Professional Documents
Culture Documents
INTERNET CONTROLLER
1. 1 Introduction
Internet Controller is an internet control software. Its main purpose is to
control the use of Internet by net users. It can also be viewed as parental control
software to block access to objectional web sites which can be accessed by minors.
Internet access control is necessary to prevent Internet misuse. However,
company managers can not use Internet filter software to stop any web abusive
behavior because there are always some URL those software products can not block.
Moreover, as an effective web tracker, it should not control Internet access too strictly
because employees need to use Internet resources for business at workplace. On the
other hand, web tracking and employee surveillance would cause some legal issues in
the some countries. So workplace monitoring software or spyware would cause
dispute on privacy instruction. So Internet access management is a sensitive issue at
work. A manager had better not use some spy software, which log anything including
employee’s private data. Spying employee everything is not a good thing at
workplace. But, certainly, abusing Internet at work is becoming more serious than
before. Web access control is important in terms of employee supervision.
Many Companies are now making this investment and not so much because of
security concerns but because of increased business use of the Internet (roughly 30%
of all U.S. workers are now online). As more and more businesses provide high-speed
and dial-up Internet access to their employees, they seek to avoid employees
accessing pornography or games or doing excessive personal business through the
Web or E-mail.
A 2001 study found that 14 million employees in the United States i.e. more
than one-third of 40 million employees online have their Internet or e-mail use at
work under continuous surveillance. Worldwide, the number of employees under
surveillance is estimated at 27 million, according to the Privacy Foundation study.
Though still largely the domain of corporations, an increasing number of small
businesses are monitoring employee Web and e-mail use. In-Stat/MDR found that as
far back as 2000, 19% of the small businesses it surveyed were monitoring employee
Web use, with 10% of the respondents also taking action to "block" certain sites
considered inappropriate.
Internet Controller 2
The 2nd main reason for use of Internet Controller other than Companies
monitoring their Employees is parental control.
Protecting minors from inappropriate material on the Internet is a parental task
that still has no perfect solutions, however parental control software programs provide
significant assistance to parents who want to keep their children safe. It gives you the
ability to prevent your kids from harmful web sites, chat rooms, and programs, whilst
still allowing your kids to enjoy the educational and entertaining resources that are
available on the web, and accessible though the computer.
1.2 HISTORY
The Internet controller (IC) is a packet data capability that is being added to
the production deliveries of the System Improvement Program (SIP) radio assemblies.
Protecting minors from inappropriate material on the Internet is a parental task
that still has no perfect solutions, however parental control software programs provide
significant assistance to parents who want to keep their children safe. It gives you the
ability to prevent your kids from harmful web sites, chat rooms, and programs, whilst
still allowing your kids to enjoy the educational and entertaining resources that are
available on the web, and accessible though the computer.
From the prototypes developed in 1993, the INC has evolved to a highly functional
router/gateway for the tactical Internet, becoming the heart of the digitized battlefield.
Using the Combat Net Radio to support data communications in a mixed voice and
data environment was made possible by advances in the radio to improve data
reliability and channel access control. Extending the basic data capabilities through
distributed switching functionality creates a richly connected packet data network for
the entire tactical battlefield
blocking the internet usage. Using this software the user will also be able to set the
time limit and data transfer limit for use of internet.
The various work products that will be delivered will be as follows:
Java
Java is an object-oriented programming language with a built-in application
programming interface (API) that can handle graphics and user interfaces and that can
be used to create applications or applets. Because of its rich set of API's, similar to
Macintosh and Windows, and its platform independence, Java can also be thought of
as a platform in itself. Java also has standard libraries for doing mathematics.
Much of the syntax of Java is the same as C and C++. One major difference is
that Java does not have pointers. However, the biggest difference is that you must
write object oriented code in Java. Procedural pieces of code can only be embedded in
objects. In the following we assume that the reader has some familiarity with a
programming language. In particular, some familiarity with the syntax of C/C++ is
useful.
