0% found this document useful (0 votes)
78 views151 pages

Amit Mahato

Uploaded by

vidit budhraja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views151 pages

Amit Mahato

Uploaded by

vidit budhraja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 151

“ONLINE CAR RENTAL SYSTEM”

BY

AMIT MAHATO

(ROLL NUMBER)

SCHOOL OF TEHNOLOGY AND INFORMATON OF COMPUTER SCIENCE

BABA FARID INSTITUTE OF TECHNOLOGY, SUDDHOWALA

DEHRADUN – 248007

2021-2024

HEMVATI NANDAN BAHUGUNA GARHWAL UNIVERSITY


PROJECT REPORT

ON

“ONLINE CAR RENTAL SYSTEM”


A
Thesis
Submitted in partial fulfilment of
The requirements for the award of the Degree of

BACHELOR OF COMPUTER APPLICATIONS


By
AMIT MAHATO
ID NUMBER - xxxxxxxxx
ENROLLMENT NO- xxxxxxxxx
Under the Guidance of

Mr. XXXXXXXX

SCHOOL OF TEHNOLOGY AND INFORMATON OF COMPUTER SCIENCE

BABA FARID INSTITUTE OF TECHNOLOGY, SUDDHOWALA

DEHRADUN – 248007

2021-2024

HEMVATI NANDAN BAHUGUNA GARHWAL UNIVERSITY


CERTIFICATE

This is to certify that the thesis entitled “ ONLINE CAR


RENTAL SYSTEM”, Submitted to HNB GARHWAL (CENTRAL)
UNIVERSITY in partial fulfilment of the requirement for the award of
degree of Bachelor of Computer Applications is an original work
carried out by AMIT MAHATO Enrollment No: xxxxxx under the
guidance of MR. XXXXXXXX.
The matter embodied in this project a genuine work done by
the student has not been submitted whether to this university or to any
other University/Institute for the fulfilment of the requirement of any
course of study.

AMIT MAHATO (Mr. XXXXXXX)


ADDRESS- xxxxxxx DEAN (STICS)
ENROLLMENT NO: xxxxxxx BFIT DEHRADUN
ACKNOWLEDGEMENT

My sincere thanks to Mr. Teacher Name, Dean of STICS,


Baba Farid Institute of Technology, Suddhowala, Dehradun, for
his encouragement and valuable suggestions during period of my
Thesis preparation.

No words would suffice to express my regard and gratitude


to Chairman Sir, Director Sir, and Registrar Sir, BFIT, Dehradun
for his inspiring guidance, constant encouragement, immense
support and help during the preparation of this Thesis.

I express my heartfelt gratitude to Prof. (Dr,) Aslam


Siddique, Principal, BFIT, Dehradun for permitting me to carry
out this Thesis work.

Finally, I express my thanks to my friends, parents who have


shown constant support during the tenure of my project. Without
then it could not be successful.

Amit

Univ. Roll No. xxxxxxxxxxx


INDEX

● Introduction.

● Project Description.

● Analysis

●Why Use PHP?

●Local Server Technologies.

●Feasibility Study.

●Hardware & Software Requirements.

● Design Documents.

●E-R Diagram.

● Testing & Debugging Strategies.

● Input & Output Layouts.


INTRODUCTION TO ONLINE CAR RENTAL SYSTEM

Introduction

This project is designed so as to be used by Car Rental Company specializing in renting cars
to customers. It is an online system through which customers can view available cars,
register, view profile and book car.

Reason for the Project

The advancement in Information Technology and internet penetration has greatly enhanced
various business processes and communication between companies (services provider) and
their customers of which car rental industry is not left out. This E-Car Rental System is
developed to provide the following services:

● Enhance Business Processes: To be able to use internet technology to project the rental

company to the global world instead of limiting their services to their local domain alone,
thus increase their return on investment (ROI).

● Online Vehicle Reservation: A tools through which customers can reserve available cars

online prior to their expected pick-up date or time.

● Customer’s registration: A registration portal to hold customer’s details, monitor their

transaction and used same to offer better and improve services to them.
● Group bookings: Allows the customer to book space for a group in the case of weddings

or corporate meetings (Event management).

Problem Statement

A car rental is a vehicle that can be used temporarily for a fee during a specified period.
Getting a rental car helps people get around despite the fact they do not have access to their
own personal vehicle or don't own a vehicle at all. The individual who needs a car must
contact a rental car company and contract out for a vehicle. This system increases customer
retention and simplify vehicle and staff management.

Aims & Objectives

● To produce a web-based system that allow customer to register and reserve car online and

for the company to effectively manage their car rental business.

● To ease customer’s task whenever they need to rent a car.

Scope

This project traverses a lot of areas ranging from business concept to computing field, and
required to perform several researches to be able to achieve the project objectives. The area
covers include:

● Car rental industry: This includes study on how the car rental business is being done,

process involved and opportunity that exist for improvement.


● PHP Technology used for the development of the application.

● General customers as well as the company’s staff will be able to use the system

effectively.

● Web-platform means that the system will be available for access 24/7 except when there

is a temporary server issue which is expected to be minimal.

CAR RENTAL SERVICES

How Car Rental Services Work

A car rental is a vehicle that can be used temporarily for a period of time with a fee. Renting
a car assists people to get around even when they do not have access to their own personal
vehicle or don't own a vehicle at all. The individual who want to rent a car must first contact
the car rental company for the desire vehicle. This can be done online. At this point, this
person has to supply some information such as; dates of rental, and type of car. After these
details are worked out, the individual renting the car must present a valid Identification Card.

Most companies throughout the industry make a profit based of the type of cars that are
rented. The rental cars are categorized into economy, compact, compact premium, premium
and luxury. And customers are free to choose any car of their choice based on their purse and
availability of such car at the time of reservation.
Benefits of Online Car Rental Services

● This online car rental solution is fully functional and flexible.

● It is very easy to use.

● This online car rental system helps in back office administration by streamlining and

standardizing the procedures.

● It saves a lot of time, money and labour.

● Eco-friendly: The monitoring of the vehicle activity and the overall business becomes

easy and includes the least of paper work.

● The software acts as an office that is open 24/7.

● It increases the efficiency of the management at offering quality services to the

customers.

● It provides custom features development and support with the software.

FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS

Functional Requirements
Requirement analysis is a software engineering technique that is composed of the various
tasks that determine the needs or conditions that are to be met for a new or altered product,
taking into consideration the possible conflicting requirements of the various users.

Functional requirements are those requirements that are used to illustrate the internal working
nature of the system, the description of the system, and explanation of each subsystem. It
consists of what task the system should perform, the processes involved, which data should
the system holds and the interfaces with the user. The functional requirements identified are:

a. Customer’s registration: The system should allow new users to register online and
generate membership card.
b. Online reservation of cars: Customers should be able to use the system to make booking
and online reservation.
c. Automatic update to database once reservation is made or new customer registered:
Whenever there’s new reservation or new registration, the system should be able update
the database without any additional efforts from the admin.
d. Feedbacks to customers: It should provide means for customers to leave feedback.

Non-Functional Requirements

It describes aspects of the system that are concerned with how the system provides the
functional requirements. They are:
a. Security: The subsystem should provide a high level of security and integrity of the data
held by the system, only authorized personnel of the company can gain access to the
company’s secured page on the system; and only users with valid password and username
can login to view user’s page.
b. Performance and Response time: The system should have high performance rate when
executing user’s input and should be able to provide feedback or response within a short
time span usually 50 seconds for highly complicated task and 20 to 25 seconds for less
complicated task.
c. Error handling: Error should be considerably minimized and an appropriate error message
that guides the user to recover from an error should be provided. Validation of user’s
input is highly essential. Also the standard time taken to recover from an error should be
15 to 20 seconds.
d. Availability: This system should always be available for access at 24 hours, 7 days a
week. Also in the occurrence of any major system malfunctioning, the system should be
available in 1 to 2 working days, so that the business process is not severely affected.
e. Ease of use: Considered the level of knowledge possessed by the users of this system, a
simple but quality user interface should be developed to make it easy to understand and
required less training.
DATA FLOW DIAGRAMS

Data Flow Diagram (DFD)

A Data Flow Diagram (DFD) is a graphical representation that depicts the information flow
and the transforms that are applied as data moves from input to output.

EMAIL FOR RESERVED CAR

CAR RESERVED

RESERVE A CAR EMAIL FOR RESERVED CAR

NEW
REGISTRATION ADD
ONLINE CAR CUSTOMER CAR
CUSTOMER RENTAL RENTAL
COMPANY

LOGIN REQUEST
. SYSTEM TRANSACTION
REPORTS
AUTHENTICATIO
N
REGISTRATION CONFIRMATION

Figure 4.1 Level 0 DFD of Online Car Rental System

In this diagram, Customer and Car Rental Company are the two entity sets.

Functions of Customer:

● New Registration

● Login Request

● Registration Confirmation by the System


● Reserve Car

● Car Issued by the System

● Email received for Reserved Car

Functions of Car Rental Company:

● Add Customer

● Send E-Mails for Reserved Car

● View Transaction reports


RESPONS
RESPONSE TO FEEDBACK E TO
FEEDBACK
CUSTOMER DB
CUSTOMER
DETAILS
FEEDBACK

LOGIN
DETAILS
SIGNED IN STAFF

REGISTER AS
NEW MEMBER

LOGIN SELECT LOGIN DETAILS


DETAILS FOR LOGIN
CAR
RESERVATION
AVAILABLE
CARS STAFF DB

CUSTOMER CUSTOMER DB
REPORT STAFF DB
CHOOSE PROCES REPORT
CAR SRENTAL VIEW
REPORT SIGNED IN

CAR DB REPORT

RETURN MAK ADD/UPDATE


ADMIN
CAR E
PAYMEN CAR DETAILS
T

CAR
RESERVED

FEEDBACK CAR DB

Figure 4.2 Level 1 DFD of Online Car Rental System


USE-CASE DIAGRAMS

Actor and Use Case Description


Actor and use case description show the detail description of interaction between the actors
and their use cases. The description enables to have a proper understanding of how actor
interacts with the system through their use cases.

