Sunday, 25 September 2011

Security Basics and ASP.NET Support


What is the one thing forums, eCommerce sites, online email websites, portal websites, and social network sites all have in common? They all offer user accounts. Sites that offer user accounts must provide a number of services. At a minimum, new visitors need to be able to create an account and returning visitors must be able to log in. Such web applications can make decisions based on the logged in user: some pages or actions might be restricted to only logged in users, or to a certain subset of users; other pages might show information specific to the logged in user, or might show more or less information, depending on what user is viewing the page.
This is the first tutorial in a series of tutorials that will explore techniques for authenticating visitors through a web form, authorizing access to particular pages and functionality, and managing user accounts in an ASP.NET application. Over the course of these tutorials we will examine how to:
  • Identify and log users in to a website
  • Use ASP.NET's Membership framework to manage user accounts
  • Create, update, and delete user accounts
  • Limit access to a web page, directory, or specific functionality based on the logged in user
  • Use ASP.NET's Roles framework to associate user accounts with roles
  • Manage user roles
  • Limit access to a web page, directory, or specific functionality based on the logged in user's role
  • Customize and extend ASP.NET's security Web controls
These tutorials are geared to be concise and provide step-by-step instructions with plenty of screen shots to walk you through the process visually. Each tutorial is available in C# and Visual Basic versions and includes a download of the complete code used. (This first tutorial focuses on security concepts from a high-level viewpoint and therefore does not contain any associated code.)
In this tutorial we will discuss important security concepts and what facilities are available in ASP.NET to assist in implementing forms authentication, authorization, user accounts, and roles. Let's get started!
Note: Security is an important aspect of any application that spans physical, technological, and policy decisions and requires a high degree of planning and domain knowledge. This tutorial series is not intended as a guide for developing secure web applications. Rather, it focuses specifically on forms authentication, authorization, user accounts, and roles. While some security concepts revolving around these issues are discussed in this series, others are left unexplored.

Authentication, Authorization, User Accounts, and Roles

Authentication, authorization, user accounts, and roles are four terms that will be used very often throughout this tutorial series, so I'd like to take a quick moment to define these terms within the context of web security. In a client-server model, such as the Internet, there are many scenarios in which the server needs to identify the client making the request. Authentication is the process of ascertaining the client's identity. A client who has been successfully identified is said to be authenticated. An unidentified client is said to be unauthenticated or anonymous.
Secure authentication systems involve at least one of the following three facets: something you know, something you have, or something you are. Most web applications rely on something the client knows, such as a password or a PIN. The information used to identify a user - her username and password, for example - are referred to as credentials. This tutorial series focuses on forms authentication, which is an authentication model where users log in to the site by providing their credentials in a web page form. We have all experienced this type of authentication before. Go to any eCommerce site. When you are ready to check out you are asked to log in by entering your username and password into textboxes on a web page.
In addition to identifying clients, a server may need to limit what resources or functionalities are accessible depending on the client making the request. Authorization is the process of determining whether a particular user has the authority to access a specific resource or functionality.
A user account is a store for persisting information about a particular user. User accounts must minimally include information that uniquely identifies the user, such as the user's login name and password. Along with this essential information, user accounts may include things like: the user's email address; the date and time the account was created; the date and time they last logged in; first and last name; phone number; and mailing address. When using forms authentication, user account information is typically stored in a relational database like Microsoft SQL Server.
Web applications that support user accounts may optionally group users into roles. A role is simply a label that is applied to a user and provides an abstraction for defining authorization rules and page-level functionality. For example, a website might include an Administrator role with authorization rules that prohibit anyone but an Administrator to access a particular set of web pages. Moreover, a variety of pages that are accessible to all users (including non-Administrators) might display additional data or offer extra functionality when visited by users in the Administrators role. Using roles, we can define these authorization rules on a role-by-role basis rather than user-by-user.

Authenticating Users in an ASP.NET Application

When a user enters a URL into their browser's address window or clicks on a link, the browser makes a Hypertext Transfer Protocol (HTTP) request to the web server for the specified content, be it an ASP.NET page, an image, a JavaScript file, or any other type of content. The web server is tasked with returning the requested content. In doing so, it must determine a number of things about the request, including who made the request and whether the identity is authorized to retrieve the requested content.
By default, browsers send HTTP requests that lack any sort of identification information. But if the browser does include authentication information then the web server starts the authentication workflow, which attempts to identify the client making the request. The steps of the authentication workflow depend on the type of authentication being used by the web application. ASP.NET supports three types of authentication: Windows, Passport, and forms. This tutorial series focuses on forms authentication, but let's take a minute to compare and contrast Windows authentication user stores and workflow.

Authentication via Windows Authentication

The Windows authentication workflow uses one of the following authentication techniques:
  • Basic authentication
  • Digest authentication
  • Windows Integrated Authentication
All three techniques work in roughly the same way: when an unauthorized, anonymous request arrives, the web server sends back an HTTP response that indicates that authorization is required to continue. The browser then displays a modal dialog box that prompts the user for their username and password (see Figure 1). This information is then sent back to the web server via an HTTP header.

Authentication via Forms Authentication

Forms authentication, on the other hand, is ideal for Internet web applications. Recall that forms authentication identifies the user by prompting them to enter their credentials through a web form. Consequently, when a user attempts to access an unauthorized resource, they are automatically redirected to the login page where they can enter their credentials. The submitted credentials are then validated against a custom user store - usually a database.
After verifying the submitted credentials, a forms authentication ticket is created for the user. This ticket indicates that the user has been authenticated and includes identifying information, such as the username. The forms authentication ticket is (typically) stored as a cookie on the client computer. Therefore, subsequent visits to the website include the forms authentication ticket in the HTTP request, thereby enabling the web application to identify the user once they have logged in.
Figure 2 illustrates the forms authentication workflow from a high-level vantage point. Notice how the authentication and authorization pieces in ASP.NET act as two separate entities. The forms authentication system identifies the user (or reports that they are anonymous). The authorization system is what determines whether the user has access to the requested resource. If the user is unauthorized (as they are in Figure 2 when attempting to anonymously visit ProtectedPage.aspx), the authorization system reports that the user is denied, causing the forms authentication system to automatically redirect the user to the login page.
Once the user has successfully logged in, subsequent HTTP requests include the forms authentication ticket. The forms authentication system merely identifies the user - it is the authorization system that determines whether the user can access the requested resource.

Limiting Access to Web Pages, Directories, and Page Functionality

ASP.NET includes two ways to determine whether a particular user has authority to access a specific file or directory:
  • File authorization - since ASP.NET pages and web services are implemented as files that reside on the web server's file system, access to these files can be specified through Access Control Lists (ACLs). File authorization is most commonly used with Windows authentication because ACLs are permissions that apply to Windows accounts. When using forms authentication, all operating system- and file system-level requests are executed by the same Windows account, regardless of the user visiting the site.
  • URL authorization - with URL authorization, the page developer specifies authorization rules in Web.config. These authorization rules specify what users or roles are allowed to access or are denied from accessing certain pages or directories in the application.
File authorization and URL authorization define authorization rules for accessing a particular ASP.NET page or for all ASP.NET pages in a particular directory. Using these techniques we can instruct ASP.NET to deny requests to a particular page for a particular user, or allow access to a set of users and deny access to everyone else. What about scenarios where all of the users can access the page, but the page's functionality depends on the user? For example, many sites that support user accounts have pages that display different content or data for authenticated users versus anonymous users. An anonymous user might see a link to log in to the site, whereas an authenticated user would instead see a message like, Welcome back, Username along with a link to log out. Another example: when viewing an item at an auction site you see different information depending on whether you are a bidder or the one auctioning the item.