Tomcat 5.0
TOMCAT is a general-purpose Monte Carlo simulator of particle transport in
1-D and arbitrary 2-D and 3-D structures (TOpography based Monte CArlo
Transport). The main application of TOMCAT is in the simulation of Ion
Implantation, using the physically-based models of UT-MARLOWE 5.0 (See ranges
Internet Controller 4
SQL Profiler provides a window into the inner workings of your database. You can
monitor many different event types and observe database performance in real time.
SQL Profiler allows you to capture and replay system "traces" that log various
activities. It's a great tool for optimizing databases with performance
Internet Controller 5
Service Manager is used to control the MSSQLServer (the main SQL Server
process), MSDTC (Microsoft Distributed Transaction Coordinator) and SQLServer
Agent processes. An icon for this service normally resides in the system tray of
machines running SQL Server. You can use Service Manager to start, stop or pause
any one of these services.
Waterfall Model
Analy
sis Design Coding Testing
Internet Controller 6
Versions to be established
• The initial version will be called the “1.0.0 BETA” version which will be used
for testing purposes.
• The next actual retail version will be 1.0.0.
Tasks Distribution
Project Members
1. SHARIQUE ANWAR
project guide
Employee
name : char monitors
emp_id : int
designation : char
salary : float Internet Facility
tel_no : double int Security Dept
uses browser no
browser version user id : char
useinternet() user password : char
designation : char
monitor()
Parent report()
user id : char
controls
password : char
uses
monitor() uses
uses
Controller
version_no : float
filter_sites()
Internet Usage record
block_sites()
usage time : float set_timelimits()
user_id : char generates report monitor_sites()
amt of data transfer : float set_datatransferlimits()
no of browsed sites : int
monitors minor
Objectionable Web Site record
name : char
Minor url : char
name : char
age : int
amt of net use : float
amt of data transfer : float
useinternet()
Internet Controller 10
States
• Monitoring: Here the controller will monitor the internet usage of the
user.
• Blocking: Here the controller will block the objectionable web sites.
• Filtering: Here the controller will filter the objectionable data found.
• Displaying filtered data: On filter completion filtered data is
displayed.
Internet Controller 11
Monitoring
filtering complete
auto log off
generating
report displaying
filtered data
displaying
report
1. Efficiency
Internet Controller 13
Our software will be designed for good performance. We expect that at the
very least all the major functionalities of the system will be executed. The response
time will be 2 minutes
2. Usability
The software strives to be user friendly. User will require no special browser
version. The features of the software will be presented in a clear and concise way,
with no. of help frames available at each step of the software.
3. Reliability
Our software will aim for maximum reliability. In case of failures, there will
be instant notification The software is password protected and only valid users will be
able to access the software.
4. Portability
Our software is built using J2EE which is architecturally neutral. So our
software will be able run on many platforms.
2. Technical Risk
Validation Criteria
Here we design test cases which will test the functionality of the system.
3 SYSTEM DEVELOPMENT
3.1 Technology
Our project deals with building an Internet Monitoring Software. This software
can be used by companies to monitor their employees and by parents to restrict the
internet usage of their children.
The main purpose of the software is to control the internet usage of the
users. This software will incorporate the functions of monitoring, filtering and
blocking the internet usage. Using this software the user will also be able to set the
time limit and data transfer limit for use of internet.
Internet Controller 17
During the technical feasibility studies following issues are taken into
consideration
As in our proposed system our team has technically trained manpower with
knowledge of developing the system. We are going to used following web
technology,
JDK1.5
File System
Internet Controller 18
• Class Employee:
Operations:1. useinternet ()
• Class Company
Attributes: 1.usage time 2.user_id 3.amt of data transfer 4.no of browsed sites
• Class Parent
Internet Controller 19
Operations: 1. monitor()
• Class Minors
Operations: 1. useinternet()
• Class Controller
Attributes: 1.version_no
• Setting of data transfer limit: This function will set the amount of
data transfer that is allowed through internet. This also will vary from
user to user.
• Blocking: This function will block internet access to the objectionable
web sites or even e-mails, instant messages or chat session which
contain obscene material or inappropriate words. Blocking can be done
by using database record or by homepage.
• Generate report: This function will generate report regarding the
usage of internet. The report will include information regarding usage
time, user name, web sites visited, data transfer etc.