Actor Use Case Use Case Description

This use case describes the activities of the customer


to register online and become a member. Customer's
Register as
details are required as part of the registration. Login
member
detail is automatically sent to the customer after
successful registration.

This use case enable customer to search and make


reservation. Non-register customer will be directed
Make
to register before their reservation can be
Customer reservation
confirmed. Notification is automatically send to the
customer after the task is completed.

This use case describes the event of customer


returning the car borrowed, the use case extends
Return car
"process rental" use case from the staff actor.

Give feedback This use case is used by the customer to provide


feedbacks/comment to the company; a confirmation
notification will be send to the customer once a
feedback has been submitted.

This use case is used by the staff to add new car to


the company's fleet database. Staff will need to login
Add new car
to activate this use case.

Update car This use case is used by the staff to edit and modify
details car details whenever there is new renewal (insurance,
road tax). It allows the company to keep up-to-date
record of their fleet.

Reply to This use case describes the event by which staff


customer’s sends reply to customer's earlier feedback. It depends
Staff feedback on `give feedback' use case from the customer.

Process rental This use case described the event by which staff
updates the system when customer pick up or when
returning car.

Add new staff This use case describes the event by which Admin
add new staff detail to the company's staff database.

Admin It is invoke whenever a new staff join the company.

View report This use case is used by the Admin to view


transaction report.

Table 5.1 Actors and Use Case Description

Use Case Diagram


Register as member Add new car
Staff
Make reservation Update car details
Customer

Process rental
<<extend>>
Return car
Reply to
customer's
Give feedback/ feedback
comments

Admin

View report

.3 Use-Case Dependency Diagram

Member Registration
Customer E-Car Rental System
Star
t

Enter details
[Yes]

Enter username and


password

Accept terms & [No]


Username exist?
conditions

Confirm and
submit
Display customer's
welcome screen

Send email
confirmation

End

Figure 6.1: Register as member


Profile Modification

Customer E-Car Rental System


Start

[No]

Login Valid?

Navigate to Edit [Yes]


Profile

Modify your
profile

Confirm and submit

Update database

Send confirmation
notification

Log out

End

Figure 6.2: Modify profile

Reservation of Car
Customer E-Car Rental
System
Start

Choose pickup
location

Choose pick up date


and time

Choose return
location

Choose return date


and time

Choose vehicle class

Choose from Display available


available car cars

[No]
Member?

Login
Register

[No]
Valid?

[Yes]
merge

Confirm

Redirect to payment
gateway

Send confirmation

End

Figure 6.3: Make Reservation

Customer Feedback
Customer E-Car Rental System
Start

Enter your details

Enter your message/remark

Submit feedback

Send notification

End

Payment of Car Rent

Staff

Start

Provide member id
Adding a New Car
Staff E-Car Rental System

Login

[No]

Login
Valid?

[Yes]

Enter car details

Add to inventory

Update status

End

View Report
Admin E-Car Rental System

Start

Login
[No]

Valid?

[Yes]
Specify report to view

Confirm and submit

Retrieve report

End

SEQUENCE DIAGRAMS
Sequence Diagram
Sequence diagrams are used to demonstrate the behavior of objects in a use case by
describing the objects and the messages they pass. It provides a graphical representation of
object interactions over time. Sequence diagrams show an actor, the objects and components
they interact with in the execution of a use case. One sequence diagram represents a single
Use Case 'scenario' or events. Sequence diagrams show the flow of messages from one object
to another, and as such correspond to the methods and events supported by an object.

Member Registration

Figure 7.1: Register as member

Reservation of Car
Figure 7.2: Make reservation

Customer Feedback

Feedback System:"sys 01" Database:"db


Customer:ola page:i001 001"

Enter details

Enter feedback
message
Confirm and submit
Accept feedback

Add to database
Send confirmation

Figure 7.3: Give feedback

Adding a New Car


New Car page: P001 Control:Admin Database:"db
staff:John Handler 01"

Login
Pass to control
Check validity

provide admin page

Enter new car


details

Confirm and
submit Pass to control
Add to database

Log out
Close
session

Fi
gure 7.4: Add new car

Feedback Response

Staff:John Interface:i001 Control:Feed Database:"db


Handler 01"

Login
Check validity
Get staff info
Select feedback

Display feedback
Respond to feedback

Log out
End session

Figure 7.5: Respond to feedback

Return Car and Check Rental Details


Interface:i001 Database:"db
Customer:ola Staff:john 01"

Provide member
id

Check rental details


Confirm if overdue
Process rental

Update
database

Figure 7.6: Return car

View Report

Report page: Report Control: Database:"db


P002 c008 01"
Admin:Kabir

Login
Check validity

Specify report

Retrieve report
Log out

End session

Figure 7.7: View report


CLASS DIAGRAM

Class Diagram
The class diagram is the main building block, a number of classes are identified and grouped
together in a class diagram which helps to determine the statically relations between those
objects.

Automation notify
provides 1 alert
Distance chart - name : string 1
1..*
- source : string get () Feedback respond to
- destination : 1 provide () 1..* 1..*
alert () 1
- id : int Staff
get () notify () - custName :
provide () - custEmail : string
string
1notify - sid : char
- sname : string
1.. send - position : string
* respond ()
() - mobile : int
Reservation Customer
gives1..* add 1 addcar ()
- rid : int - userId : string 1..* modifyInfo ()
- pickdate : date makes 1..* - custName : string 1..*
- returndate : date 1..* - cusAddr : string 1 add
- mobile : int 1..*
- pickloc : string
- VehicleClass : string - email : string Car 1
Admin
1..* register () 1
reserve () rent - PlateNo : string
search() login () 1 - CarName : string - Id : string
reservation () - carType : string - name : string
1..* - rent : double
makes makes add ()
add () modify ()
1..* modify () view ()
1.. Return reserve ()
1
Payment *
- id : int
- retdate : date process View
- id : int
- amount : double 1..*
- custName : string update () Report

pay () - id : int
confirm () - date : date
Early return - title : string
Late return
1..*
- lateCharge : double generate ()
confirm () print ()
save
pay ()
confirm () ()

Figure 8.1 Class Diagram of Online Car Rental System


INTRODUCTION OF TECHNOLOGIES USED IN PROJECT

About PHP

PHP: Hypertext Pre-processor is a widely used, general-purpose scripting language that


was originally designed for web development to produce dynamic web pages. For this
purpose, PHP code is embedded into the HTML source document and interpreted by a web
server with a PHP processor module, which generates the web page document.

As a general-purpose programming language, PHP code is processed by an interpreter


application in command-line mode performing desired operating system operations and
producing program output on its standard output channel. It may also function as a graphical
application. PHP is available as a processor for most modern web servers and as standalone
interpreter on most operating systems and computing platforms.

PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by the PHP
Group and serves as the de facto standard for PHP as there is no formal specification. PHP is
free software released under the PHP License.

PHP is a general-purpose scripting language that is especially suited to server-side web


development where PHP generally runs on a web server. Any PHP code in a requested file is
executed by the PHP runtime, usually to create dynamic web page content. It can also be used
for command-line scripting and client-side GUI applications. PHP can be deployed on most
web servers, many operating systems and platforms, and can be used with many relational
database management systems. It is available free of charge, and the PHP Group provides the
complete source code for users to build, customize and extend for their own use.

Originally designed to create dynamic web pages, PHP now focuses mainly on server-side
scripting, and it is similar to other server-side scripting languages that provide dynamic
content from a web server to a client, such as Microsoft's Active Server Pages, Sun
Microsystems’ Java Server Pages, and mod_perl. PHP has also attracted the development of
many frameworks that provide building blocks and a design structure to promote rapid
application development (RAD). Some of these include CakePHP, Symfony, CodeIgniter and
Zend Framework, offering features similar to other web application frameworks.
PHP Syntax:

HTML and PHP code is written on the same page, and to distinguish PHP code from
HTML, the PHP code is enclosed within <? php ?> Tags.

For example:

<html>

<head><title>php basics</title></head>

<body>

<h2>HELLO</h1>

<?php

echo "hello";

?>

</body>

</html>

In the above example PHP code is embedded within HTML. In this way PHP and HTML
coding is combined on the same page.

Since PHP is a server side scripting language, the PHP coding cannot be seen by the end user
through view source option, due to this feature PHP is very secure.

PHP is a parsed language; therefore PHP environment is necessary at the server for running
PHP scripts.
Working of PHP:

Figure 9.1 Working of PHP

When a client requests web page containing PHP code from the server, then the requested
PHP pages are parsed under PHP environment and interaction with database is made if
required.

After server side processing, the resulting HTML pages are passed to client and displayed on
the browser.

In this way the working of php is complete.


9.4 Connecting PHP Application to MySQL Database

1) Make a connection variable to the database:

$con= mysql_connect ("localhost","servername","password");

Here $con is a connection variable to database.

2) Select a database over that connection variable:

$db=mysql_select_db("databasename",$con);

3) Prepare a sql query to execute:

$qry= Select * from abc;

4) Run the sql query:

$result=mysql_query($qry);

5) Iterate over the result:

while($row = mysql_fetch_array($result))

{
//some logic
}
9.5 Introduction to MySQL:

MySQL is a relational database management system (RDBMS) that runs as a server


providing multi-user access to a number of databases. MySQL is officially pronounced ("My
S-Q-L"), but is often pronounced ("My Sequel"). It is named for original developer Michael
Widenius's daughter My.

The MySQL development project has made its source code available under the terms of the
GNU General Public License, as well as under a variety of proprietary agreements. MySQL
is owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now
owned by Sun Microsystems, a subsidiary of Oracle Corporation.

MySQL code uses C and C++. The SQL parser uses yacc and a home-brewed lexer,
sql_lex.cc.

