Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Navaneetha Krishnan M, Balaji D, Mohamed Puhari Anif Y
DOI Link: https://doi.org/10.22214/ijraset.2022.43743
Certificate: View Certificate
E-Mail tracking is that the process of following the trail and performance performed by the receiver on the received mail. It basically allows the sender to bear in mind of where, when and the way his mail reaches the client and what the receiver does with the mail. Many existing mail clients provide very fundamental features like Reading, Forwarding, Moving, Deleting, etc. But most of them don\'t provide a signal for having read the mail, security measures like Block Forwarding, Retracting, Block Printing and saving, etc. The aforementioned issues are resolved by this Multi- Functional E-mail tracking system. the event of this technique serves the aim of incorporating these features into the mail client to supply a versatile, customized and secured way of mailing. The Tracking and Notification feature is geared toward providing a proof-of-reading a mail which hardly any communicating provides. The Notification messages may be sent to either the sender\\\'s mail id. The Retractable Mails is geared toward providing a way by which a sender can delete a specific mail even after sending it. this is often used when an individual sends a mail to a wrong mail id. The Block-backup feature provides a way of preventing printing, saving and copying the mail contents. this could be used for secured mails that are\'t intended for manipulation. The Self-Destructible mail is additionally an identical security add-on, but during a different context. Encryption is especially done to forestall access from undesired users. within the same way this feature prevents unintended users from viewing the mail.
I. INTRODUCTION
This venture reproduces the constant intranet mailing framework with every one of the important approvals and tasks. This undertaking can be utilized in a little Local Area Network like Organization for correspondence between the clients working in the organization. Every one of the highlights like mailing, really looking at sends, making another client id, answering for the sends, recovering the secret word assuming the client fails to remember the secret word, changing the secret word, search choice and so on, has been added to the venture with the goal that it appears to be like the web mailing framework. And this has been finished with a data set as the foundation for keeping up with the information base of the clients and the sends they get and ship off others clients. Another client is made to enroll with a novel client name, secret key and his specially sent and versatile number for the help. An affirmation message is shipped off the sent given by that client. The reason for this venture is to check regardless of whether the mail ID has a place with that specific client entirely another person can disguise.
The fundamental point is to forestall chronicling of the genuine mail message into a Custom envelope in the collector's post box. At the hour of sending the mail with this element, the client is requested expiry date. The message naturally terminates from the Server data set on that date. The legitimacy date begins from the date of sending the mail.
This venture is like the over one with the exception of the way that it is utilized to forestall the Receiver to take a reinforcement locally to his hard drive, instead of chronicling it into the Mailbox organizer. The collector is in a real sense impeded from printing, saving or duplicating the items to his hard drive. This is again finished by Block-Backup's JavaScript, applies specific properties to the page to such an extent that the text can't be chosen to forestall replicating. To forestall saving, the items are shown in another window which when saved just saves the first server page that opened it.
This venture targets erasing the sends even in the wake of sending it. This is conceivable in light of the fact that the mail dwells in the code mail server. The method involved with withdrawing is to send a Command RETRACT followed by a space and the message id of the message the client Wishes to erase, from the mail client to a similar location as he sent it initially. On the off chance that found the solicitation is sent. Which then checks the coordinating of the subtleties gave the use store mail Table and in the event that matches, erases the message and places a banner in one of the Fields. This is awesome and vital task of this venture? At the point when a client plans to send this mail to just a single individual and doesn't wish that no other person can get to the Contents then he can pick this usefulness. This is finished by an idea called Cross-Site-Scripting (Xss) or Cookie Hijacking. The Fact that all mail waiters store a treat on the client's machine with the email in it either As it is or encoded.
II. LITERATURE REVIEW
Eric Allman, "SENDMAIL - An Internetwork Mail Router", Program Documentation, 2012. Electronic mail administration is one of the most well known and fundamental administrations in both Internet and Intranet. There could be no Interneflntranet administrations without the electronic mail administration. Mail server is a PC framework that sends and gets electronic directives for various clients in a specific administration space. Mail servers are associated with networks and ought to dependably handle approaching and active mail messages. Sending and getting errands are really handled by a unique programming called mail server program running via the post office server. The most broadly utilized Internet mail server program is sendmail, which was first evolved in 1982 for 4.1 BSD UNIX frameworks.