Level 0
Internet Controller 21
Level 1
Collaboration Diagram
3: logs out
a : User 1: uses
b : Internet
Facility
e : Security
Dept
2: monitors net
Sequence Diagram
monitors net
logs out
generates report
submits report
Sequence Diagram focuses on the time ordering of the messages. This diagram
shows the sequence in which the software monitors the net usage of the user.
Internet Controller 25
a : User 1: uses
b : Internet
Facility
6: blocks sites
2: monitors net
d : Objectional Web
5: record found site record
This collaboration diagram shows what happens when the user logs into
inappropriate web sites.
Internet Controller 26
monitors net
record found
blocks sites
Design Overview
Internet Controller 27
3. Block the X X
Objectionable
websites.
4. Setting of time, X
data
Limits and level of
blocking.
5. Generate report X
regarding usage.
6. To keep X
objectional website,
keyword, IC user
records.
Application domain
Here from the application domain we get the analysis classes of the business
domain that needs to be represented in the architecture.
1. Monitor component
2. Blocking component
3. Filtering component
4. Report Generation component
Infrastructure Domain
From the Infrastructure domain we get infrastructure components that enable
application Components but have no business connection to business domain
1. User management
2. Database Management
Interface Domain
Here we get one or more specialized components that process the data that
flows across the interface
1. GUI
2. Internet Interface
1. GUI
Here we concern with the main user interface part.GUI will be the interface between
the user and the software. Here we see how the user interfaces with the IC software.
2. Internet Interface
Internet Controller 29
This component deals with how the browser deals with the IC software.
ARCHITECTURE DIAGRAM
Internet Controller
Software
User Report
External Securi ty Database
Managment generation
Commun Managment
Component Diagram
Component Diagram
Component diagram occurs after the first iteration of architectural design has
been completed. A complete set of software components is defined during
architectural design.
But the internal data structures and processing details of each component are
represented in component level design. So the component level diagram defines the
data structure, algorithms, communication mechanisms allocated to each component.
Descriptions of Components
Internet Controller 30
• Monitor Component
Attributes: 1.Data transfer 2.Time limit 3.Start time 4.Stop time 5. data amount
transferred 6. No of obi sites visited.
Operations: 1. detect website () 2.detect keyword () 3.set data transfer limit () 4.
Set time limit () 5. Calculate usage duration () 6. Generate report () 7. get website
record () 8. get keyword record () 9.set level of blocking ()
<<block fun>>
detect website()
<<filter fun>>
Monitor
Data transfer limit : int
detect keyword() Time limit : float
Start time : float
Stop time : float
data amt transferred : float
<<report fun>> No of obj sites visited : int
detect website()
generate report() detect keyword()
set datatransferlimit()
set time limit()
calculate usageduration()
<<Obj Website record>> generate report()
get website record()
get keyword record()
get website record()
• Block Component
Attributes: 1.name of blocked site: 2. no of blocked sites 3. date of blocking
Operations: 1. block site () 2. Generate report () 3. Update database ()
Internet Controller 31
<<monitor>>
Block Data
updatedatabase()
name of blocked sites : char