MySQL works on many different system platforms, including AIX, BSDi, FreeBSD, HP-UX,
i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris, eComStation,
OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer, SCO UnixWare,
Sanos, Tru64 and Microsoft Windows. A port of MySQL to OpenVMS also exists.

All major programming languages with language-specific APIs include Libraries for
accessing MySQL database. In addition, an ODBC interface called MyODBC allows
additional programming languages that support the ODBC interface to communicate with a
MySQL database, such as ASP or ColdFusion. The HTSQL - URL based query method also
ships with MySQL adapter allowing direct interaction with MySQL database from any web
client via structured URLs. The MySQL server and official libraries are mostly implemented
in ANSI C/ANSI C++.
9.6 Introduction to APACHE SERVER:

In this project apache server is used to parse and execute PHP pages, before deploying
websites on the server, the website should be tested at the developer side to get a feel of how
the website will work on actual server.

Therefore apache server is like a local server on the developer side, apache server should be
informed about the environment on which it should work.

In our project apache server is configured to work with PHP, in this way all the PHP pages
are parsed and executed by the server.

When apache is installed on the system, then its services is controlled by apache service
monitor.

\
Features of the Language Used

In my project, I have chosen php language for developing the code.

About PHP

● PHP is an acronym for "PHP: Hypertext Preprocessor"

● PHP is a widely-used, open source scripting language

● PHP scripts are executed on the server

● PHP is free to download and use

PHP is an amazing and popular language!

It is powerful enough to be at the core of the biggest blogging system

on the web (WordPress)!

It is deep enough to run the largest social network (Facebook)!

It is also easy enough to be a beginner's first server side language!

What is a PHP File?

● PHP files can contain text, HTML, CSS, JavaScript, and PHP code

● PHP code are executed on the server, and the result is returned to the

browser as plain HTML


● PHP files have extension ".php"

What Can PHP Do?

● PHP can generate dynamic page content

● PHP can create, open, read, write, delete, and close files on the server

● PHP can collect form data

● PHP can send and receive cookies

● PHP can add, delete, modify data in your database

● PHP can be used to control user-access

● PHP can encrypt data

With PHP you are not limited to output HTML. You can output

images, PDF files, and even Flash movies. You can also output any

text, such as XHTML and XML.


Why PHP?

● PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, etc.)

● PHP is compatible with almost all servers used today (Apache, IIS, etc.)

● PHP supports a wide range of databases

● PHP is free. Download it from the official PHP resource: www.php.net

● PHP is easy to learn and runs efficiently on the server side

PHP with this free MySQL database for beginners course.

3. PHP: PHP stands for Hypertext Preprocessor. It is a server-

side scripting language that powers some of the most popular

websites in the world, including WordPress and Facebook. It

is open source, relatively easy to learn, and works perfectly

with MySQL, making it a popular choice for web developers.

4. Perl: Perl is a high-level, dynamic programming language

used extensively in network programming, system admin, etc.

Although less popular for web development purposes, Perl

has a lot of niche applications.


Different versions of XAMPP may have additional

components such as phpMyAdmin, OpenSSL, etc. to create

full-fledged web servers.

XAMPP : How to Use XAMPP to Run Your

Own Web Server

XAMPP stands for Cross-Platform (X), Apache (A), MySQL (M),

PHP (P) and Perl (P). It is a simple, lightweight Apache distribution

that makes it extremely easy for developers to create a local web

server for testing purposes. Everything you need to set up a web

server – server application (Apache), database (MySQL), and

scripting language (PHP) – is included in a simple extractable file.

XAMPP is also cross-platform, which means it works equally well on

Linux, Mac and Windows. Since most actual web server deployments

use the same components as XAMPP, it makes transitioning from a

local test server to a live server is extremely easy as well. Web

development using XAMPP is especially beginner friendly, as this

popular PHP and MySQL for beginners course will teach you.

What’s Included in XAMPP?

XAMPP has four primary components. These are:

1. Apache: Apache is the actual web server application that

processes and delivers web content to a computer. Apache is

the most popular web server online, powering nearly 54% of

all websites.
2. MySQL: Every web application, howsoever simple or

complicated, requires a database for storing collected data.

MySQL, which is open source, is the world’s most popular

database management system. It powers everything from

hobbyist websites to professional platforms like WordPress.

You can learn how to master PHP with this free MySQL

database for beginners course.

3. PHP: PHP stands for Hypertext Preprocessor. It is a server-

side scripting language that powers some of the most popular

websites in the world, including WordPress and Facebook. It

is open source, relatively easy to learn, and works perfectly

with MySQL, making it a popular choice for web developers.

4. Perl: Perl is a high-level, dynamic programming language

used extensively in network programming, system admin, etc.

Although less popular for web development purposes, Perl

has a lot of niche applications.

Different versions of XAMPP may have additional

components such as phpMyAdmin, OpenSSL, etc. to create

full-fledged web servers.

How to Install XAMPP?

[Note: For the purpose of this XAMPP tutorial, we’ll assume that

you’re using a Windows PC, although these instructions work equally


well for Mac computers. Linux users, however, should refer to the

official XAMPP Linux installation guide.]

Head over to XAMPP for Windows homepage on ApacheFriends.org.

Here, you will find multiple versions of XAMPP.

In this tutorial, we will install XAMPP Windows 1.8.2 which

includes:

Feasibility Study

The success of any system resides particularly form the user point that

is, does the system provides you the proper information, easy to

operate. The crucial part is deciding upon the requirement, to provide

him the possible solution .The system should meet the user needs, the

system should be economical. the system be easily maintained and

enhanced.
Feasibility study is conducted to test the operational, economical and

technical feasibility of the system.

● Operational Feasibility :

The system provides a user-friendly interface and is

therefore easy to use. Operating the system requires no programming

knowledge anybody with basic computing knowledge can use the

system. Therefore the system is operationally feasible.

● Economic Feasibility :

Apart from the development cost and the cost incurred in

setting up resource to use the system, the system helps saving

administrative expenses on phones/Faxes/personal visits. But the cost

incurred in the

Developing and setting up necessary Hardware to use the system is

unavoidable. The cost involved in developing and implementing the

system is not high, the system definitely helps improving processes.

The system is developed using software which is easily available

everywhere.

The System being on-line, error detection is speedy resulting in

saving man-hours to produce error free output.


After rectifying error.Ultimetly the basic aim of the developer is

to increase Customer satisfaction. So the system is economically

feasible.

● Technical Feasibility :

As the system is developed using java, it is platform independent.

So the users of the system can have average processing capabilities,

running on any platforms. Server need to have higher processing

capabilities as at a time many use the system simultaneously. The

technology used is one of the latest hence the system is also

technically feasible.

Hardware & Software Specifications

Required Hardware:

• Pentium III Processor.


● 128 MB RAM.

● 10GB Hard Disk space.

● Ethernet card with an Internet and Internet zone.

Required Software:

● Windows 2000 XP, Windows 2010 operating system.

● Google Chrome and Mozilla Firefox .

● Notepad++ and Dream viewer .

Design Document :

● The entire system is projected with a physical diagram which specifics the

actual storage parameters that are physically necessary for any database to

be stored on to the disk. The overall systems existential idea is derived from

this diagram.

● The relation upon the system is structure through a conceptual ER-Diagram,

which not only specifics the existential entities but also the standard
relations through which the system exists and the cardinalities that are

necessary for the system state to continue.

● The entity Relationship Diagram (ERD) depicts the relationship between the

data objects.

● The ERD is the notation that is used to conduct the date modeling activity

the attributes of each data

● object noted is the ERD can be described resign a data object

Descriptions.

● The set of primary components that are identified by the ERD are

Data object Relationships

Attributes Various types of indicators.

● The primary purpose of the ERD is to represent data objects and

● Their relationships.

Diagram is special kind of state chart diagram.

Unified Modeling Language Diagrams

● The unified modeling language allows the software engineer to

Express an analysis model using the modeling notation that is governed

by a set of syntactic semantic and pragmatic rules.

● A UML system is represented using five different views that describe the

system from distinctly different perspective. Each view is defined By a set

of diagram, this is as follows.


● User Model View

● This view represents the system from the users’ perspective.

● The analysis representation describes a usage scenario from the End-users

perspective.

Structural model view

● In this model the data and functionality are arrived from inside the system.

This model view models the static structures.

Behavioral Model View

● It represents the dynamic of behavioral as parts of the system, depicting the

interactions of collection between various structural Elements described in

the user model and structural model view.

Implementation Model View

● In this the structural and behavioral as parts of the system are represented as

they are to be built.

Environmental Model View

In this the structural and behavioral aspects of the environment in which

the system is to be implemented are represented.

UML is specifically constructed through two different domains they

are

● UML Analysis modeling, which focuses on the user

Model and structural model views of the system.


● UML design modeling, which focuses on the behavioral

Modeling, implementation modeling and environmental Model

views.

Use Case Diagrams

Use cases model the system from the end users point of view, with the

following objectives

● To define the functional and operational requirements

of the system by defining a scenario of usage.

● To provide a class and unambiguous description

of how the end user and the system interact with one

another.

● To provide a basis for validation testing.

Use Cases

The actors who have been recognized within the system are

Collaboration Diagram:

A Collaboration Diagram show the interaction organized around the object

in the interaction and their links


To each other. Unlike sequence diagram the collaboration diagram show the

relationship among the relation

Ship among the Object. Collaboration Diagram does not show the time as,

Separate dimension .So,

Sequence number determines the sequence of messages. Collaboration

diagram cross between the

Symbolic diagram and sequence diagram.

Uses:

1. Describe the specific scenario by duplicate the moment of messages

between the object.

2. Show the spatial organization of object and there interaction rather than

interaction.

View: Dynamic.

Sequence Diagram:

UML Sequence Diagram is the Dynamic Modeling technique as are,

Collaboration and Activity Diagram.

