To Enhanced GMAIL Application using FTP & SMTP Proxy Server

Page 1

IDL - International Digital Library

Volume 1, Issue 1 IDL CODE: IDL0010

To Enhanced GMAIL Application using FTP & SMTP Proxy Server *Megha B.G

*Manasvinatesh

*Amrintaj

*Gagana H.S

meghabelur95@gmail.com AIT, VTU University

Manasvinatesh600@gmail.com AIT, VTU University

Amrintaj27h@gmail.com AIT, VTU University

gaganahs2016@gmail.com AIT, VTU University

Under the guidance: ** Dr. Pushpa Ravikumar HOD AIT, VTU University. LITERATURE SURVEY Abstract : In this project we have plan to implement a effective E-mail access using proxy server. Our application provides E-mail access to user even though the user is blocked by the main server by eliminating the permission to access the e-mail. Proxy server plays a vital role in our project. Our solution will remove the overhead of email access to user and introduce a better way which does not lead to any destruction. Literature survey is mainly carried out in order to analyze the background of the current project, which helps to find out flaws in the existing system & guides on which unsolved problems can work out. So, the following topics not only illustrate the background of the project but also uncover the problems and flaws which motivated to propose solutions and work on this project. A variety of research has been done on power aware scheduling. Following section explores different references that discuss about several topics related to power aware scheduling. “A proxy approach to e-mail security”, A wide variety of electronic mail software is used to send messages across the Internet. Two principal protocols – Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) – are used to allow mail clients and servers running in extremely heterogeneous environments to communicate with each other and thus send and receive e-mail. The one disadvantage of this heterogeneity is the amount of effort required to add functionality to all these different pieces of software (and their frequent upgrades), particularly with complex services such as security. Such services are only valuable when implemented in the majority of applications. An alternative approach is to examine the protocols and data flow involved in communication between the mail clients and servers. By modifying data as it passes between the two, a proxy can provide functionality to any application that uses those protocols without requiring them to be separately upgraded. We describe the use of this approach to secure electronic mail between sending and receiving hosts. Author: Brown and C. R. Snow, “A proxy approach to e-mail security,” Software: Practice and Experience, vol. 29, no. 12, pp. 1049–1060, Oct. 1999.] “Delegate: A Proxy based architecture for secure website access from an entrusted machine”, Performing sensitive online transactions using computers found in cyber cafes and public libraries is risky. The entrusted nature of these machines creates a target rich environment. A simple keystroke logger, a common payload of many viruses, records and transmits the secret information (e.g., passwords, credit card numbers, PIN numbers) entered into these machines. In addition, sophisticated malware can hijack a user’s authenticated session to perform unauthorized transactions masquerading as the user. This paper presents Delegate, a proxy-based architecture that enables a user to

International Digital Library

1


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
To Enhanced GMAIL Application using FTP & SMTP Proxy Server by dbpublications - Issuu