no of blocked sites : int
date of blocking : float
blocksite()
genreport()
<<report>>
updatedatabase()
genreport()
• Filter Component
Attributes: 1. Keywords recognized 2.amt of data filtered 3. Filtering time 4.date
of
Filtering
Operations: 1. filter mail () 2.filter website () 3.generate report () 4.update database
()
Internet Controller 32
<<Monitor>>
filtermail()
Filter Data
filterwebsite()
keywords recognized : int
amt of data filtered : int
filter level : char
filtered time : float
filtermail()
<<report>> filter website()
displayfiltered data()
genreport()
genreport()
<<monitor>>
<<block >>
assemble()
• GUI component
GUI Component
<<monitor>>
assemble()
GUI
Obj website record : char
<<filter>> Keyword record : char
history : char
updates : char
assemble() version : char
Options : char
set time limit : char
set data transfer limit : char
usage time : float
<<blocking>> blocking level : int
INTERNET INTERFACE
browser name : char
<<GuI>> browser version : float
downloads : float
generate report()
<<report>>
retrieve()
OBJECTIONAL WEBSITE RECORD
website name : char
website domain : float
website DNS : float
updates of website record : char
<<monitor>>
display()
delete()
retrive()
display() update database()
<<Monitor>>
display()
KEYWORD RECORD
keyword name : char
<<report>> no. of keywords : int
updates of keywords : char
retrieve()
display()
delete()
retrive()
update database()
Internet Controller 39
4 EXPRIMENTAL ANALYSIS
4.1 CODING
4.1.1 CLINT SIDE CODING
LOGIN
import java.io.BufferedOutputStream;
import java.net.Socket;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.ResultSet;
import java.sql.Statement;
import java.text.SimpleDateFormat;
import java.util.Date;
/*
* Login.java
*
* Created on February 6, 2007, 10:57 PM
*/
/**
*
* @author Dishant
*/
public class Login extends javax.swing.JFrame {
public Login() {
initComponents();
Sd= new ServeDiag(this,true);
Sd.show(false);
}
public void Connect() throws Exception{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con= DriverManager.getConnection("jdbc:odbc:Internet","sa","sql");
stmt =
con.createStatement(ResultSet.TYPE_SCROLL_INSENSITIVE,ResultSet.CONCUR
_UPDATABLE);
}
public boolean CheckLogin() throws Exception {
boolean flag=false;
Connect();
rs=stmt.executeQuery("Select * from USER_MASTER where
USER_ID='"+jTextField1.getText()+"'and
USER_PASSWORD='"+jPasswordField1.getText()+"' ");
if(rs.next()){
if(rs.getInt("STATUS")==1)
flag=true;
else{
flag=false;
jLabel2.setText("You Account Has Been Disabled By Admin");
}
}
rs.close();
stmt.close();
con.close();
return flag;
}
public boolean CheckTime() throws Exception {
boolean flag;
Internet Controller 41
Connect();
rs=stmt.executeQuery("Select * from USER_MASTER WHERE
USER_ID='"+jTextField1.getText()+"' and convert(char(8),START_TIME,8) <
convert(char(8),getdate(),8) and convert(char(8),END_TIME,8) >
convert(char(8),getdate(),8)");
flag= rs.next();
rs.close();
stmt.close();
con.close();
return flag;
}
public void ReportError(int code,String str,String Msg) throws Exception{
Connect();
jLabel2.setText(Msg);
stmt.executeUpdate("Insert into
LOG_MASTER(USER_ID,IP_ADDRESS,ACTIVITY_TYPE,DATE_TIME_STAM
P,MISC)values('"+jTextField1.getText()+"','"+java.net.InetAddress.getLocalHost().get
HostAddress()+"',"+code+",convert(char(8),getdate(),8),'"+str+"')");
stmt.close();
con.close();
}
/** This method is called from within the constructor to
* initialize the form.
* WARNING: Do NOT modify this code. The content of this method is
* always regenerated by the Form Editor.