It Validate and Flush the Logic of Usage scenario. Sequence diagram show

the object and messages involve in

An interaction it shows the timing of messages but not relationship among

the object.
Class Diagram:

Class Diagram describe the static nature of the system of the system .It

describe the type of object in the system

And there static relationship, you can specify the characteristic and process

it can carry out (operation).

The class is group of object with similar properties and common

behavior (operations), common relationship

To the other object and common semantic. In Class diagram following are

different visibility modes,

● + public

● # protected

● – private

● $ static attribute

● / Derived attribute

● * Primary Key

Use Case Diagram:


A use case is a set of scenario that describe on interaction between the

user and system. A use case diagram.

Show the relationship between the actors and use cases. Three main

components are,

● Actor

● Use cases

● System Boundary

Activity Diagram:

Activity diagram are the dynamic modeling technique. It describe the

activity of control and it can initiate

The control activity. It can model the flow of control activity to activity. An

activity represents the some

Class operation in the system that result is change in the state of system.

It is used to model work flow and business model and interaction of

internal operation because activity

Diagram is special kind of state chart diagram.

Testing

Testing is the process of detecting errors. Testing performs a very critical

role for quality assurance and for ensuring the reliability of software. The

results of testing are used later on during maintenance also.


Psychology of Testing

The aim of testing is often to demonstrate that a program works by showing

that it has no errors. The basic purpose of testing phase is to detect the errors

that may be present in the program. Hence one should not start testing with

the intent of showing that a program works, but the intent should be to show

that a program doesn’t work. Testing is the process of executing a program

with the intent of finding errors.

Testing Objectives

The main objective of testing is to uncover a host of errors,

systematically and with minimum effort and time. Stating formally,

we can say,

● Testing is a process of executing a program with the intent of finding

an error.

● A successful test is one that uncovers an as yet undiscovered error.

● A good test case is one that has a high probability of finding error, if it

exists.

● The tests are inadequate to detect possibly present errors.

● The software more or less confirms to the quality and reliable

standards.
Levels of Testing

In order to uncover the errors present in different phases we have the

concept of levels of testing. The basic levels of testing are as shown

below…

Client Needs

Requirements

Design

Code

System Testing

The philosophy behind testing is to find errors. Test cases are devised with

this in mind. A strategy employed for system testing is code testing.

Code Testing:

This strategy examines the logic of the program. To follow this method we

developed some test data that resulted in executing every instruction in the

program and module i.e. every path is tested. Systems are not designed as

entire nor are they tested as single systems. To ensure that the coding is

perfect two types of testing is performed or for that matter is performed or

that matter is performed or for that matter is performed on all systems.


Types of Testing

● Unit Testing

● Link Testing

Unit Testing

Unit testing focuses verification effort on the smallest unit of software i.e.

the module. Using the detailed design and the process specifications testing

is done to uncover errors within the boundary of the module. All modules

must be successful in the unit test before the start of the integration testing

begins.

In this project each service can be thought of a module. There are so many

modules like Login, HWAdmin, MasterAdmin, Normal User, and

PManager. Giving different sets of inputs has tested each module. When

developing the module as well as finishing the development so that each

module works without any error. The inputs are validated when accepting

from the user.

In this application developer tests the programs up as system. Software units

in a system are the modules and routines that are assembled and integrated

to form a specific function. Unit testing is first done on modules,

independent of one another to locate errors. This enables to detect errors.

Through this error resulting from interaction between modules initially

avoided.

Link Testing

Link testing does not test software but rather the integration of each module

in system. The primary concern is the compatibility of each module. The


Programmer tests where modules are designed with different parameters,

length, type etc.

Integration Testing

After the unit testing we have to perform integration testing. The goal here

is to see if modules can be integrated properly, the emphasis being on

testing interfaces between modules. This testing activity can be considered

as testing the design and hence the emphasis on testing module interactions.

In this project integrating all the modules forms the main system. When

integrating all the modules I have checked whether the integration effects

working of any of the services by giving different combinations of inputs

with which the two services run perfectly before Integration.

System Testing

Here the entire software system is tested. The reference document for this

process is the requirements document, and the goal us to see if software

meets its requirements.

Acceptance Testing

Acceptance Test is performed with realistic data of the client to demonstrate

that the software is working satisfactorily. Testing here is focused on

external behavior of the system; the internal logic of program is not

emphasized.

In this project ‘Network Management of Database System’ I have collected

some data and tested whether project is working correctly or not.

Test cases should be selected so that the largest number of attributes of an

equivalence class is exercised at once. The testing phase is an important part

of software development. It is the process of finding errors and missing


operations and also a complete verification to determine whether the

objectives are met and the user requirements are satisfied.

White Box Testing

This is a unit testing method where a unit will be taken at a time and tested

thoroughly at a statement level to find the maximum possible errors. I tested

step wise every piece of code, taking care that every statement in the code is

executed at least once. The white box testing is also called Glass Box

Testing.

I have generated a list of test cases, sample data. which is used to check all

possible combinations of execution paths through the code at every module

level.

Black Box Testing

This testing method considers a module as a single unit and checks the unit

at interface and communication with other modules rather getting into

details at statement level. Here the module will be treated as a block box

that will take some input and generate output. Output for a given set of input

combinations are forwarded to other modules.

Criteria Satisfied by Test Cases

● Test cases that reduced by a count that is greater than one, the number of

additional test cases that much be designed to achieve reasonable testing.

● Test cases that tell us something about the presence or absence of classes of

errors, rather than an error associated only with the specific test at hand.
Database :-

Screenshots: -

Index Page:
Car Selection Page:
Sign In Page:
Customer Experience:

Sign Up Page:
New User:

Index Page:

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<title>UOWN</title>

<?php include "session.php";?>

<?php require_once "bootstrap.php";?>

<style type="text/css">

.nav-bar {
background-color: transparent;

.w-container {

margin-left: auto;

margin-right: auto;

max-width: 940px;

#nav{

background-color: transparent;

.logo{

padding-top: 8px;

.w-nav {

position: relative;

background: #dddddd;

z-index: 1000;

.w-nav-brand {

position: relative;

float: none;

text-decoration: none;

color: #333333;

}
.w-nav-overlay {

position: absolute;

overflow: hidden;

display: none;

top: 100%;

left: 0;

right: 0;

width: 100%;

.hed{

background-image:url(img/s.jpg);

background-size: cover;

background-repeat: no-repeat;

height: 100vh;

background-position: 0px 0px, 50% 50%;

.hero-container{

margin-top: 29vh;

text-align: center;

.w-container {
margin-left: auto;

margin-right: auto;

max-width: 940px;

.hero-subtitle {

color: hsla(0, 0%, 100%, .7);

font-size: 16px;

line-height: 22px;

letter-spacing: 1px;

text-transform: uppercase;

.hero-heading {

margin-top: 0px;

color: #fff;

font-size: 80px;

line-height: 85px;

font-weight: 400;

text-transform: uppercase;

button.big {

margin-right: 9px;

margin-left: 9px;

padding: 11px 26px;

border-color: white !important;


transition: border 200ms ease, color 200ms ease;

color: white !important;

font-size: 16px;

.button {

padding: 11px 19px;

border: 1px solid white;

background-color: transparent;

color: white;

font-size: 14px;

@media screen and (max-width: 991px){

.w-container {

max-width: 728px !important;

.w-nav[data-collapse="medium"] .w-nav-menu {

display: none;

.nav-menu {

padding-top: 18px !important;

padding-bottom: 18px !important;

border-top: 1px solid #000 !important;


background-color: rgba(0, 0, 0, .85) !important;

.menu-button:hover {

color: #fff !important;

.menu-button {

padding: 20px 0px 20px 20px !important;

color: hsla(0, 0%, 100%, .62) !important;

font-size: 25px !important;

line-height: 22px !important;

.w-container {

max-width: 728px !important;

.logo{

padding-top: 8px !important;

width: 10% !important;

@media (max-width: 767px){

.menu-button {

margin-right: 7px !important;

}
.hero-heading {

font-size: 61px !important;

.logo{

padding-top: 8px !important;

width: 10% !important;

@media screen and (max-width: 479px){

.w-container {

max-width: none !important;

.hero-container {

padding-right: 13px !important;

padding-left: 13px !important;

.hero-heading {

font-size: 39px !important;

line-height: 52px !important;

.button.big {

width: 100%;
margin-right: 0px;

margin-bottom: 12px;

margin-left: 0px;

.logo{

padding-top: 8px !important;

width: 10% !important;

</style>

</head>

<body>

<div class="hed">

<?php

include "navbar.php";

?>

<div class="hero-container w-container">

<h1 class="hero-heading" style="background: linear-gradient(to

right,#E20D13, #F0E300, #A4C615, #4363AB,#BE4A94,#E30922);-


webkit-background-clip: text;-webkit-text-fill-color: transparent;" >A

Journey Full Of Dreams</h1>

<a class="big button w-button" href="tour.php">Want To Book

CAR?</a>

</div>

</div>

</body>

</html>

Tour Page:

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<title>UOWN</title>

<?php include "session.php";?>

<?php require_once "bootstrap.php";?>

<?php require_once "bootstrap1.php";?>

<style type="text/css">

<?php

if(isset($_SESSION['mail']))

{
include "modal.css";

else{

include "modal1.css";

?>

body{

color: white;

.nav-bar {

background-color: transparent;

.w-container {

margin-left: auto;

margin-right: auto;

max-width: 940px;

#nav{

background-color: transparent;

.logo{

padding-top: 8px;
}

.w-nav {

position: relative;

background: #dddddd;

z-index: 1000;

.w-nav-brand {

position: relative;

float: none;

text-decoration: none;

color: #333333;

.w-nav-overlay {

position: absolute;

overflow: hidden;

display: none;

top: 100%;

left: 0;

right: 0;

width: 100%;

body {

background-image: url(img/bu.jpg);
background-size: cover;

overflow: scroll;

background-repeat: no-repeat;

background-attachment: fixed;