User Accounts and Roles

ASP.NET's forms authentication provides an infrastructure for users to log in to a site and have their authenticated state remembered across page visits. And URL authorization offers a framework for limiting access to specific files or folders in an ASP.NET application. Neither feature, however, supplies a means for storing user account information or managing roles.

Today, implementing user accounts in an ASP.NET application is much simpler thanks to the Membership framework and the built-in Login Web controls. The Membership framework is a handful of classes in the System.Web.Security namespace that provide functionality for performing essential user account-related tasks. The key class in the Membership framework is the Membership class, which has methods like:
  • CreateUser
  • DeleteUser
  • GetAllUsers
  • GetUser
  • UpdateUser
  • ValidateUser
The Membership framework uses the provider model, which cleanly separates the Membership framework's API from its implementation. This enables developers to use a common API, but empowers them to use an implementation that meets their application's custom needs. In short, the Membership class defines the essential functionality of the framework (the methods, properties, and events), but does not actually supply any implementation details. Instead, the methods of the Membership class invoke the configured provider, which is what performs the actual work. For example, when the Membership class's CreateUser method is invoked, the Membership class doesn't know the details of the user store. It doesn't know if users are being maintained in a database or in an XML file or in some other store. The Membership class examines the web application's configuration to determine what provider to delegate the call to, and that provider class is responsible for actually creating the new user account in the appropriate user store. This interaction is illustrated in Figure 3.
Microsoft ships two Membership provider classes in the .NET Framework:
  • ActiveDirectoryMembershipProvider - implements the Membership API in Active Directory and Active Directory Application Mode (ADAM) servers.
  • SqlMembershipProvider - implements the Membership API in a SQL Server database.


Tuesday, 20 September 2011

Asp.Net Session State

Problems with ASP Session State

ASP developers know session state as a great feature, but one that is somewhat limited. These limitations include:
  • Process dependent. ASP session state exists in the process that hosts ASP; thus the actions that affect the process also affect session state. When the process is recycled or fails, session state is lost.
  • Server farm limitations. As users move from server to server in a Web server farm, their session state does not follow them. ASP session state is machine specific. Each ASP server provides its own session state, and unless the user returns to the same server, the session state is inaccessible. While network IP level routing solutions can solve such problems, by ensuring that client IPs are routed to the originating server, some ISPs choose to use a proxy load-balancing solution for their clients. Most infamous of these is AOL. Solutions such as AOL's prevent network level routing of requests to servers because the IP addresses for the requestor cannot be guaranteed to be unique.
  • Cookie dependent. Clients that don't accept HTTP cookies can't take advantage of session state. Some clients believe that cookies compromise security and/or privacy and thus disable them, which disables session state on the server.

ASP.NET Session State

ASP.NET session state solves all of the above problems associated with classic ASP session state:
  • Process independent. ASP.NET session state is able to run in a separate process from the ASP.NET host process. If session state is in a separate process, the ASP.NET process can come and go while the session state process remains available. Of course, you can still use session state in process similar to classic ASP, too.
  • Support for server farm configurations. By moving to an out-of-process model, ASP.NET also solves the server farm problem. The new out-of-process model allows all servers in the farm to share a session state process. You can implement this by changing the ASP.NET configuration to point to a common server.
  • Cookie independent. Although solutions to the problem of cookieless state management do exist for classic ASP, they're not trivial to implement. ASP.NET, on the other hand, reduces the complexities of cookieless session state to a simple configuration setting.

Session configuration

Below is a sample config.web file used to configure the session state settings for an ASP.NET application:

      sqlconnectionstring="data source=;user id=<user id>;password=<password>"
The settings above are used to configure ASP.NET session state. Let's look at each in more detail and cover the various uses afterward.

  • Mode. The mode setting supports three options: inproc, sqlserver, and stateserver. As stated earlier, ASP.NET supports two modes: in process and out of process. There are also two options for out-of-process state management: memory based (stateserver), and SQL Server based (sqlserver). We'll discuss implementing these options shortly.
  • Cookieless. The cookieless option for ASP.NET is configured with this simple Boolean setting.
  • Timeout. This option controls the length of time a session is considered valid. The session timeout is a sliding value; on each request the timeout period is set to the current time plus the timeout value
  • Sqlconnectionstring. The sqlconnectionstring identifies the database connection string that names the database used for mode sqlserver.
  • Server. In the out-of-process mode stateserver, it names the server that is running the required Windows NT service: ASPState.
  • Port. The port setting, which accompanies the server setting, identifies the port number that corresponds to the server setting for mode stateserver.

There are four general configuration settings we can look at in more detail: in-process mode, out-of-process mode, SQL Server mode, and Cookieless.

In-process Mode

In-process mode simply means using ASP.NET session state in a similar manner to classic ASP session state. That is, session state is managed in process and if the process is re-cycled, state is lost. Given the new settings that ASP.NET provides, you might wonder why you would ever use this mode. The reasoning is quite simple: performance. The performance of session state, e.g. the time it takes to read from and write to the session state dictionary, will be much faster when the memory read to and from is in process, as cross-process calls add overhead when data is marshaled back and forth or possibly read from SQL Server.
In-process mode is the default setting for ASP.NET. When this setting is used, the only other session config.web settings used are cookieless and timeout.
If we call SessionState.aspx, set a session state value, and stop and start the ASP.NET process (iisreset), the value set before the process was cycled will be lost.

Out-of-process Mode

Included with the .NET SDK is a Windows® NT service: ASPState. This Windows service is what ASP.NET uses for out-of-process session state management. To use this state manager, you first need to start the service. To start the service, open a command prompt and type:

net start aspstate
We changed only from inproc mode to stateserver mode. This setting tells ASP.NET to look for the ASP state service on the server specified in the serverand port settings—in this case, the local server.

SQL Server Mode

The SQL Server mode option is similar to that of the Windows NT Service, except that the information persists to SQL Server rather than being stored in memory.
To use SQL Server as our session state store, we first must create the necessary tables and stored procedures that ASP.NET will look for on the identified SQL Server.Open cmd and then type 


and then 

For example, the following command creates a database named ASPState on a SQL Server instance named "SampleSqlServer" and specifies that session data is also stored in the ASPState database:

aspnet_regsql.exe -S SampleSqlServer -E -ssadd -sstype p

Performance and Reliability Considerations

It's worth mentioning, briefly, some of the performance and reliability issues you should consider when using ASP.NET session state modes.
  • In process. In process will perform best because the session state memory is kept within the ASP.NET process. For Web applications hosted on a single server, applications in which the user is guaranteed to be re-directed to the correct server, or when session state data is not critical (in the sense that it can be re-constructed or re-populated), this is the mode to choose.
  • Out of process. This mode is best used when performance is important but you can't guarantee which server a user will request an application from. With out-of-process mode, you get the performance of reading from memory and the reliability of a separate process that manages the state for all servers.
  • SQL Server. This mode is best used when the reliability of the data is fundamental to the stability of the application, as the database can be clustered for failure scenarios. The performance isn't as fast as out of process, but the tradeoff is the higher level of reliability.

Labels: ,

data controls in

DataList control

The DataList control displays data in a format that you can define using templates and styles. The DataList control is useful for data in any repeating structure, such as a table. The DataList control can display rows in different layouts, such as ordering them in columns or rows. Optionally, you can configure the DataList control to allow users to edit or delete information. You can also customize the control to support other functionality, such as selecting rows.

DetailsView control
The DetailsView control gives you the ability to display, edit, insert, or delete a single record at a time from its associated data source. By default, theDetailsView control displays each field of a record on its own line. TheDetailsView control is typically used for updating and inserting new records, often in a master/detail scenario where the selected record of the master control determines the record to display in the DetailsView control. The DetailsViewcontrol displays only a single data record at a time, even if its data source exposes multiple records. The DetailsView control does not support sorting.