*/
// <editor-fold defaultstate="collapsed" desc=" Generated Code ">//GEN-
BEGIN:initComponents
private void initComponents() {
jLayeredPane1 = new javax.swing.JLayeredPane();
label1 = new java.awt.Label();
Internet Controller 42
setDefaultCloseOperation(javax.swing.WindowConstants.EXIT_ON_CLOSE);
setTitle("Intenet Controller Login");
setBackground(new java.awt.Color(153, 0, 153));
setName("Net tracker Login");
label1.setText("User Name");
label1.setBounds(80, 60, 70, 20);
jLayeredPane1.add(label1, javax.swing.JLayeredPane.DEFAULT_LAYER);
label2.setText("Password");
label2.setBounds(90, 100, 60, 20);
jLayeredPane1.add(label2, javax.swing.JLayeredPane.DEFAULT_LAYER);
button1.setLabel("Login");
button1.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
button1ActionPerformed(evt);
}
});
jLabel1.setHorizontalAlignment(javax.swing.SwingConstants.CENTER);
jLabel1.setText("Preferances");
jLabel1.addMouseListener(new java.awt.event.MouseAdapter() {
public void mouseClicked(java.awt.event.MouseEvent evt) {
jLabel1MouseClicked(evt);
}
});
button2.setLabel("Clear");
button2.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
button2ActionPerformed(evt);
}
});
getContentPane().add(jLayeredPane1, java.awt.BorderLayout.CENTER);
java.awt.Dimension screenSize =
java.awt.Toolkit.getDefaultToolkit().getScreenSize();
setBounds((screenSize.width-338)/2, (screenSize.height-239)/2, 338, 239);
}
Internet Controller 44
// </editor-fold>//GEN-END:initComponents
if(jTextField1.getText().equals("") || jPasswordField1.getText().equals(""))
jLabel2.setText("Please enter UserName and Password...");
else{
try{
if(button1.getLabel().equals("Login")){
if( CheckLogin() ) {
if( CheckTime() ) {
button1.setLabel("Logout");
ReportError(0,"User Logged In","Succesfully Login");
clientOut.flush();
clientOut.close();
}
else{
}
}else{
jLabel2.setText("Incorrect UserName or Password");
}
else{
client = new Socket(Sd.serverIp,Sd.port);
clientOut = new BufferedOutputStream(client.getOutputStream());
String errMsg =
jTextField1.getText()+":"+client.getLocalAddress().toString().substring(1)+":"+"Log
Out"+"\n";
clientOut.write(errMsg.getBytes(), 0, errMsg.length());
clientOut.flush();
ReportError(1, "Client Has Logged Out","Succesfully Logout");
button1.setLabel("Login");
jPasswordField1.setText("");
jTextField1.setEnabled(true);
jPasswordField1.setEnabled(true);
}
Internet Controller 46
client.close();
}
catch(Exception ex){
jLabel2.setText(ex.getMessage());
}
}
/**
* @param args the command line arguments
*/
public static void main(String args[]) {
java.awt.EventQueue.invokeLater(new Runnable() {
public void run() {
new Login().setVisible(true);
}
});
}
/**
*
* @author Dishant
*/
public class MainPage extends javax.swing.JFrame{
getContentPane().setLayout(null);
setDefaultCloseOperation(javax.swing.WindowConstants.EXIT_ON_CLOSE);
setTitle("Internet Controller");
jLabel1.setText("HTTP Proxy Port");
getContentPane().add(jLabel1);
jLabel1.setBounds(40, 40, 80, 30);
getContentPane().add(jTextField1);
jTextField1.setBounds(140, 50, 100, 19);
getContentPane().add(jTextField2);
jTextField2.setBounds(140, 90, 100, 19);
jButton1.setText("Start");
jButton1.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
jButton1ActionPerformed(evt);
Internet Controller 49
}
});
getContentPane().add(jButton1);
jButton1.setBounds(80, 150, 80, 23);
jButton2.setText("Stop");
jButton2.setEnabled(false);
jButton2.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
jButton2ActionPerformed(evt);
}
});
getContentPane().add(jButton2);
jButton2.setBounds(180, 150, 90, 23);
java.awt.Dimension screenSize =
java.awt.Toolkit.getDefaultToolkit().getScreenSize();
setBounds((screenSize.width-290)/2, (screenSize.height-276)/2, 290, 276);
}
// </editor-fold>//GEN-END:initComponents
jp.closeSocket();
jTextField1.setEnabled(true);
jTextField2.setEnabled(true);
jButton1.setEnabled(true);
jButton2.setEnabled(false);
Internet Controller 50
/* while (true) {
try { Thread.sleep(3000); } catch (Exception e) {}
}*/
}
// TODO add your handling code here:
}//GEN-LAST:event_jButton1ActionPerformed
/**
* @param args the command line arguments
*/
public static void main(String args[]) {
java.awt.EventQueue.invokeLater(new Runnable() {