.content-wrapper {

margin-top: 78px;

.w-container {

margin-left: auto;

margin-right: auto;

max-width: 940px;

.page-title {

margin-top: 0px;

margin-bottom: 86px;

font-size: 36px;

line-height: 51px;

font-weight: 300;

text-align: center;

text-transform: uppercase;

.footer {
padding-top: 43px;

padding-bottom: 43px;

background-color: transparent;

color: #222;

text-align: center;

.venue-list-item {

padding-top: 5px;

padding-bottom: 5px;

border-top: 1px solid hsla(0, 0%, 100%, .3);

border-bottom: 1px solid hsla(0, 0%, 100%, .3);

@media screen and (max-width: 991px){

.w-container {

max-width: 728px !important;

.w-nav[data-collapse="medium"] .w-nav-menu {

display: none;

}
.nav-menu {

padding-top: 18px !important;

padding-bottom: 18px !important;

border-top: 1px solid #000 !important;

background-color: rgba(0, 0, 0, .85) !important;

.w-container {

max-width: 728px !important;

.logo{

padding-top: 8px !important;

width: 10% !important;

@media (max-width: 767px){

.logo{

padding-top: 8px !important;

width: 10% !important;

}
@media screen and (max-width: 479px){

.w-container {

max-width: none !important;

.logo{

padding-top: 8px !important;

width: 10% !important;

#a{

color: #2675ae;

text-decoration: none;

.new{

margin-top: 16px;

padding: 15px 20px;

text-align: center;

.head{

text-align: center;

}
.login{

margin: 0 auto;

width: 340px;

label{

color: #0e0e0f;

.bd1{

background-color: transparent;

font-size: 14px;

padding: 20px;

.btn-primary {

background-color: #2675aed9;

form label {

display: block;

margin-bottom: 7px;

input{

margin-bottom: 15px;

margin-top: 5px;
}

.label-link{

margin-left: 7em;

.form-control{

background-color: #ffffffc2;

#p{

color: black;

</style>

</head>

<body>

<?php require_once "navbar.php";?>

<div class="content-wrapper w-container">

<h1 class="page-title"><font style="vertical-align:

inherit;background: linear-gradient(to right,#E20D13, #F0E300,

#A4C615, #4363AB,#BE4A94,#E30922);-webkit-background-clip:

text;-webkit-text-fill-color: transparent;/* color: transparent;

*/"><font style="vertical-align: inherit; font-family: sans-

serif;">WE'RE COMING TO YOUR CITY!</font></font>


</h1>

</div>

<div class="w-dyn-list" style="text-align: center;">

<div class="w-dyn-items"><div class="venue-list-item w-dyn-

item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Mahindra Scorpio</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-15Km</div>

</div>

<div class="w-col w-col-3">

<div>300/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button"

onclick="op()">BOOK NOW</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">


<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>SANTRO</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-35Km</div>

</div>

<div class="w-col w-col-3">

<div>150/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button"

onclick="op()">BOOK NOW</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Swift Dzire</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-10Km</div>

</div>
<div class="w-col w-col-3">

<div>100/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>XUV-500</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-25Km</div>

</div>

<div class="w-col w-col-3">

<div>180/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>
</div>

</div><div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Nissan</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-35Km</div>

</div>

<div class="w-col w-col-3">

<div>170/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Ford</div>

</div>

<div class="w-col w-col-5">


<div class="venue">Mileage-10Km</div>

</div>

<div class="w-col w-col-3">

<div>160/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Nano</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-20Km</div>

</div>

<div class="w-col w-col-3">

<div>120/Hour</div>

</div>

<div class="w-col w-col-2">


<button class="rsvp-button w-button" onclick="op()">Book

now</button>

</div>

</div>

</div>

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Jeep</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-20Km</div>

</div>

<div class="w-col w-col-3">

<div>150/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">


<div>Xylo</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-19Km</div>

</div>

<div class="w-col w-col-3">

<div>180/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Marshal</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-18Km</div>

</div>

<div class="w-col w-col-3">

<div>19/Hour</div>
</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button"

onclick="op()">BOOK Now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Safari</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-19Km</div>

</div>

<div class="w-col w-col-3">

<div>180/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>

</div>

</div><div class="venue-list-item w-dyn-item">


<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Travera</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-15Km</div>

</div>

<div class="w-col w-col-3">

<div>130/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>Innova</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-15Km</div>

</div>
<div class="w-col w-col-3">

<div>220/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now</button>

</div>

</div>

</div>

<div class="venue-list-item w-dyn-item">

<div class="tour-date-row w-row">

<div class="w-col w-col-2">

<div>KIA</div>

</div>

<div class="w-col w-col-5">

<div class="venue">Mileage-20Km</div>

</div>

<div class="w-col w-col-3">

<div>220/Hour</div>

</div>

<div class="w-col w-col-2">

<button class="rsvp-button w-button" onclick="op()">Book

Now </button>

</div>
</div>

</div>

</div>

</div>

<?php

if(isset($_SESSION['mail']))

include "modal.php";

else{

include "modal1.php";

?>

<!-- The Modal -->

<?php require_once "footer.php";?>

<script>

// Get the modal

var modal = document.getElementById('myModal');

// Get the button that opens the modal

//var btn = document.getElementById("myBtn");


// Get the <span> element that closes the modal

var span = document.getElementsByClassName("close")[0];

// When the user clicks the button, open the modal

function op() {

modal.style.display = "block";

// When the user clicks on <span> (x), close the modal

span.onclick = function() {

modal.style.display = "none";

</script>

<script type="text/javascript">

$(document).ready(function(){

var quantitiy=0;

$('.quantity-right-plus').click(function(e){

// Stop acting like a button

e.preventDefault();

// Get the field name


var quantity = parseInt($('#quantity').val());

// If is not undefined

$('#quantity').val(quantity + 1);

var t=Number(document.getElementById("quantity").value);

var r=Number(document.getElementById("quantty").value);

document.getElementById("myText").value=t*4000+r*9000;

// Increment

});

$('.quantity-left-minus').click(function(e){

// Stop acting like a button

e.preventDefault();

// Get the field name

var quantity = parseInt($('#quantity').val());

// If is not undefined

// Increment
if(quantity>0){

$('#quantity').val(quantity - 1);

var t=Number(document.getElementById("quantity").value);

var r=Number(document.getElementById("quantty").value);

document.getElementById("myText").value=t*4000+r*9000;

});

});

</script>

<script type="text/javascript">

$(document).ready(function(){

var quatiy=0;

$('.quantity-right-plus1').click(function(e){

// Stop acting like a button

e.preventDefault();

// Get the field name

var quanity = parseInt($('#quantty').val());

// If is not undefined
$('#quantty').val(quanity + 1);

var t=Number(document.getElementById("quantity").value);

var r=Number(document.getElementById("quantty").value);

document.getElementById("myText").value=t*4000+r*9000;

// Increment

});

$('.quantity-left-minus1').click(function(e){

// Stop acting like a button

e.preventDefault();

// Get the field name

var quantity = parseInt($('#quantty').val());

// If is not undefined

// Increment

if(quantity>0){

$('#quantty').val(quantity - 1);
}

var t=Number(document.getElementById("quantity").value);

var r=Number(document.getElementById("quantty").value);

document.getElementById("myText").value=t*4000+r*9000;

});

});

</script>

<script>

function che()

var to=Number(document.getElementById("myText").value);

if(to>0){

document.getElementById("tic").click();

else{

alert("Total amount should be greater than 0");

</script>

</body>

</html>

Booking Page:
<!DOCTYPE html>

<html>

<head>

<meta name="viewport" content="width=device-width, initial-

scale=1.0">

<title>UOWN</title>

<?php require_once "session.php";?>

<?php require_once "bootstrap.php";?>

<?php require_once "bootstrap1.php";?>

<style>

.login{

margin: 0 auto;

width: 340px;

body {

background-image: url(img/music.png);

background-size: cover;

overflow: scroll;

background-repeat: no-repeat;

background-attachment: fixed;

color:black;

}
.credit-card-box .panel-title {

display: inline;

font-weight: bold;

.credit-card-box .form-control.error {

border-color: red;

outline: 0;

box-shadow: inset 0 1px 1px rgba(0,0,0,0.075),0 0 8px

rgba(255,0,0,0.6);

.credit-card-box label.error {

font-weight: bold;

color: red;

padding: 2px 8px;

margin-top: 2px;

.credit-card-box .payment-errors {

font-weight: bold;

color: red;

padding: 2px 8px;

margin-top: 2px;

.credit-card-box label {
display: block;

/* The old "center div vertically" hack */

.credit-card-box .display-table {

display: table;

.credit-card-box .display-tr {

display: table-row;

.credit-card-box .display-td {

display: table-cell;

vertical-align: middle;

width: 50%;

/* Just looks nicer */

.credit-card-box .panel-heading img {

min-width: 180px;

.footer{

padding-top: 70px;

padding-bottom: 0;

background-color: transparent;

color: #222;

text-align: center;
}

.nav-bar {

background-color: transparent;

.w-container {

margin-left: auto;

margin-right: auto;

max-width: 940px;

#nav{

background-color: transparent;

.logo{

padding-top: 8px;

.w-nav {

position: relative;

background: #dddddd;

z-index: 1000;

.w-nav-brand {

position: relative;

float: none;

text-decoration: none;
color: #333333;

.w-nav-overlay {

position: absolute;

overflow: hidden;

display: none;

top: 100%;

left: 0;

right: 0;

width: 100%;

body{

background-image:url(img/back5.png);

background-size: cover;

height: 100vh;

background-position: 0px 0px, 50% 50%;

.content-wrapper {

margin-top: 78px;