FormView control

The FormView control gives you the ability to work with a single record from a data source, similar to the DetailsView control. The difference between theFormView and the DetailsView controls is that the DetailsView control uses a tabular layout where each field of the record is displayed as a row of its own. In contrast, the FormView control does not specify a pre-defined layout for displaying the record. Instead, you create a template containing controls to display individual fields from the record. The template contains the formatting, controls, and binding expressions used to create the form.
The FormView control is typically used for updating and inserting new records, and is often used in master/detail scenarios where the selected record of the master control determines the record to display in the FormView control. 

GridView control

A recurring task in software development is to display tabular data. ASP.NET provides a number of tools for showing tabular data in a grid, including theGridView control. With the GridView control, you can display, edit, and delete data from many different kinds of data sources, including databases, XML files, and business objects that expose data.

ListView control

The ListView control is useful for displaying data in any repeating structure, similar to the DataList and Repeater controls. Unlike those controls, the ListView control supports edit, insert, and delete operations as well as sorting and paging. The paging functionality is provided for ListView by the new DataPager control.
The ListView control is a highly customizable control that enables you to use templates and styles to define the control's UI. Like the Repeater, DataList, and FormView controls, templates in the ListView control are not predefined to render specific UI in the browser.


Sunday, 11 September 2011

Web Application File Types

Typically, a web application can have different types of files serving different purposes. Some of the files are supported by ASP.NET, while others are supported by IIS. Most of them can be added to the web application by right-clicking the project in Solution Explorer, pointing to Add, and then clicking New Item.

File Type Description
.aspx An ASP.NET Web Forms file (page) that can contain web controls and presentation and business logic.
.ascx A web user control file that defines a custom, reusable control.
.ashx A generic handler file.
.config A configuration file (typically Web.config) that contains XML elements that represent settings for ASP.NET features.
.master A master page that defines the layout for other web pages in the application.
.svc A WCF service file.
.asmx An XML web services file that contains classes and methods that are available to other web applications by way of SOAP.
.axd A handler file used to manage website administration requests, typically Trace.axd.
.resx A resource file that contains resource strings that refer to images, localizable text, or other data.
.cs or .vb Class source-code file that is compiled at run time.
Global.asax A file that contains code that derives from the HttpApplication class. This file represents the application, and contains optional methods that run at the start or end of the application lifetime.


Structure of a Web Application

When you create a new web application project, you can organize your folder in any way you want. Visual Studio creates some folders that have special purposes. All of them can be added to the web application by right-clicking the project in Solution Explorer, pointing to Add, pointing to Add ASP.NET Folder, and then clicking the desired ASP.NET folder type.

Folder Description
App_Browsers Contains browser definitions (.browser files) that ASP.NET uses to identify individual browsers and determine their capabilities.
App_Code Contains source code for utility classes and business objects (for example, .cs and .vb files) that you want to compile as part of your application. In a dynamically compiled application, ASP.NET compiles the code in the App_Code folder on the initial request to your application. Items in this folder are then recompiled when any changes are detected.
App_Data Contains application data files including MDF files, XML files, as well as other data store files. The App_Data folder is used by ASP.NET to store an application’s local database, which can be used for maintaining membership and role information.
App_GlobalResources Contains resources (.resx and .resources files) that are compiled into assemblies with global scope. Resources in the App_GlobalResources folder are strongly typed, and can be accessed programmatically.
App_LocalResources Contains resources (.resx and .resources files) that are associated with a specific page, user control, or master page in an application.
App_Themes Contains a collection of files (.skin and .css files, as well as image files and generic resources) that define the appearance of ASP.NET web pages and controls.
App_WebReferences Contains reference contract files (.wsdl files), schemas (.xsd files), and discovery document files (.disco and .discomap files) defining a web reference for use in an application.
Bin Contains compiled assemblies (.dll files) for controls, components, or other code that you want to reference in your application. Any classes represented by code in the Bin folder are automatically referenced in your application.


Friday, 9 September 2011

what is captcha and how it works?

CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.

Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.


CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.

Designing a CAPTCHA System

CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer. 