public void run() {
new MainPage().setVisible(true);
}
});
}
// *** Go To Record and Move To Record: create strings for maintaining URL and
Form parameters
String MM_keepBoth,MM_keepURL="",MM_keepForm="",MM_keepNone="";
String[] MM_removeList = { "index", MM_paramName };
}
}
tempStr = "";
for (int i=0; i < MM_keepForm.length(); i++) {
if (MM_keepForm.charAt(i) == '<') tempStr = tempStr + "<";
else if (MM_keepForm.charAt(i) == '>') tempStr = tempStr + ">";
else if (MM_keepForm.charAt(i) == '"') tempStr = tempStr + """;
else tempStr = tempStr + MM_keepForm.charAt(i);
}
MM_keepForm = tempStr;
// create the Form + URL string and remove the intial '&' from each of the strings
MM_keepBoth = MM_keepURL + MM_keepForm;
if (MM_keepBoth.length() > 0) MM_keepBoth = MM_keepBoth.substring(1);
if (MM_keepURL.length() > 0) MM_keepURL = MM_keepURL.substring(1);
if (MM_keepForm.length() > 0) MM_keepForm = MM_keepForm.substring(1);
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Welcome--IMS</title>
Internet Controller 55
<style type="text/css">
<!--
.style3 {font-size: 12px; font-weight: bold; }
-->
</style>
</head>
<body>
<table border="0" bordercolor="#0000CC">
<tr>
<td bgcolor="#0099CC"><span class="style3">USERNAME</span></td>
<td bgcolor="#0099CC"><div align="center"
class="style3">START_TIME</div></td>
<td bgcolor="#0099CC"><div align="center"
class="style3">END_TIME</div></td>
<td bgcolor="#0099CC"><div align="center" class="style3">STATUS</div></td>
<td bgcolor="#0099CC"><div align="center"
class="style3">UPLOAD_LIMIT(MB)</div></td>
<td bgcolor="#0099CC"><div align="center"
class="style3">DOWNLOAD_LIMIT(MB)</div></td>
<td bgcolor="#0099CC"><div align="center"
class="style3">UPLOADED(bytes)</div></td>
<td bgcolor="#0099CC"><div align="center"
class="style3">DOWNLOADED(bytes)</div></td>
<td bgcolor="#0099CC"><span class="style3">TYPE</span></td>
</tr>
<% while ((UserRecord_hasData)&&(Repeat1__numRows-- != 0)) { %>
<tr>
<% UserRecord_data = (UserRecord.getString("USER_ID"));%>
<td bgcolor="#0099CC"> <A HREF="Update.jsp?<%= MM_keepURL +
((MM_keepURL!="")?"&":"") + "USER_ID=" +
UserRecord_data%>"><%=UserRecord_data%></A></td>
Internet Controller 56
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getObject("START_TIME"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getObject("END_TIME"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getObject("STATUS"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getObject("UPLOAD_LIMIT"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getObject("DOWNLOAD_LIMIT"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getObject("UPLOADED"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getObject("DOWNLOADED"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
<td bgcolor="#0099CC"><%=(((UserRecord_data =
UserRecord.getString("TYPE"))==null ||
UserRecord.wasNull())?"":UserRecord_data)%></td>
</tr>
<%
Repeat1__index++;
UserRecord_hasData = UserRecord.next();
}
%>
</table>
</body>
</html>
<%
Internet Controller 57
UserRecord.close();
StatementUserRecord.close();
ConnUserRecord.close();
%>
Preferences
Here we used to IP address and Port Number which is we are going to use.
Server IP:- This is used input server IP address the server we are going to use.
Port :- Here port number which listen by server module
Internet Controller 59
HOME PAGE
Internet Controller 60
Home page has display the all information about the user and handling the user
there is following option.
DeleteUsers:-this is used to delete the user.
CreateUser:-this will create new user.
Reports:-this link is used to generate report of authenticated user.
LogOut:-this is used to logout successfully.
DELETE USER
This window is used for deleting user account.
Select the checkbox to delete user which user we have to deleted and clicking on
deleting button.
Internet Controller 62
REPORTS
This window is display all information of user.
Enter Date:- Enter the date to display the particular user and there all
information related input on that day.
USER_ID:-Display the user name.
IP_ADDRESS:- Display the IP_ADDRESS which is used in internet
connection.
Internet Controller 63
Log Out
Click on logout button to logout success Fully.