.w-container {

margin-left: auto;

margin-right: auto;

max-width: 940px;
}

</style>

<body>

<?php require_once "navbar.php";?>

<h1 style="text-align: center; font-family: sans-serif; background:

linear-gradient(to right,#E20D13, #F0E300, #A4C615,

#4363AB,#BE4A94,#E30922);-webkit-background-clip: text;-

webkit-text-fill-color: transparent;">COLDPLAY</h1>

<div class="container" style="padding-top: 5%;">

<div class="row">

<div class="col-md-4"></div>

<div class="col-md-4">

<!-- CREDIT CARD FORM STARTS HERE -->

<div class="panel panel-default credit-card-box">

<div class="panel-heading display-table" >

<div class="row display-tr" >

<h3 class="panel-title display-td" >Payment

Details</h3>

<div class="display-td" >

<img class="img-responsive pull-right"

src="http://i76.imgup.net/accepted_c22e0.png">

</div>
</div>

</div>

<div class="panel-body">

<form role="form" id="payment-form"

action="success.php" onsubmit="return checkForm(this);">

<div class="row">

<div class="col-xs-12">

<div class="form-group">

<label for="cardNumber">CARD

NUMBER</label>

<div class="input-group">

<input type="tel" class="form-control"

name="cardNumber" placeholder="Valid Card Number" id="num"

autocomplete="cc-number" required autofocus />

<span class="input-group-addon"><i

class="fa fa-credit-card"></i></span>

</div>

</div>

</div>

</div>

<div class="row">

<div class="col-xs-7 col-md-7">

<div class="form-group">
<label for="cardExpiry"><span class="hidden-

xs">EXPIRATION</span><span

class="visible-xs-inline">EXP</span> DATE</label>

<input

type="tel"

class="form-control"

name="cardExpiry"

placeholder="MMYY"

autocomplete="cc-exp"

required

/>

</div>

</div>

<div class="col-xs-5 col-md-5 pull-right">

<div class="form-group">

<label for="cardCVC">CV CODE</label>

<input

type="tel"

class="form-control"

name="cardCVC"

id="cvc";

placeholder="CVC";

autocomplete="off";

required
/>

</div>

</div>

</div>

<div class="row">

<div class="col-xs-12">

<div class="form-group">

<label for="name">CARD HOLDER

NAME</label>

<input type="text" class="form-control"

name="cardname" placeholder="Valid Card Holder Name"

required />

</div>

</div>

</div>

<div class="row">

<div class="col-xs-12">

<button class="btn btn-success btn-lg btn-block"

type="submit" style="background-color: #2675aed9;">Pay</button>

<a id="suc" href="success.php"></a>

</div>

</div>

<div class="row" style="display:none;">

<div class="col-xs-12">
<p class="payment-errors"></p>

</div>

</div>

</form>

</div>

</div>

<!-- CREDIT CARD FORM ENDS HERE -->

</div>

</div>

</div>

<?php require_once "footer.php";?>

<script type="text/javascript">

function checkForm(form){

var n=(document.getElementById("num").value.length);

var c=(document.getElementById("cvc").value.length);

if(n==16)

if(c==3)

return true;

else{

alert("Enter valid CVC");

return false;
}

else{

alert("Enter valid Card Number");

return false;

</script>

</body>

Journey with us Page:

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<title>UOWN</title>

<?php include "session.php";?>

<?php require_once "bootstrap.php";?>

<?php require_once "bootstrap1.php";?>

<link rel="stylesheet" href="magnific-popup/dist/magnific-

popup.css">
<script

src="https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"

></script>

<!-- Magnific Popup core JS file -->

<script

src="magnific-popup/dist/jquery.magnific-popup.js"></script>

<script>

jQuery(document).ready(function($) {

$(".fancybox").magnificPopup({type:'iframe',iframe: {

markup: '<div class="mfp-iframe-scaler">'+

'<div class="mfp-close"></div>'+

'<iframe class="mfp-iframe" frameborder="0"

allowfullscreen></iframe>'+

'<div class="mfp-title">Some caption</div>'+

'</div>',

patterns: {

youtube: {

index: 'youtube.com/',

id: 'v=',

src: 'http://www.youtube.com/embed/%id%?

rel=0&autoplay=1'

}});
});

</script>

<style type="text/css">

.nav-bar {

background-color: transparent;

.w-container {

margin-left: auto;

margin-right: auto;

max-width: 940px;

#nav{

background-color: transparent;

.logo{

padding-top: 8px;

.w-nav {

position: relative;

background: #dddddd;

z-index: 1000;

.w-nav-brand {
position: relative;

float: none;

text-decoration: none;

color: #333333;

.w-nav-overlay {

position: absolute;

overflow: hidden;

display: none;

top: 100%;

left: 0;

right: 0;

width: 100%;

body {

background-image: url(img/v.jpg);

background-size: cover;

overflow: fixed;

background-repeat: no-repeat;

background-attachment: fit;

.content-wrapper {
margin-top: 30px;

.w-container {

margin-left: auto;

margin-right: auto;

max-width: 900px;

.page-title {

margin-top: 0px;

margin-bottom: 86px;

font-size: 45px;

line-height: 51px;

font-weight: 300;

text-align: center;

text-transform: uppercase;

.footer {

padding-top: 43px;

padding-bottom: 43px;

background-color: transparent;

color: #222;

text-align: center;

@media screen and (max-width: 991px){


.w-container {

max-width: 728px !important;

.w-nav[data-collapse="medium"] .w-nav-menu {

display: none;

.nav-menu {

padding-top: 18px !important;

padding-bottom: 18px !important;

border-top: 1px solid #000 !important;

background-color: rgba(0, 0, 0, .85) !important;

.w-container {

max-width: 728px !important;

.logo{

padding-top: 8px !important;

width: 10% !important;

@media (max-width: 767px){


.logo{

padding-top: 8px !important;

width: 10% !important;

@media screen and (max-width: 479px){

.w-container {

max-width: none !important;

.logo{

padding-top: 8px !important;

width: 10% !important;

.row{

text-align: center;

.thumb{

width: 100%;

margin-bottom: 60px;

float: left;
}

.elastic{

max-width: 80%;

.title{

margin: 18px 0 10px;

font-family: sans-serif;

font-size: 18px;

line-height: 21px;

text-align: center;

color: white;

.timestamp{

height: 11px;

font-size: 11px;

letter-spacing: 1px;

line-height: 11px;

font-style: italic;

color: #636363;

text-align: center;

text-transform: uppercase;

.timestamp img {

display: inline;
margin-right: 3px;

margin-bottom: 1px;

.nav-link.w--current {

color: #fff;

text-decoration: none;

</style>

</head>

<body>

<?php require_once "navbar.php";?>

<div class="content-wrapper w-container">

<h1 class="page-title"><font style="vertical-align: inherit;"><font

style="vertical-align: inherit; background: linear-gradient(to

right,#E20D13, #F0E300, #A4C615, #4363AB,#BE4A94,#E30922);-

webkit-background-clip: text;-webkit-text-fill-color: transparent; font-

family: sans-serif;">People Share Their

Experience</font></font></h1>

</div>

<div class="w-container">

<div class="row">

<div class="col-md-4">

<a class="fancybox"

href="https://www.youtube.com/watch?v=2psxg4EY7l8">
<div class="thumb

videoThumb">

<div

class="videoThumbImage">

<div

class="hover"></div>

<div

class="playIcon"></div>

<img

class="elastic" src="img\sagor\g.jpg" alt="Nagarbaul James live">

</div>

<div

class="title">Prince Share's his experience with us</div>

<div>31st May,2014</div>

</div>

</a>

</div>

<div class="col-md-4">

<a class="fancybox"

href="https://www.youtube.com/watch?v=RN8pwEpPwJ0">

<div class="thumb

videoThumb">
<div

class="videoThumbImage">

<div

class="hover"></div>

<div

class="playIcon"></div>

<img

class="elastic" src="img\sagor\f.jpg" alt="Last live concert of Ayub

Bachchu at Rangpur">

</div>

<div

class="title">Anas Share's his experience with us</div>

<div>July 15,

2018</div>

</div>

</a>

</div>

<div class="col-md-4">

<a class="fancybox"

href="youtube.com/watch?v=NgI9flIu2Z4">

<div class="thumb

videoThumb">

<div

class="videoThumbImage">
<div

class="hover"></div>

<div

class="playIcon"></div>

<img

class="elastic" src="img\sagor\z.jpg" alt="Warfaze Concert">

</div>

<div

class="title">Our Dean Share's his experience with us</div>

<div>July 15,

2015</div>

</div>

</a>

</div>

</div>

</div>

</div>

<?php require_once "footer.php";?>

</body>
Signup Page:

<!DOCTYPE html>

<html>

<head>

<meta name="viewport" content="width=device-width, initial-

scale=1.0">

<title>UOWN</title>

<?php require_once "bootstrap1.php";?>

<script type="text/javascript">

function checkForm(form)

// validation fails if the input is blank

// regular expression to match only alphanumeric characters and

spaces

var r = /^[A-Za-z ]*$/;

var re = new RegExp("^(?=.*[a-z])(?=.*[A-Z])(?=.*[0-9])(?=.*[!