.Net Project list

List For DotNet Projects-->
1. Secured Reservation System 
2. Citizen Card System 
3. Medical Transcription Service 
4. Wind Rose 
5. Tracker 
6. Movie World 
7. Career Consultancy 
8. View Property Online 
9. News Zilla 
10. IRC Server Manager 
11. N Portal 
12. Web Proxy 
13. Interactive Voice Response System (IVRS) 
14. Bio – Metric Electronic Booths 
15. Blue Cross 
16. Money Plant 
17. Life Saver 
18. Advance Image Mapper 
19. Complaint Registration Cell 
20. Net Album 
21. HTML Wap 
22. Bug Tracer 
23. Tendrilla 
24. SMTP 
25. Chat Server Protocol 
26. Interactive Online School Information System 
27. E – Learn 
28. Chatting Forums 
29. Search Engine 
30. Cliff 
31. Bar Code Generation 
32. IMAP4 
33. Mobile Information System 
34. Spam Filter 
35. Routing Simulator 
36. Web Pad 
37. Network Monitor System 
38. Digital Signature 
39. Virtual Replay TV 
40. M Bank 
41. WWWFM 
42. Health Information System   
43. Pharmacy World 
44. Time Synchronization 
45. Secure Communication 
46. Intranet Mailing System 
47. Domain Search Engine 
48. Web Enabled Automated Manufacturing System 
49. Web Enabled University Information System 
50. Compression System 
51. Distributed Automated System 
52. Banking Information System
53. Selling Point 
54. Pro – Invest 
55. Computer Assistance Learning Software 
56. Converter Class (JAVA) 
57. Currency Converter 
58. File Transfer Protocol 
59. Messenger 
60. Password Protector 
61. Helper (JAVA) 
62. Application Installer 
63. Source Code Beautifier (JAVA 
64. Net Auction 
65. Bulk File Distributor 
66. Deletor 
67. Collection Amanuensis 
68. Constructor Amanuensis 
69. Address Book 
70. Fast File Finder 
71. Design Pattern Amanuensis 
72. Wizard 
73. Loyalty Business Tracker (LBT) 
74. e – Governance 
75. Online Airline Reservation System 
76. E – Banking 
77. E – Boutique 
78. Career Tracer 
79. Music Fantasy 
80. Hospital Management System (HMS) 
81. Automobile Insurance Management System 
82. Inventory Management System 
83. Online PDA (OPDA) 
84. Sales Management System 
85. Training Organization 
86. HTML 2 WML 
87. Image Viewer 
88. Data Encryption Standards (DES Algorithm) 
89. Universal Smart Card Interface 
90. Net Conference 
91. Generic Security Manager 
92. Credit Card Systems 
93. Client Data Converter 
94. Search Engine 
95. Portable & Generic Tool for Web Application 
96. Certificate Viewer 
97. CGI Tutor 
98. Child Abuse Database 
99. Color Chart 
100. Conspiracy Theory Voter 
101. Constructor Docs, Factory Finder 
102. Cookie Classes 
103. Systray Deleecher 
104. Delta Creator 
105. Dissolve Designer 
106. Dog Pile Dictionary 
107. Domain Registry 
108. Fast Snail Mail 
109. Bus Tel, Exchange Electronic Business Cards during a voice call 
110. Case Fixer 
111. Aquarium Controller 
112. Backup to CDR Burner 
113. Bible Thumper 
114. Browser Recommender (JAVA) 
115. Downloader 
116. Trade 
117. Chart 
118. Safe 
119. XEditor 
120. Pop Mail 
121. Code Wash 
122. WWWFC (World Wide Web File Client) 
123. Trans proxy 
124. IP Translator 
125. File Safe 
126. Virtual Reporter 
127. SMS 
128. CE Synchronizer 
129. Oxygen 
130. Address Book 
131. Deluxe Cheque book Balancer 
133. The Appraiser 
134. Information Management for Satellite Data Products 
135. Accessing Railway Reservation Through Mail 
136. Allotments 
137. Addition Modification and Replacement  Schema System 
138. Automatic Report Scheduler 
139. ATM 
140. Bio Test 
141. Browser 
142. Control System for the Maintenance of Computers     
143. Content Management System 
144. Customer Relationship Management (CRM) 
145. Control system Tracking 
146. Drug Audition & Research Management 
147. e-Procure System 
148. Exam Experts 
149. Files Upload 
150. Fire Services 
151. Contract Labor Management System 
152. Image Compression 
153. LIC 
154. MLM Project 
155. Marine Operations and Management System 
156. Online Tutor 
157. Online Resume Builder 
158. Project Tracking System 
159. Remote Desktop 
160. Stenography 
161. Enterprise Resource Information System (ERIS) 
162. e-Transaction Interface 
163. Travel Billing Tracking System 
164. Online Taxi Cab Service 
165. Project Management Information System 
166. Online Clinic 
167. Integrated Courier Service 
168. Patient Entry Monitoring System 
169. Auto Mobile Store Maintenance 
170. Bio Metric Fuzzy Art 
171. Clinical Programming Software for Implantable Devices 
172. Congestion Control in Tree Based Reliable Multicasting  
173. DB Unit 
174. Data Cleaning Techniques 
175. Desktop Based Event Viewer 
176. Decision Maker 
177. Dynamic Load Balancing For The Distributed Mining of Multilevel and Location  Aware Service Pattern  
178. Efficient Distribution Of Information Content Based MultiCasting 
179. Image Edge Extraction Based on Statistical Classifier Approach 
180. Image Segmentation 
181. Intranet Chatting 
182. Medical Image Compression 
183. Network Intrusion Detection Systems using Genetic Algorithms 
184. Performance Analysis of Classifying Unlabeled Data from Multiple 
185. Quality Analysis and Characteristic Evolution of Diabetics Data using Clustering Techniques 
186. Secured Communication using AES Algorithm 
187. Secured Socket Layer Protocol (SSLP) 
188. Traveling Salesman Problem using Components of DNA            
189. Authentication Based Digital Signatures 
190. Accessing Railway Reservation Through Mobile 
191. Automatic Database Schema Generation 
192. AJAX Enabled Online Order Processing 
193. Automation of PDBT College 
194. Bookstore 
195. Comparative study of image segmentation based o parametric and Non-Parametric Models 
196. Comparative study of Laplacian of Gaussian Filter 
197. Distance Learning System 
198. District Collectorate 
199. Decision Maker 
200. Datamart Management Software 
201. Doctor Online 
202. Document Storage and Retrieval System 
203. Employee Leave Management System 
204. Employee Management and Recruitment System 
205. E-Music 
206. E-Shopping 
207. Online Examinations 
208. Ez-Hotels 
209. FAQ’s Desk 
210. FP-Miner tool for Mining Frequent Patterns. 
211. Automation of Hero Honda Showroom 
212. Immigration status Tracking System 
213. Medical Staff Administration System 
214. IMAP email Client Implementation 
215. Mobile Bill Payment System 
216. Multi Dimensional Heterogeneous Data Clustering with DBScan 
217. Crime Investigation System 
218. E-Library 
219. Online Eamcet Exam 
220. Online Job Portal 
221. Online Recruitment System. 
222. OXFORD 
223. Payroll System 
224. Quality Analysis And Characteristic Evaluation of Diabetes Data using Clustering Techniques 
225. Railway Reservation System 
226. Role Bases Access control for Grid Database Services Using the community Authorization Service 
227. Realtors 
228. Resource Pool 
229. Rule Based Packet Filtering 
230. School Automation 
231. Equity Trading Portfolio 
232. Staff Management System 
233. Stenography in audio files 
234. Tele Biz 
235. Advanced Encryption Standard Algorithm (AESA) 
236. Time Tracking System 
237. Traffic Jam Detection 
238. Video Conferencing 
239. Virtual Pad 
240. Visual Cryptography 
241. Web Exam 
242. Auto Summarization Tool 
243. Health Insurance 
244. Image Processing 
245. Legal Consultancy System 
246. Life Saver 
247. Management Cell 
248. Online Team Collaboration 
249. Web based Clinical Management System 
250. Task Management System 
251. Automation of Textile Industry 
252. Inventory Rental Collection of Department 
253. Warehouse Management 
254. Work share Point 
255. XML Secure and Compression 
256. Your Alternative Phone (YAN) 
257. YMEANS:A clustering Algorithm for Intrusion DetectionSystem            
258. Cargo Management System 
259. CHITS Management System 
260. Community Forum 
261. Thumbview Generator 
262. Data Migration 
263. Defect Tracking System 
264. Desi Gallery 
265. Error Handling System 
266. Estimate Employee Performance
267. School Management
268. Video Library
269. HTML Converter
270. Binary Search in Graphical Representation
271. C-Bank
272. Secured communication with RSA
273. Proxy Server
274. Giffc
275. Intranet
276. Word Editor 
277. Digital Dictionary
278. Student Administration
279. DOS file to UNIX File Conversion (Vice Versa)
280. Railway Reservation System
281. Chatting (Communicating between two systems)
282. FTP
283. LZW Compression
284. Designing of Digital Components
285. Neural Networks
286. Huffman Encoding
287. Installer
288. Processor Communication
289. Deep Draw
290. Disk Scheduling
291. File Allocation
292. CUI OS in GUI
293. MyCAD
295. Multi Chain Market
296. Super Market
297. C Compiler
298. CPU Scheduling
299. C Editor
300. Auto Library
301. Flynn's Classification
302. Astrick Operating System
303. OCR (Optical Character Recognition) for Telugu Language
304. FTP Component Development in C Linux
307. Application for serial communication
310. EasyLink BROWSER
311. Fast
321. EasyFile
325. ShareUp
328. Image Compression
329. FileSafe 
330. QuickLook
337. APPART (Apparel Architecture Technology)
343. SafeShare
344. Tour Planner
345. Fuzzy Logic Information System
346. User Space System Device Enumeration
347. File Mechanic
348. Simulating Unix Network
349. VOIP
350. College Administration
351. Automation of Engineering Dept
352. Academic Institution Management
353. Railway Reservation System
354. Image Processing
355. Information Management
356. Manage Net
357. Restaurent Management
358. HR Management
359. Automobile Information System
360. Recruit Manger
361. Civil Suppliers Gas Agency
362. Field Machinery Deployment
363. Home Security
364. Adaptive Image Noise Removal
365. Hotel Management System
366. Auto Master
367. Image Detection Techniques
368. Talk It
369. Data Migration from Access2Oracle
370. The National Small Industries Corporation Ltd
371. Banking Information Management System
372. Auto Trans
373. Public Distribution Services
374. Jewelery Lender
375. Internet Relay Chat Server
376. Chat Client
377. Invoice Manager
378. Smart Card Technology
379. Automated Cargo Management
380. Browse Monitor
381. Emp Monitor
382. Student form
383. Medical Transcription Services
384. Automation of Common Business Administration System
385. Know UR Net
386. Network Management of Database System
387. Auto Cable
388. Clearance House
389. Complaint Registration Cell
390. Electronic Team and Attendance Management System
391. Invoice Maintenance System
392. Sales Order Processing System
393. DOC MAN
394. NeoPharma
395. AMROFoods
396. VBRemote
397. DuraSteels
398. CEShop
399. Vbrowser
400. Clean UP
401. Jewellary System
402. EAMCET Online Examination System
403. Vpresenter
404. Virtual Training kit for 8085 Microprocessor
405. RSA
406. Secure Socket Communication
407. PGP (Pretty Good Privacy)
408. Digital Signature (MD5 )
409. Data Encryption (DES)
410. Chat Server
411. Multichat Client
412. Video Library
413. Store Inventory
414. Inventory Control
415. Code Counter
416. Adaptive Image Noise Removal
417. Message send to windows
418. FTP-Up Loader
419. MyCDPlayer
420. Sound Echoing
421. File Splitter
422. Image Viewer
423. Offline Explorer
424. Tele Editor
425. Text Compression
426. Windows Animation
427. Multi Copier
428. Designing of Digital Components
429. File Properties
430. Internet Explorer
431. Picture Stream
432. Visual Café
433. Net Meeting
434. Bitmap
435. Algorithm for Automatic Painterly Rendering
436. Monitor Calibration
437. Firewall – NetDefender
438. Context-Free Parser
439. File Transfer
440. Directory Browse
441. Multi Copier
442. Banner
443. Speech- Enabled Interactive Voice Response System
444. Online Book Store
445. Voice Over Internet Protocol 
446. E-Seva
447. Online Marketing
448. Civil Supplies Corporation
449. Online Books
450. University Administration
451. Online College Admission
452. website
453. Animal Protection Center
454. Bus Reservation
455. AspChat
456. ATM Project
457. Blood Bank
458. Automotive Dealers
459. Easy Movies Online
460. DocSite
461. E-Bazaar
