption.

Splitter

Splitter include one or more of the following features:
  1. Splitting the larger file into smaller segments.
  2. Reduces space and size complexity.
  3. Reduces memory wastage.
  4. Increases transferring, downloading (or uploading) speed of the data.
  5. Provides data security from corruption.
  6. Provides efficiency and accuracy for transferring process.
  7. Increases portability.

Compressor

Compressing commonly includes one or more of the following features:
  1. Compressing the larger file into smaller one.
  2. Reduces space and size complexity.
  3. Reduces memory wastage.
  4. Increases transferring, downloading (or uploading) speed of the data.
  5. Provides data security from corruption.
  6. Provides efficiency and accuracy for transferring process.
  7. Increases portability.

Crop

Crop commonly include one or more of the following features:
  1. Cropping a specific part from an image.
  2. Reduces space and size complexity.
  3. Reduces memory wastage.
  4. Increases transferring, downloading (or uploading) speed of the data.
  5. Provides efficiency and accuracy for transferring process.
  6. Increases portability.

Steganography

Steganography commonly include one or more of the following features:
  1. Steganography hides the important data behind specific image.
  2. Reduces space and size complexity.
  3. Reduces memory wastage.
  4. Provides data security from corruption.
  5. Provides efficiency and accuracy for transferring process.
  6. Increases portability.

No comments:

Post a Comment