@#\$%\^&\*])(?=.{8,})");
// validation fails if the input doesn't match our regular expression

if(!r.test(form.first.value)) {

alert("Error: Input contains invalid characters!");

form.first.focus();

return false;

if(form.pwd1.value.length < 8)

alert("Error: Password must contain at least eight characters!");

form.pwd1.focus();

return false;

if(form.pwd1.value == form.first.value) {

alert("Error: Password must be different from Username!");

form.pwd1.focus();

return false;

if(!re.test(form.pwd1.value)) {

alert("Error: Input contains invalid password!");

form.first.focus();

return false;
}

// validation was successful

return true;

</script>

<style>

a{

color: #124c76;

text-decoration: none;

.new{

margin-top: 16px;

padding: 15px 20px;

text-align: center;

.head{

text-align: center;

.login{
margin: 0 auto;

width: 340px;

label{

color: white;

.bd1{

background-color: transparent;

font-size: 14px;

padding: 20px;

.btn-primary {

background-color: #2675aed9;

form label {

display: block;

margin-bottom: 7px;

input{

margin-bottom: 15px;

margin-top: 5px;

body{
background-image: url("img/back4.png");

background-repeat: no-repeat;

color:white;

.label-link{

margin-left: 7em;

.form-control{

background-color: #ffffffc2;

p{

color: #ffffffba;

.logo{

width: 146px;

height: 18px;

background: url("img/logo.png");

@keyframes shake {

10%, 90% {

transform: translate3d(-1px, 0, 0);

}
20%, 80% {

transform: translate3d(2px, 0, 0);

30%, 50%, 70% {

transform: translate3d(-4px, 0, 0);

40%, 60% {

transform: translate3d(4px, 0, 0);

.inc{

animation-name: shake;

animation-duration: 1s;

text-align: center;

color: red;

</style>

</head>

<body>

<div class="login">
<form name="form1" action="Sign up.php"

method="POST" onsubmit="return checkForm(this);">

<div class="head">

<h1><b>Sign Up</b></h1>

</div>

<div class="bd1">

<?php

if(isset($_REQUEST["msg"])<>"")

echo "<h4 class='inc'>".$_REQUEST["msg"]."</h4>";

?>

<label for="signup">Name</label>

<input type="text" name="first"

id="first_name" class="form-control input-block"

placeholder="Enter Name" tabindex="0" autocapitalize="off"

autocorrect="off" autofocus="autofocus" required="Name">

<label for="user">Email</label>

<input type="email" name="mail"

id="login_field" class="form-control input-block"

autocapitalize="off" autocorrect="off" required="Enter Email"

placeholder="Enter Email ID">

<label for="password">Password</label>
<input type="password" name="pwd1"

id="password" class="form-control form-control input-block"

required="Enter Password" placeholder="Enter Password">

<span><small><i>Password must contain at

least eight character, including uppercase, lowercase letters, special

charater and number<i><sup>*</sup></small></span>

<input type="submit" name="commit"

value="Sign up" class="btn btn-primary btn-block" data-disable-

with="Signing in…">

</div>

</form>

<p class="new">

"Already have an account"<br>

<a data-ga-click="Sign in, switch to sign in"

href="Sign in.php" style="color: white;">Sign In</a>

</p>

</div>

</body>

</html>
Sign In Page:

<!DOCTYPE html>

<html>

<head>

<meta name="viewport" content="width=device-width, initial-

scale=1.0">

<title>UOWN</title>

<?php require_once "bootstrap1.php";?>

<style>

a{

color: #2675ae;

text-decoration: none;

.new{

margin-top: 16px;

padding: 15px 20px;

text-align: center;

.head{

text-align: center;

}
.login{

margin: 0 auto;

width: 340px;

label{

color: white;

.bd1{

background-color: transparent;

font-size: 14px;

padding: 20px;

.btn-primary {

background-color: #2675aed9;

form label {

display: block;

margin-bottom: 7px;

input{

margin-bottom: 15px;

margin-top: 5px;
}

body{

background-image: url("img/n.jpg");

background-size: auto;

background-repeat: no-repeat;

color: white;

.label-link{

margin-left: 7em;

.form-control{

background-color: #ffffffc2;

p{

color: #ffffffba;

@keyframes shake {

10%, 90% {

transform: translate3d(-1px, 0, 0);

20%, 80% {

transform: translate3d(2px, 0, 0);


}

30%, 50%, 70% {

transform: translate3d(-4px, 0, 0);

40%, 60% {

transform: translate3d(4px, 0, 0);

.inc{

animation-name: shake;

animation-duration: 1s;

text-align: center;

color: red;

</style>

</head>

<body>

<div class="login">

<form action="signin.php" method="POST">

<div class="head">

<h1><b>Sign In</b></h1>
</div>

<div class="bd1">

<?php

if(isset($_REQUEST["msg"])<>"")

echo "<h4 class='inc'>".

$_REQUEST["msg"]."</h4>";

?>

<label for="login">Email</label>

<input type="email" name="mai"

id="login_field" class="form-control input-block" tabindex="1"

autofocus="autofocus" required="Enter Email" placeholder="Enter

Email ID" value="<?php

if (isset($_COOKIE['mail']) &&

isset($_COOKIE['password'])) {

echo $_COOKIE['mail'];

else

echo "";

}
?>">

<label for="password">Password</label>

<input type="password" name="pwd"

id="password" placeholder="Enter Password" class="form-control

form-control input-block" tabindex="2" required="Enter Password"

value="<?php

if (isset($_COOKIE['mail']) &&

isset($_COOKIE['password'])) {

echo $_COOKIE['password'];

else

echo "";

?>">

<input type="submit" name="commit"

value="Sign in" tabindex="3" class="btn btn-primary btn-block"

data-disable-with="Signing in…">

</div>

</form>

<p class="new">
"New to site"<i>

<a data-ga-click="Sign in, switch to sign up"

href="Signup.php" style="color: white;">Create an

account</a></i><br>OR<br><i>

<a href="index.php" style="color: white;">Skip

Sign In</a></i>

</p>

</div>

</body>

</html>

Footer Page:

<div class="footer">

<div class="w-container">

<a class="footer-link w-inline-block"

href="http://www.facebook.com/shagor.noman" target="_blank">

<img id="fot"

src="http://uploads.webflow.com/560eb94ab52962bd77dfcf14/56152

593b79d0bd36c914521_social-03-white.svg" width="23">

</a>

<a class="footer-link w-inline-block"

href="https://twitter.com/Abdullah_Shagor" target="_blank">
<img

src="http://uploads.webflow.com/560eb94ab52962bd77dfcf14/56152

5930c0daecc11081899_social-18-white.svg" width="23">

</a>

<a class="footer-link w-inline-block"

href="https://www.youtube.com/channel/UCt29-

7Gnhlm9gKQYM_SWpQQ?view_as=subscriber" target="_blank">

<img

src="http://uploads.webflow.com/560eb94ab52962bd77dfcf14/56152

593cb7d6c033386b191_social-16-white.svg" width="23">

</a>

<div class="footer-text"><font style="vertical-align:

inherit;"><font style="vertical-align: inherit;">This site uses cookies.

By continuing to browse the site you are agreeing to our use of

cookies.&nbsp;</font></font></div>

</div>

</div>

Navbar Page:

<div class="nav-bar w-nav" id="nav" data-animation="default" data-

collapse="medium" data-contain="1" data-duration="400">

<div class="w-container">

<a class="brand-link w-nav-brand w--current"

href="index.php">
<img class="logo" src="img\logo1.png" style="width:

5%">

</a>

<nav class="nav-menu w-nav-menu" role="navigation"

style="transform: translateY(0px) translateX(0px);">

<a class="nav-link w-nav-link" href="videos.php">Journey

With Us</a>

<a class="nav-link w-nav-link" href="tour.php">Book

Car</a>

<?php

if(isset($_SESSION['mail']))

echo '<a class="nav-link w-nav-link"

href="signout.php">Sign Out</a>';

else{

echo '<a class="nav-link w-nav-link" href="Sign

in.php">Sign In</a>';

?>

</nav>
<div class="menu-button w-clearfix w-nav-button">

<div class="menu-text">MENU</div>

<div class="menu-icon w-icon-nav-menu"></div>

</div>

</div>

<div class="w-nav-overlay" data-wf-ignore="" style="display:

none;"></div>

</div>

Session Page:

<?php

session_start();

if (isset($_SESSION['mail'])) {

$now = time();

// checking the time now when home page starts

if($now > $_SESSION['expire'])

session_destroy();

header("Location:Sign in.php?msg=Session expired sign in

again!");
}

//starting this else one [else1]

?>

Success Page:

<!DOCTYPE html>

<html>

<head>

<meta name="viewport" content="width=device-width, initial-

scale=1.0">

<title>UOWN</title>

<?php require_once "bootstrap1.php";?>

<style>

a{

color: #38acff;

.head{
text-align: center;

.login{

margin: 0 auto;

width: 340px;

body {

background-image: url(img/ja.jpg);

background-size: cover;

overflow: scroll;

background-repeat: no-repeat;

background-attachment: fixed;

color: white;

</style>

</head>

<body>

<div class="login" style="padding-top: 2%;">

<form action="home1.php" style="border: 1px solid;">


<div class="head">

<h1><b>Awesome!</b></h1>

</div>

<div class="bd1" style="text-align: center; padding:

14%;">

<p style="padding-bottom: 10%;">Your

transaction has been successfull. <br>Check your email for booking

details.</P>

<a href="index.php">Click here to goto

Home Page.</a>

</div>

</form>

</div>

</body>

</html>

BootStrap:

<meta content="width=device-width, initial-scale=1"

name="viewport">

<meta content="Webflow" name="generator">

<link

href="https://daks2k3a4ib2z.cloudfront.net/560eb94ab52962bd77dfcf
14/css/template-method.webflow.cd9516ad2.css" rel="stylesheet"

type="text/css">

<script

src="https://ajax.googleapis.com/ajax/libs/webfont/1.4.7/webfont.js">

</script>

<link rel="stylesheet"

href="http://fonts.googleapis.com/css?

family=Roboto:300,regular,500%7CRoboto+Slab:regular">

<script type="text/javascript">WebFont.load({

google: {

families: ["Roboto:300,regular,500","Roboto

Slab:regular"]

});

</script>

<script

src="https://daks2k3a4ib2z.cloudfront.net/0globals/modernizr-

2.7.1.js" type="text/javascript"></script>

<link href="img/logo1.png" rel="shortcut icon"

type="image/x-icon">

<link

href="https://daks2k3a4ib2z.cloudfront.net/img/webclip.png"

rel="apple-touch-icon">
<script

src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.0/jquery.min.js"

type="text/javascript"></script>

<script

src="https://daks2k3a4ib2z.cloudfront.net/560eb94ab52962bd77dfcf1

4/js/webflow.57f4ffb2a.js" type="text/javascript"></script>
System Security:

Security of a computer system is a crucial task. It is a process of ensuring confidentiality and


integrity of the OS.
A system is said to be secure if its resources are used and accessed as intended under all the
circumstances, but no system can guarantee absolute security from several of the various
malicious threats and unauthorized access.