462. Tour India
463. Gurukul Online Courses
464. Chits Online
465. Aurobindo Chemical Database Interface System
466. Kalyani Travels
467. Marshal IT
468. Jewels Online
469. International Identity Card
470. Online Banking
471. Orphan Care
472. IT Hardware Vendor
473. Online Music
474. Shopping Mart
475. Library Management System
476. Online Resorts Booking
477. Real
478. Web Bazar
479. JobsOnGlobe
480. ORM
481. Digital Image Processing
482. IT Institute
483. Online Knowledge Base
484. Sanjay Transport System
485. Learn Online
486. Internet Based Expert System
487. University Administration
488. Janapriya Real Estate
489. Advanced Image Mapper
490. Control Room Management
491. Online Photo Gallery
492. Chat Server
493. Web Page Builder
494. Proxy Server
495. News Zilla
496. HTML Wap
497. Bug Finder
498. Tendrilla
499. Automobile Fault Accessor
500. Auto Responsing
501. Report Exporter
502. e-survey
503. My Chart
504. Bio- Metric Electronic Booths
505. Online Book Store
506. GUI Interface For Remoting Tester
507. Speech Engines
508. My Phone API
509. PDF.Net
510. e-shopping
511. SMTP Mail Server
512. Chat Server Protocol
513. FTP Protocol
514. HTTP Protocol
515. E-Commerce Applications
516. Online Resume Mart
517. File Spy
518. Wind Rose
519. Full 2 Thumb
520. System Resource Controller
521. RS 232 Communicator
522. My Query
523. School on Web
524. Ultimate Discussion Forum (Enhanced)
525. Citizen Greviance Forum
526. Easy Transcription
527. Enhanced Code Editor
528. Easy Online Content Manager
529. SVG Viewer
530. Courier .Net
531. PDF .Net
532. Online Buy
533. Alaram System
534. Microsoft NTLM
535. Cargo Management System
536. .Net Remoting Tester
537. .Net FTP (DLL)
538. Online Resume Builder (ORB)
539. Sanitary Management System
540. ADO.NET Driver for MYSQL
541. NSQL EnetrpriseManager
542. NDBJunction
543. IRC Client
544. VDocumention
545. Ntest
546. NET ODM
548. Download
549. My Music
550. My Explorer
551. Online Tutor
552. Encrypt With AES
553. e-buy books
554. Allotment
555. Any Time Money
556. Cliff
557. Bar Code Generation
558. Jchart
559. Jsafe
560. Intranet Mailing System
561. Web Proxy
562. IMAP4 . (J2EE)
563. Cell Browser
564. Spammer
565. e-talk
566. Route It
567. Desk Viewer
568. WWWFM
569. Control System Tracking
570. e-test
571. cool coding
572. Bank on Cell
573. J Test
574. Sahara
575. DES Encryption
576. Health Information System
577. Pharmaceutical Automation System
578. Time Synchronization
579. Secure Communication
580. Mail Server
581. Search PDC(Primary Domain Controller)
582. Web Enabled Automated Manufacturing System
583. Web Enabled Automated University System
584. CompressPic
585. Distributed Automated System
586. Banking Information System
587. Selling Point
588. Pro-Invest
589. CAI-Computer Assistance Learning Software
590. Convertor Class
591. Currency Convertor
592. File Transfer Protocol
593. Java Messenger
594. Password Protector
595. Java Help
596. Application Installer
597. J Trade
598. Java Source Code Beautifier
599. Genealogy
600. Net Auction
601. Bulk File Distribution
602. Deletor
603. Collection Amanuensis
604. Constructor Amanuensis
605. Address Book
606. Fast File Finder
607. Design Pattern Amanuensis
608. Java Wizard
609. LBT (Loyalty Bonus Tracking) (J2EE)
610. e-Governance (J2EE)
611. Online Airline Reservation Systems (J2EE)
612. E- Banking (J2EE)
614. Career Tracer (J2EE)
615. E-MUSIC (J2EE)
616. HMS (Hospital Management System) (J2EE)
617. Life Insurance Management System (J2EE)
618. Inventory Management System (J2EE)
619. Issue Tracking Systems (J2EE)
620. OPDA (Online PDA) (J2EE)
621. Sales Management System (J2EE)
622. Training Organisation (J2EE)
623. Html2WML (J2EE)
624. JEditor
625. Jcreator
626. JSP Book Exam
627. SMTP
628. Telugu Editor
629. Data Mining
630. Desktop Capture
631. Image Compression
632. Image Viewer
633. Online Library
634. Digital Signature
635. Easy Movies
636. Star5 MLM
637. V2 Winners
638. Chatting Forum
639. Information Management For Satellite Data Products
640. Universal Smart Card Interface
641. Net Conference
642. Generic Security Manager
643. Credit Card Systems
644. Client Data Convertor
645. Search Engine
646. Portable & Generic Tool for Web Applications
647. Middleware to extend web applications to mobile devices
648. Certificate Viewer
649. CGI Tutor
650. Child Abuse Database
651. Colour Chart
652. Conspiracy Theory Voter
653. Constructor Amanuensis
654. Constructor Docs, Factory Finder
655. Cookie Classes
656. Systray Delecher
657. Deleter, Deletes Files with Wildcards
658. Delta Creator
659. Dissolve Designer
660. Dogpile Dictionary
661. Domain Registry
662. Fast Snail Mail
663. BusTel, Exchange Electronic Business Cards during a Voice Call
664. Case Fixer
665. Aquarium Controller
666. Bible Thumper
667. Book Store Referral Applet
668. Browser Recommender
669. JDownload
670. Virtual Replay TV
671. JnetMonitor
672. JpopMail
673. JcodeWash
674. JTrade
677. JFileSafe
678. JReport
679. JSMS
680. JCESynchronizer
681. Net Auction Management System
682. Unique Number Server
683. Chequebook Balancer Deluxe
684. Client Provisioning
685. Intranet Process Activities
686. E-Manager
687. Internet Banking System
688. Hypermart
689. Online - Chatting Application
690. Proxy Server Maintenance System
691. Java2XML
692. Java Portal
693. JCRMServer
694. Component Site
695. JLong
696. WTest
697. WBuy
698. eSearch
699. JDynamicChart
700. WPublish
701. EJBGen
702. WWFC
703. Bus Information System
704. The Appraiser
705. Back up to CDR Burner
706. Xeditor -------total
707. Student Personal information system
708. Employee Personal information system
709. Product sales system (i.e. any customer who purchase any product)
710. Library Management system
711. Car information system (i.e. any car showroom)
712. Student Hostel information system
713. Student Exam information system
714. Course detail information system (i.e. courses taught and assigned to teacher)
715. Student class information system (i.e. list of students enrolled in specific class)
716. Employee Attendance system
717. Patient information system
718. Doctor information system
719. Web-based applications
720. Testing Applications for Security
721. Test Automation
722. Testing-off-the-Shelf software
723. Test effort estimation technique
724. Testing object-oriented software
725. Interface (GUI) Testing
726. Middleware Testing
727. Conformance Testing
728. Testing for Embedded Systems
729. WAP (Wireless Application Protocol) Application Testing
730. Compatibility Testing (for OS or others)
731. XML-Based (Extensible Markup Language) Application Testing
732. Database Testing
733. Heuristic Testing
734. Load Testing
735. Performance Testing
736. Regression Testing
737. Test Coverages
738. Usability Testing
739. Acceptance Testing
740. “Testing: Integral part of the Business Model”.
741. Current Trends in Software Testing: Case Study
742. Logic-Based Testing
743. Testing Java-Based Applications
744. Configuration Management in Testing
745. Testing Real-Time Systems
746. Testing Client-Server Applications
747. Testing a Data Warehouse
748. Domain Testing
749. Vehicle Spare Parts Information & Maintenance System
750. Cellular Phone Service and Maintenance
751. Dispenser Management System
752. Online Deposit Management
753. International Trading Management
754. Online Income Tax Tariff System
755. E-Banking System
756. Online Book Mal
757. Cargo Management System
758. Insurance Payment
759. Online Pharmaceutical Maintenance
760. Textile Management System
761. Product Sales Analysis
762. Share Marketing
763. Financial Services
764. Computer Sales and Marketing
765. Super Market Maintenance
766. Online Electricity Bill Payment
767. Equal Monthly Installment Loan System
768. LPG Registration and Customer Maintenance
769. Online Mutual Funds
770. Online Poultry Farm Management System
771. Online Telephone Billing
772. Stock Maintenance System
773. Online Vegetable Shopping
774. Web Response System
775. Credit Card Banking
776. Petro Card Management System
777. Online Estimation System
778. Vehicle Information System
779. Corporation Information System
780. Web Based Order Processing
781. Online Aptitude Test
782. Endeavor Resource Improvement
783. E-Shopping
784. Educational Loan System
785. Telephone Index and Customer Services
786. Jewellery Management System
787. Bugs Tracking System
788. News Agency Information System
789. Photoroom for Net
790. Smart Card Banking
791. Tamilnadu Arts & Science Colleges Information System
792. Business - Business Organization System
793. Business – Consumer Organization System
794. E-Café
795. Blood Donors Encyclopedia
796. Funster Encyclopedia
797. Child Care Information System
798. Mobile Info Provider
799. E-Career Consulting
800. Personal Coordinator
801. Commercial Real Estate System
802. Matriculation Schools Information System (Search Engine)
803. Mail Processing System
804. Digital Security
805. Airways Information System
806. Fixed Deposit Bond System
807. Gift Services Management System
808. Global Agency System
809. Hr Planning System
810. Library Management System
811. Material Planning System
812. Mobile Networking & Administration System
813. Online Ticket Reservation
814. Resume Data Processing
815. Universal Travel Agency
816. University Information
817. Vertical Marketing
818. Marketing Analysis
819. Health Care Management System
820. E-Governance
821. Bank Education Loan System
822. Housing Loan Information System
823. Query Response
824. Lan Messenger
825. Signature Storage & Retrieval System
826. Tours and Travels Information System
827. Zap Card Information or Cluster Info Fling Card
828. Office Maintenance System
829. Safety Bond Information System
830. Accounting Financial Transaction
831. Customer Relation and Management System
832. Cargo Tracking System
833. Bus Route Tracking System
834. Web Based Address Book
835. School Management
836. Library Management
837. Shopping Cart
838. Employee Leave Management
839. Personal Assistant
840. Bank Educational Loan System
841. Bugs Tracking System
842. Health Care Information
843. Messaging Forum
844. Web Quotation
845. Authenticated Web Executive Software
846. Enterprise Resource Planning
847. Petro Card Maintenance
848. Credit Card Administration
849. Portfolio Tracking System
850. Mail Processing
851. Digital Security Management System
852. Individual Coordinator
853. WAP Implementation
854. Web Voting
855. Online Security
856. Car Registration and Maintenance
857. Intranet Messaging
858. Online Test
859. Tender Evaluation
860. Ticket Reservation
861. Automobile Information and Maintenance
862. Telephone Index
863. EMI Loan System
864. Sales Analysis
865. Mail Order Processing
866. Online Mutual Funds
867. Business Oriented Information
868. Online Banking
869. Investment Tracking System
870. Web Shopping
871. E – Library
872. International Trading Management
873. Income Tax Calculation
874. Computer Sales and Marketing
875. Online Billing System
876. Online EB Billing
877. Online Telephone Billing
878. Customer Request and Maintenance
879. Virtual Education System
880. Online LPG registration
881. Ornament Management
882. Online Insurance
883. Venture Analysis
884. Online Departmental Store
885. E Services
886. Photo Room for Net
887. E Café
888. HR Management System
889. Vertical Marketing
890. Tamilnadu Colleges Information System
891. Leather Management System
892. **********IITians Project****************************
893. Design of Intranet Mail System
894. Mirroring
895. Development of a Distributed Systems Simulator for Event Based Middleware
896. A Smart phone Application to remotely a PC over the internet
897. Network Protocol Verification Using Linear Temporal Logic
898. Virtual Routing Network Emulation Frame Work
899. A Multihoming Solution for effective load balancing
900. Implementing a Linux Cluster
901. Improving the efficiency of Memory Management in Linux by Efficient Page Replacement Policies.