J. Case, M. Fedor, M. Schoffstall and C. Davin, "The Simple Network Management Protocol (SNMP)", RFC 1157, May 2015.
Frameworks and administrations the board has become vital area of innovative work, concurring with the need and foundation of global norms. For instance, ISOATU-T has fostered the OS1 the executives structure. The overseeing intricacy of the OS1 model, for Internet-based frameworks and administrations, spurred Internet Engineering Task Force (ETF), to make a straightforward and light administration structure called Simple Network Management Protocol (SNMP). For our examination, we have picked SNMP as the mail server the board structure.
K. Arnold and J. Gosling, The Java Programming Language, Addison-Wesley, 2016.
There is one more huge pattern in the frameworks and administrations the executives. As WWW advancements are quickly developing, those innovations like Java and Common Gateway Interface (CGI) are applied to many processing regions. Frameworks and administrations the board is one of such regions that WWW advances can be taken on to build the proficiency and ease of use of the executives frameworks.
J. W. Hong, J. Y. Kong, T. H. Yun, J. S. Kim, J. T. Park and J. W. Baek, "Online Intranet Services and Network Management", IEEE Communications Magazine, Vol. 35, No. 10, October 2017, pp.100-110. Online administration has a great deal of advantages. It is equipment free. Web advancements are sufficiently general to be applied in any equipment stages. It is a modest and pervasive arrangement in most figuring regions. Clients access the executives frameworks utilizing Web programs. No other extra speculation is required. Utilizing Web program is unimportant and extremely simple to learn. It is additionally area free. Any place you will be, you can interface with the administration server and check the ongoing framework status whenever.
III. METHODOLOGY
A. Intranet Mail
ARPANET called as spine network since it was the focal WAN that integrated investigates. They interconnected LAN and WAN that became Internet Work (www), during late 1990s. Presently called Internet. Also, utilized uniform guidelines that permitted transferring and downloading documents (FTP), search, send electronic mail between PCs (SMTP) and so forth. Intranet is an organization in view of the Internet that is gotten to by the representatives of an association. An Intranet gives simple admittance to inward records and archives to the different representatives of the association, from their singular workstations. Sharing of information, made conceivable through the Intranet, helps in saving season of representatives, yet additionally permits workers from different levels to get to information. It likewise adds to a paperless office. What's more, Cipher mail used to naturally get the Acknowledgment from collector. When the read message will erased naturally at close the mail from collector. Not permitted forward the messages. Source can get to erase some unacceptable sent messages to collector inbox from their sent thing envelope.
B. Features of ASP.NET
ASP.NET, the following version of ASP, may be a programming Framework that's accustomed create enterprise – class web applications. The enterprise class web applications are accessible on a worldwide basis loading to efficient information management. However, the benefits that ASP.NET offers make it quite just next version of ASP.NET. ASP.NET is integrated with visual studio. Net, which provides a best GUI.
The .NET Framework could be a common environment for building, deploying, and running Web Services and Web Applications. The .NET Framework contains common class libraries - like ADO.NET, ASP.NET and Windows Forms - to supply advanced standard services that may be integrated into a range of computer systems.
The .NET Framework is language neutral. Currently it supports C++, C#, Visual Basic, Jscript. The new Visual Studio.NET may be a common development environment for the new .NET Framework. It provides a feature-rich application execution environment, simplified development and simple integration between variety of various development languages.
C. Internet Information Services
IIS 6.0 has strong support for more programming to take place on the server, to allow the new Web Applications to run in any browser on any platform.
IV. EXPERIMENTAL RESULTS AND DISCUSSION
A. Composing Mail
In a letter, it's vital to form everything completely clear because user the opposite person might not have an opportunity to ask questions, or their linguistic communication might the identical as your own. With e-mail documents, the opposite person can ask questions immediately. E-mail thus, like conversational speech, isn't as formal and neat as communications on paper. But this mailing user can send the mail to a different user and therefore the user to open the mail at the identical time one acknowledgement message send to sender user will automatically with Date & Time.
B. Notification
This program stores the particular mail message into the database and sends a hyperlink with some message to the destination. If destination address is invalid or not reach then a message is return to the client. When the receiver opens his inbox, he can view this message with the hyperlink stating that given that he clicks on this link the message may be viewed. When the user clicks, his system date, time, o/s, browser type, IP Address, refer, mail program, etc.