Internet Controller 64
Below is a script for creating the database schema in Oracle. This will be
stored in a text file and loaded into Oracle when the SRS system is first installed (in
Internet Controller 65
other words, this file will only be used when creating the database, and not in
accessing it).
Note again that this is a preliminary design. Particularly, primary and foreign
keys have not been defined, nor does the design implement the decision to have every
record of every table identified by a unique number.
4.2.1 LOG_MASTER
CREATE TABLE [LOG_MASTER] (
[USER_ID] [nvarchar] (50) COLLATE
SQL_Latin1_General_CP1_CI_AS NULL ,
[IP_ADDRESS] [nvarchar] (50) COLLATE
SQL_Latin1_General_CP1_CI_AS NULL ,
[ACTIVITY_TYPE] [int] NULL ,
[URL] [nvarchar] (50) COLLATE SQL_Latin1_General_CP1_CI_AS
NULL ,
[REST_URL] [nvarchar] (50) COLLATE
SQL_Latin1_General_CP1_CI_AS NULL ,
[UPLOAD_DATA] [int] NULL ,
[DOWNLOAD_DATA] [int] NULL ,
[DATE_TIME_STAMP] [datetime] NULL ,
[MISC] [nvarchar] (200) COLLATE SQL_Latin1_General_CP1_CI_AS
NULL
) ON [PRIMARY]
GO
4.2.2 USER MASTER
CREATE TABLE [USER_MASTER] (
[USER_ID] [nvarchar] (50) COLLATE
SQL_Latin1_General_CP1_CI_AS NOT NULL ,
Internet Controller 66
5. CONCLUSION
Many Companies are now making this investment and not so much because of
security concerns but because of increased business use of the Internet (roughly
30% of all U.S. workers are now online). As more and more businesses provide
high-speed and dial-up Internet access to their employees, they seek to avoid
employees accessing pornography or games or doing excessive personal
business through the Web or E-mail.
5.1 Future
• It is user interface designing as easy to use
• Main reason for use of internet controller other than companies
monitoring their employees is parental control
• It’s easy to control every user.
Internet Controller 67
5.2 ADVANTAGE
It can viewed as parental control software to block access to
objectional web sites which can be accessed by minors.
• Worry less while your kids are online or using the computer when you are
away.
• Protect your personal information.
• Know how your kids have been using the computer and restrict it's use.
• Protect your children from being connected by possible online predators.
• Enable your child to get the most out of their computer time.
5.3 DISADVANTAGE
• It is costly to use
• User can not access without permission of administration
• It is tough to maintain
• It’s does not provide good accessibility
5.4 APPLICATION
Internet access control is necessary to prevent Internet misuse. However,
company managers can not use Internet filter software to stop any web abusive
behavior because there are always some URL those software products can not block.
Moreover, as an effective web tracker, it should not control Internet access too strictly
because employees need to use Internet resources for business at workplace. On the
other hand, web tracking and employee surveillance would cause some legal issues in
the some countries. So workplace monitoring software or spyware would cause
dispute on privacy instruction. So Internet access management is a sensitive issue at
work. A manager had better not use some spy software, which log anything including
employee’s private data. Spying employee everything is not a good thing at
Internet Controller 68
workplace. But, certainly, abusing Internet at work is becoming more serious than
before. Web access control is important in terms of employee supervision.
5.5 CONCLUSTION
Protecting minors from inappropriate material on the Internet is a parental task
that still has no perfect solutions, however parental control software programs provide
significant assistance to parents who want to keep their children safe. It gives you the
ability to prevent your kids from harmful web sites, chat rooms, and programs, whilst
still allowing your kids to enjoy the educational and entertaining resources that are
available on the web, and accessible though the computer.
• Our Internet Controller provides a good balance between filtering
objectionable material & not filtering too much. Our important aspect here
will be the ability to customize filter sensitivity for each user.
• We are going to use best combination of filtering techniques including
URL filtering, keyword filtering, and dynamic filtering.
• Limit and set the amount of data that can be sent or received to/from your
computer.
• We will offer each & every detail in the reports generated for each internet
user who will use system on which our s/w is installed. These details
include the websites visited, amount of data transfer, keywords blocked,
session duration, Session history etc.