902. Experimenting with Code Optimizations on SUIF (Stanford University Intermediate Format)
903. Intranet Caching Protocol
904. A DBMS with SQL Interpreter
905. Developing an Organically Growing Peer to Peer Network
906. Analysis of Routing Models in Event Base Middlewares
907. Analysis of Event Models in Event based Middle ware
908. Integration of Heterogeneous Databases Into XML Format with Translator
909. Information Management and Representation Using Topic Maps
910. Face Recognition Using Artificial Neural Networks
911. Video Conferencing with Multicast Support
912. Collaborative Span Filtering Using Centralized Incrementally Learning Spam Rules Database
913. Hierarchical Data Back Up
914. Automated Generation of Cycle Level Simulators for Embedded Processors
915. Fingerprint Image Enhancement
916. Dept Library Management System
917. Linux Kernel Enhancement
918. Cloth Animation & Dynamics
919. Linux Kernel (Memory Management)
920. Image Steganography
921. Web Enabled Opinion Poll System For NITC
922. Application Of Bayesian Networks To Data Mining
923. Triple crypt Using Vector Displacement Algorithm
924. Network Analysis
925. Feed Forward Neural Networks
926. IP Sniffer
927. Project Management System
928. Cryptographic Engine
929. Fault-Tolerant TCP
930. Enhancing The Algorithms
931. Time Table Information System
932. Online Library System
933. Implementing an interface for transliteration
934. Simulation of the IA64 Instruction Set Architecture
935. Simple FTP Client
936. Text Editor for Linux Platform
937. Exam Server
938. Online Bulletin Board
939. Project Server
940. Developing GUI for IP Tables Configuration
941. Academic planner
942. Online Election Software for Hostel Election
943. Performance Evaluation of Routing Algorithm using NS2
944. Alumni Software
945. Bandwidth management Tool
946. Implementation of Scalar Optimizations
947. Online Banking
948. Distributed Workgroup File Indexer
949. Managing Linux Distributions
950. Network Sniffer
951. Simulating Routing Algorithms in Java
952. A Tool For Network Auditing(ping and Port Scanning, TCP/IP Finger printing
953. An alternative semantics for error and exceptional handling
954. Online Counseling software
955. Instant messenger system
956. course home page generator
957. An Interpretor for lambda calculus with some extensions
958. Probabilistic Techniques for cache replacement
959. Implementation of Download wizard for simultaneous downloads
960. Online Share Trading
961. Online Counseling
962. Transfer Program in Java Using Protocols like FTP,SMB,HTTP,SSH
963. Using Genetic Algorithms for testcase generation for finite state machines
964. A study of the Linux Operating system, Development of useful System programs
965. subsequently implementing a GUI Providing a certain useful functionality
966. Text to Speech conversion
967. Hostel elections voting software
968. Code optimization: Implementation of scalar optimizations
969. A Web based academic monitoring system
970. To output the timing schedule
971. Code optimization: Implementation of scalar optimizations
972. Online Objective test
973. Performance Evaluation of Routing Algorithm using NS2
974. IA64 ISA Simulation
975. Text to Speech conversion
976. Auction simulator using agents
977. Customizing Proxy Web server
978. Auction simulator using agents
979. Implementation of cryptographic protocols in oblivious signature based envelope ( OSBE to handle cyclic policy interdependency)