C. Self Destructible
In this module the most aim is to stop archiving of the particular mail message into a Custom folder within the receiver’s mailbox. At the time sending the mail with this feature, the user is asked for expiry date. The message automatically expires from the Server database there on date. The validity date start from date of sending the mail.
D. Retractable
This module targets erasing the sends even in the wake of sending it. This is conceivable on the grounds that the mail dwells in the code mail server. The method involved with withdrawing is to send a Command RETRACT followed by a space and the message id of the message the client Wishes to erase, from the mail client to a similar location as he sent it initially. Assuming that found the solicitation is sent. Which then confirms the coordinating of the subtleties furnished with the use_storemail Table and on the off chance that matches, erases the message and places a banner in one of the Fields.
E. Block Forwarding
This is awesome and vital module of this venture. At the point when a client means to send this mail to just a single individual and doesn't wish that no other person can get to the Contents then he can pick this usefulness. It is finished by an idea called Cross-Site-Scripting or Cookie Hijacking. The Fact that all mail waiters store a treat on the client's machine with the email in it either As it is or encoded
Consequently we have finished the undertaking with the whole module conveniently and easy to understand one. Subsequently this undertaking will endure best among the clients and give them a most effective way to interface through the net. An Organization Communicates the workers utilizing this mail server framework. Assuming it is manual framework. It requires the parcel of investment and data might Be Passed precise individual. Workers are sat around idly to explaining questions. So over come these things. We need to require computerization. It is Client/Server System. It contains a server and different clients, which interface with the server to send or get sends. The framework keeps up with sends sent by other client and store them in their particular letter drops at server side. It utilizes the purposes SMTP and POP3 conventions. SMTP convention permits clients to send sends to other client of SMTP server. To recover the sends got a client utilizes POP3 convention. The System speeds up and Accuracy to passing the data among the divisions. Project targets laying out interdepartmental correspondence for the smooth working of the association.
[1] European Intensive Programme on Information and Communication Technologies Security IPICS’99, E-Mail Security: PGP (Pretty Good Privacy) & PEM (PrivacyEnhanced Mail) by Konstantinos Raptis from university of TIE AEGEAN. [2] Tanenbaum, A , “Computer Networks”, Prentice Hall Upper Saddle River, NJ, c2016 [3] Stallings W, Network Security Essentials, Prentice Hall, Upper Saddle River, NJ, c2015 [4] Michael Roe, “A Technical report on Cryptography and evidence “, UNIVERSITY OF CAMBRIDGE. [5] Drummond R, Cox N, \\\"Lan Times E-mailResource Guide\\\", Osbone McGraw-Hill, 2014. [6] Al-Hammadi B and Shahsavari M, \\\"Certified Exchange of Electronic Mail (CEEM)\\\", Southeastcon \\\'99, IEEE Proceedings, 2016, pp. 40-43. [7] J. W. Hong, J. Y. Kong, T. H. Yun, J. S. Kim, J. T. Park and J. W. Baek, “Web-based Intranet Services and Network Management”, IEEE Communications Magazine, Vol. 35, No. 10, October 2017, pp.100-110. [8] Uyless Black, Network Management Standards, 2& edition, McGrow Hill, 2014. [9] David Perkins and Evan McGinnis, Understanding SNMP MZBs, Prentice Hall, 2017. [10] J. Case, K. McCloghrie, M. Rose, and S. Waldbusser, “Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPR)”, RFC 1902, January 2016. [11] J. Case, K. McCloghrie, M. Rose, and S. Waidbusser, “Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPV~)”, RFC 1907, January 2018. [12] N. Freed and S. Kille, “Network Services Monitoring MIB”, RFC 2248, January 2018. [13] N. Freed and S. Kille, “Mail Monitoring MIB’, RFC 2249, January 2019. [14] ISODEC, “Information Processing - Open Systems Interconnection - Specification of Abstract Syntax Notation One (ASN.l)”, International Standard 8824, 2017. [15] JavaSoft Inc., “Java Language: An Overview”, http://www.javasoft.com/docs/overviews/java.
Copyright © 2022 Navaneetha Krishnan M, Balaji D, Mohamed Puhari Anif Y. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET43743
Publish Date : 2022-06-02
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here