980. NITC Student information system
981. Implementation of the gaming software
982. Online Library Management system
983. Project Server
984. My SQL Administrative tool kit
985. Error handling for syntax analysis
986. Online Student Registration
987. Operating system enhancements to prevent the misuse of system calls
988. Type systems and applications to safety
989. Spatial and temporal database (queries for retrieving data)
990. Adaptive distributed event model
991. Improving TCP performance in adhoc networks
992. Model checking for protocol verification
993. Type systems and it's application to safe and efficient code
994. Exact functional context matching for web services
995. A new methodology for representation of TCP performance in TCPSF
996. Adaptive event based middleware architecture
997. Intelligent agents
998. Optimizing pattern matching algorithm in intrusion detection
999. Information retrieval from textual corpus
1000. Direction queries in spatio-temporal databases
1001. Secure routing.
1002. Audio processing of movies
1003. Secure Conferencing System
1004. Web based Linux Administration
1005. Wireless Search Engine
1006. Hostel Election Software
1007. Performance Enhancement of HTTP using improved TCP Functionalities
1008. Adding Functionalities to Libpcap
1009. Performance Evaluation of an Efficient Multicast Routing Protocol
1010. Development of an OS Framework for a MIPS Simulator
1011. Secure Mail Server
1012. Academic per-to-peer Network
1013. Secure Mail Server
1014. Distributed System simulator for Publish-Subscribe Model
1015. Data Integration
1016. Web based Linux Administration
1017. Interface for Mobile Phone and PDA using J2ME
1018. Distributed System simulator for Publish-Subscribe Model
1019. Distributed System simulator for Publish-Subscribe Model
1020. Contact Reminder
1021. Direct Information System
1022. Course Home Page Generator
1023. Campus Online Help Desk
1024. Online Class Register
1025. Mail Server Utility
1026. Hostel Election Software
1027. Collaborative Web Browsing
1028. Web based Application for Multiple Clients
1029. Testing Tool
1030. Online Recruitment System
1031. Computer Retail Store and Maintenance
1032. Country Cargo and Express Couriers
1033. Interest Calculation System for Retail Bank
1034. Online Course Request
1035. EWheelz
1036. Real Estate Management System
1037. E-Consultancy on Business
1038. Electronic Descriptive Examination Management System
1039. EZeeMail
1040. I-INetPhone
1041. Color Index Based Image Retrieval (IEEE)
1042. Secured Multimedia Transmission Steganography
1043. Shopping Cart
1044. Contilligent
1045. MediTracker
1046. Lending Tree
1047. Resource Planner
1048. Simulation Of  MANET  Routing Algorithm
1049. Computer Retail Store and Maintenance
1050. Country Cargo and Express Couriers
1051. CD Back Up Manager
1052. Image Stenography
1053. Turning Machine Simulator
1054. Video Compression
1055. Front Office Management System
1056. Html Design Tool
1057. Spy Boat
1058. Language Tutor
1059. Face/Image Reorganization
1060. Path Trace Robot
1061. Game Application
1062. Chat Boat
1063. File Compression and Manager
1064. Download Manger
1065. Video Editor
1066. LAN Messenger
1067. Video Conferencing
1068. File Sharing System
1069. LAN Search Engine and Allocation
1070. Work Scheduling Manager
1071. Cafe Management System
1072. Network based compiler
1073. English to Malayalam messenger
1074. Remote System Controller
1075. Cross platform Manager
1076. Download Restrictor
1077. Customized accounting System
1078. remote compiler
1079. Mysql Framework in GUI mode
1080.       LAN Voice messenger(with out using mic)
1081. Encrypted Mailing System
1082. Grid Computing Application
1083. Web Reality Show
1084. Video Sharing
1085. Blogs
1086. Online Advertising System
1087. Web Crawler
1088. CRM(customer Relationship managenet)
1089. Multi web Server System
1090. Yellow Pages
1091. friends Communities
1092. Online Cricket Commentary System
1093. Chat boat in CRM
1094. Virtual Class Rooms
1095. E-Portal for Companies
1096. Master Scheduling System
1097. Shopping Cart Admin Side
1098. Knowledge Provider system
1099. online book sharing System
1100. mobile guide for tourists
1101. Bluetooth enabled chatting System
1102. Bluetooth enabled games
1103. Micro Translator
1104. RoboController
1105. Multiple Site File Transfer Protocol. (MSFTP)
1106.  TCP/IP Network Agent for Power Management 
1107.  Tool for Metrics Collection (GUI for ASP / JSP)
1108.  E-mail Client Utility (Write Once Run Anywhere)
1109.  Packet forwarding through Network using pSOS 
1110.  Production Monitoring System - (PMS) RS 232/TCP IP 
1111.  Serial Printer Interface System 
1112.  RS232 - TCP Converter (Device Driver) 
1113.  Multi purpose ActiveX grid control. ( MS-Com ) 
1114.  UPS & AC Monitor 
1115.  CNC Automation System 
1116.  Remote Desktop Capture 
1117.  Image Compression Utility 
1118.  Mp3 Player 
1119.  Web Browser 
1120.  Net2Phone Application 
1121.  Production Planning System 
1122.  Retail Management System 
1123.  Banking System 
1124.  Human Resource Management 
1125.  Financial Accounting 
1126.  College Administration System 
1127.  Sales Invoicing 
1128.  Front Office Automation 
1129.  Textile Package [Stores-Sales-RMI-Payroll] 
1130.  Marketing Management System [MMS] 
1131.  Pharmacy Management System [PMS] 
1132.  Interactive Voice Responding System [ IVRS] 
1133.  Online Banking System 
1134.  Order Processing System 
1135.  Business Process Outsourcing [BPO] 
1136.  Shares Management System [SMS] 
1137.  Knitting Management System 
1138.  Call center Management System 
1139.  Point of Sales System 
1140.  Purchase order for Merchantiser 
1141.  Production Process Monitor 
1142.  Medical Transcription Data Management System 
1143.  Computer Hardware distributor System 
1144.  Jewellery System 
1145. AdRemover 
1146. Spam Mail Filter 
1147. Anti-Spam Monitor 
1148. Proxy Server Development 
1149. Network Utilities [ FTP/ Download Accelerator/ Wingate] 
1150. Network- Remote Pc Control 
1151. Network Monitoring System -(IP Monitor-Trace Route- Anti Hack) 
1152. Backup on X-Platform 
1153. Firewall Development 
1154. Digital Signature Development 
1155. Mail Server Development 
1156. Web Server Development 
1157. Proxy Server Development 


Wednesday, 7 September 2011

send sms in

Download smsclient.dll file by pressing link below:

Click Download

State Management

Introduction to State Management

State Management is process of saving information between page requests and postbacks on the server.

To make the communication between web server and web client meaningful and coherent, the state need to be saved between requests. All web applications function by using the Request/Response communication pattern. That means that for every request that comes from the client, the server will reply back with one response. In a stateless world, the server is just serving the reply back, but doesn’t remember what was said earlier in the communication.


Options for State Management

The state can be saved either on the server, or on the client. Both have advantages and disadvantages.

Server side

The data is saved where it is needed, but if there are too many clients simultaneously, the performance might be affected, and the resource usage will be high. Another thing that needs to be taken into consideration is scalability. If the data is saved locally on the server, then it will be difficult to make it work in a web farm scenario.
  • Application state: A key-value dictionary of objects that you can use to store data available to all the requests.
  • Session state: A key-value dictionary of objects that you can use to store data coming from a single client browser across multiple requests.
  • User profile: Allows you to define and store per-user settings to be used throughout your application.
  • Caching: Keys paired with values, where you can place items and later retrieve them.

Client side

The data is saved where it belongs, together with the page, but this creates unnecessary data transfers between the client and the server.
  • View state: The state of the page is serialized into XML, encoded Base64, and is then sent to the client as a hidden field.
  • Control state: Some controls are dependent on view state , but view state can be turned off, unlike control state, which cannot be turned off.
  • Posted data: State data is sent as hidden field, much the same as view state, but is not using XML serialization, or Base64 encoding.
  • Cookies: State data is sent as text as part of the HTTP header, in both the request and in the reply.
  • Query: State data is encoded in the query string, but this has the limitation of max 255 characters.

Monday, 5 September 2011

Validation Controls in Asp.Net

ASP.NET offers a series of predefined validation controls:
  • RequiredFieldValidator: You can specify that a user must provide information in a specific control on an ASP.NET web page by adding a RequiredFieldValidator control to the page, and linking it to the required control. For example, you can specify that users must fill in a Name text box before they can submit a registration form.
  • CompareValidator: Compares a user’s entry against a constant value, against the value of another control (using a comparison operator such as less than, equal, or greater than), or for a specific data type. Supported data types are: Integer, Currency, Double, Date, and String.
  • RangeValidator: Checks that a user’s entry is between specified lower and upper boundaries. You can check ranges within pairs of numbers, alphabetic characters, and dates.
  • RegularExpressionValidator: Checks that the entry matches a pattern defined by a regular expression. This type of validation enables you to check for predictable sequences of characters, such as those in email addresses, telephone numbers, postal codes, and so on.
  • CustomValidator: Checks the user’s entry using validation logic that you write yourself. This type of validation enables you to check for values derived at run time.

Sunday, 4 September 2011

ASP.NET Master Pages

ASP.NET master pages allow you to create a consistent layout for the pages in your application. A single master page defines the look and feel and standard behavior that you want for all of the pages (or a group of pages) in your application. You can then create individual content pages that contain the content you want to display. When users request the content pages, they merge with the master page to produce output that combines the layout of the master page with the content from the content page.

Master Pages

A master page is an ASP.NET file with the extension .master (for example, MySite.master) with a predefined layout that can include static text, HTML elements, and server controls. The master page is identified by a special @Master directive that replaces the @Page directive that is used for ordinary .aspx pages.
The @ Master directive can contain most of the same directives that a @Control directive can contain. For example, the following master-page directive includes the name of a code-behind file, and assigns a class name to the master page. In addition to static text and controls that will appear on all pages, the master page also includes one or more ContentPlaceHolder controls. These placeholder controls define regions where replaceable content will appear. In turn, the replaceable content is defined in content pages.

Content Pages

You define the content for the master page's placeholder controls by creating individual content pages, which are ASP.NET pages (.aspx files and, optionally, code-behind files) that are bound to a specific master page. The binding is established in the content page's @ Page directive by including a MasterPageFile attribute that points to the master page to be used.

Advantages of Master Pages

Master pages provide functionality that developers have traditionally created by copying existing code, text, and control elements repeatedly; using framesets; using include files for common elements; using ASP.NET user controls; and so on. Advantages of master pages include the following:
  • They allow you to centralize the common functionality of your pages so that you can make updates in just one place.
  • They make it easy to create one set of controls and code and apply the results to a set of pages. For example, you can use controls on the master page to create a menu that applies to all pages.
  • They give you fine-grained control over the layout of the final page by allowing you to control how the placeholder controls are rendered.
  • They provide an object model that allows you to customize the master page from individual content pages.

Run-time Behavior of Master Pages

At run time, master pages are handled in the following sequence:
  1. Users request a page by typing the URL of the content page.
  2. When the page is fetched, the @ Page directive is read. If the directive references a master page, the master page is read as well. If this is the first time the pages have been requested, both pages are compiled.
  3. The master page with the updated content is merged into the control tree of the content page.
  4. The content of individual Content controls is merged into the corresponding ContentPlaceHolder control in the master page.
  5. The resulting merged page is rendered to the browser.

Saturday, 3 September 2011

Window Phone 7 Mango

Windows Phone 7 'Mango' Apps Now Accepted for Certification by Microsoft
Microsoft has cleared perhaps the last hurdle in its race to release "Mango", the first major update for Windows Phone 7, by announcing it is now accepting app submissions.
Microsoft's Todd Brix stated in a blog post that as of Aug. 23, Mango apps were being accepted by the App Hub. Mango is Microsoft's much-anticipated upgrade of WP7, adding features like "fast app switching, background audio, multiple and double sided Live Tiles, better Search integration," according to Brix.

Brix also sought to tamp down some of the expectations that the official Mango release is imminent. "Sorry, not quite yet" he pre-emptively answered those who assume that accepting Mango apps means that Mango is coming to end-user phones in the immediate future.
That wasn't the only WP7-related news coming out of the blog, as Brix announced the availability of the Windows Phone SDK 7.1 Release Candidate. Just two languages are supported with this version of the SDK: English and Japanese. The SDK, Microsoft stated, is compatible with Visual Studio 2010 SP1.
One aspect of the SDK sure to please developers is the inclusion of the Marketplace Test Kit. The Kit allows developers to test their apps on their local machines, using the exact same requirements Microsoft uses to certify apps in the App Hub. "This should dramatically improve your chances at passing cert the first time," Brix said.
Also included in the bursting-at-the-seams SDK is the Microsoft Advertising SDK for Windows Phone. This is aimed at developers wanting to monetize their apps through advertising channels. The posting said to expect the final version of the SDK by the end of September.
Although Brix stated that Mango release isn't imminent, the announcements today would seem to be a strong indication that it's coming very soon. Mango, initially announced in May, was released to manufacturing on July 26. Other much-anticipated features of Mango include app multi-tasking and visual voicemail.