Security of a system can be threatened via two violations:

● Threat: A program which has the potential to cause serious damage to the system.
● Attack: An attempt to break security and make unauthorized use of an asset.

Security violations affecting the system can be categorized as malicious and accidental.
Malicious threats, as the name suggests are a kind of harmful computer code or web script
designed to create system vulnerabilities leading to back doors and security breaches.
Accidental Threats, on the other hand, are comparatively easier to be protected against.
Example: Denial of Service DDoS attack.

Security can be compromised via any of the breaches mentioned:

● Breach of confidentiality: This type of violation involves the unauthorized reading


of data.
● Breach of integrity: This violation involves unauthorized modification of data.

● Breach of availability: It involves unauthorized destruction of data.


● Theft of service: It involves unauthorized use of resources.
● Denial of service: It involves preventing legitimate use of the system. As mentioned
before, such attacks can be accidental in nature.

Security System Goals –


Henceforth, based on the above breaches, the following security goals are aimed:

1. Integrity:
The objects in the system mustn’t be accessed by any unauthorized user & any user
not having sufficient rights should not be allowed to modify the important system
files and resources.
2. Secrecy:
The objects of the system must be accessible only to a limited number of authorized
users. Not everyone should be able to view the system files.
3. Availability:
All the resources of the system must be accessible to all the authorized users i.e only
one user/process should not have the right to hog all the system resources. If such
kind of situation occurs, denial of service could happen. In this kind of situation, a
malware might hog the resources for itself & thus preventing the legitimate processes
from accessing the system resources.

Threats can be classified into the following two categories:

1. Program Threats:
A program written by a cracker to hijack the security or to change the behaviour of a
normal process.
2. System Threats:
These threats involve the abuse of system services. They strive to create a situation in
which operating-system resources and user files are misused. They are also used as a
medium to launch program threats.

Types of Program Threats –

1. Virus:
An infamous threat, known most widely. It is a self-replicating and a malicious thread
which attaches itself to a system file and then rapidly replicates itself, modifying and
destroying essential files leading to a system breakdown.

Further, Types of computer viruses can be described briefly as follows:


– file/parasitic – appends itself to a file
– boot/memory – infects the boot sector
– macro – written in a high-level language like VB and affects MS Office files
– source code – searches and modifies source codes
– polymorphic – changes in copying each time
– encrypted – encrypted virus + decrypting code
– stealth – avoids detection by modifying parts of the system that can be used to
detect it, like the read system
call
– tunneling – installs itself in the interrupt service routines and device drivers
– multipartite – infects multiple parts of the system

2. Trojan Horse:
A code segment that misuses its environment is called a Trojan Horse. They seem to
be attractive and harmless cover program but are a really harmful hidden program
which can be used as the virus carrier. In one of the versions of Trojan, User is fooled
to enter its confidential login details on an application. Those details are stolen by a
login emulator and can be further used as a way of information breaches.

Another variance is Spyware, Spyware accompanies a program that the user has
chosen to install and downloads ads to display on the user’s system, thereby creating
pop-up browser windows and when certain sites are visited by the user, it captures
essential information and sends it over to the remote server. Such attacks are also
known as Convert Channels.
3. Trap Door:
The designer of a program or system might leave a hole in the software that only he is
capable of using, the Trap Door works on similar principles. Trap Doors are quite
difficult to detect as to analyze them, one needs to go through the source code of all
the components of the system.

4. Logic Bomb:
A program that initiates a security attack only under a specific situation.

Types of System Threats –


Aside from the program threats, various system threats are also endangering the security of
our system:

1. Worm:
An infection program which spreads through networks. Unlike a virus, they target mainly
LANs. A computer affected by a worm attacks the target system and writes a small program
“hook” on it. This hook is further used to copy the worm to the target computer. This process
repeats recursively, and soon enough all the systems of the LAN are affected. It uses the
spawn mechanism to duplicate itself. The worm spawns copies of itself, using up a majority
of system resources and also locking out all other processes.

The basic functionality of a the worm can be represented as:

2. Port Scanning:
It is a means by which the cracker identifies the vulnerabilities of the system to attack. It is an
automated process which involves creating a TCP/IP connection to a specific port. To protect
the identity of the attacker, port scanning attacks are launched from Zombie Systems, that is
systems which were previously independent systems that are also serving their owners while
being used for such notorious purposes.

3. Denial of Service:
Such attacks aren’t aimed for the purpose of collecting information or destroying system
files. Rather, they are used for disrupting the legitimate use of a system or facility.
These attacks are generally network based. They fall into two categories:
– Attacks in this first category use so many system resources that no useful work can be
performed.

For example, downloading a file from a website that proceeds to use all available CPU time.
– Attacks in the second category involves disrupting the network of the facility. These attacks
are a result of the abuse of some fundamental TCP/IP principles.
the fundamental functionality of TCP/IP.

Security Measures Taken –


To protect the system, Security measures can be taken at the following levels:
● Physical:
The sites containing computer systems must be physically secured against armed and
malicious intruders. The workstations must be carefully protected.
● Human:
Only appropriate users must have the authorization to access the system.
Phishing(collecting confidential information) and Dumpster Diving(collecting basic
information so as to gain unauthorized access) must be avoided.
● Operating system:
The system must protect itself from accidental or purposeful security breaches.
● Networking System:
Almost all of the information is shared between different systems via a network.
Intercepting these data could be just as harmful as breaking into a computer.
Henceforth, Network should be properly secured against such attacks.

Usually, Anti Malware programs are used to periodically detect and remove such viruses and
threats. Additionally, to protect the system from the Network Threats, Firewall is also be
used.

As computers and other digital devices have become essential to business and commerce,
they have also increasingly become a target for attacks. In order for a company or an
individual to use a computing device with confidence, they must first be assured that the
device is not compromised in any way and that all communications will be secure. In this
chapter, we will review the fundamental concepts of information systems security and discuss
some of the measures that can be taken to mitigate security threats. We will begin with an
overview focusing on how organizations can stay secure. Several different measures that a
company can take to improve security will be discussed. We will then follow up by reviewing
security precautions that individuals can take in order to secure their personal computing
environment.
The security triad

The Information Security Triad: Confidentiality, Integrity, Availability (CIA)

Confidentiality
When protecting information, we want to be able to restrict access to those who are allowed
to see it; everyone else should be disallowed from learning anything about its contents. This
is the essence of confidentiality. For example, federal law requires that universities restrict
access to private student information. The university must be sure that only those who are
authorized have access to view the grade records.

Integrity
Integrity is the assurance that the information being accessed has not been altered and truly
represents what is intended. Just as a person with integrity means what he or she says and can
be trusted to consistently represent the truth, information integrity means information truly
represents its intended meaning. Information can lose its integrity through malicious intent,
such as when someone who is not authorized makes a change to intentionally misrepresent
something. An example of this would be when a hacker is hired to go into the university’s
system and change a grade.
Integrity can also be lost unintentionally, such as when a computer power surge corrupts a
file or someone authorized to make a change accidentally deletes a file or enters incorrect
information.

Availability
Information availability is the third part of the CIA triad. Availability means that information
can be accessed and modified by anyone authorized to do so in an appropriate timeframe.
Depending on the type of information, appropriate timeframe can mean different things. For
example, a stock trader needs information to be available immediately, while a sales person
may be happy to get sales numbers for the day in a report the next morning. Companies such
as Amazon.com will require their servers to be available twenty-four hours a day, seven days
a week. Other companies may not suffer if their web servers are down for a few minutes once
in a while.
Tools for Information Security
In order to ensure the confidentiality, integrity, and availability of information, organizations
can choose from a variety of tools. Each of these tools can be utilized as part of an overall
information-security policy, which will be discussed in the next section.

Authentication
The most common way to identify someone is through their physical appearance, but how do
we identify someone sitting behind a computer screen or at the ATM? Tools for
authentication are used to ensure that the person accessing the information is, indeed, who
they present themselves to be.
Authentication can be accomplished by identifying someone through one or more of three
factors: something they know, something they have, or something they are. For example, the
most common form of authentication today is the user ID and password. In this case, the
authentication is done by confirming something that the user knows (their ID and password).
But this form of authentication is easy to compromise (see sidebar) and stronger forms of
authentication are sometimes needed. Identifying someone only by something they have,
such as a key or a card, can also be problematic. When that identifying token is lost or stolen,
the identity can be easily stolen. The final factor, something you are, is much harder to
compromise. This factor identifies a user through the use of a physical characteristic, such as
an eye-scan or fingerprint. Identifying someone through their physical characteristics is called
biometrics.
A more secure way to authenticate a user is to do multi-factor authentication. By combining
two or more of the factors listed above, it becomes much more difficult for someone to
misrepresent themselves. An example of this would be the use of an RSA SecurID token. The
RSA device is something you have, and will generate a new access code every sixty seconds.
To log in to an information resource using the RSA device, you combine something you
know, a four-digit PIN, with the code generated by the device. The only way to properly
authenticate is by both knowing the code and having the RSA device.
Access Control
Once a user has been authenticated, the next step is to ensure that they can only access the
information resources that are appropriate. This is done through the use of access control.
Access control determines which users are authorized to read, modify, add, and/or delete
information. Several different access control models exist. Here we will discuss two: the
access control list (ACL) and role-based access control (RBAC).
For each information resource that an organization wishes to manage, a list of users who have
the ability to take specific actions can be created. This is an access control list, or ACL. For
each user, specific capabilities are assigned, such as read, write, delete, or add. Only users
with those capabilities are allowed to perform those functions. If a user is not on the list, they
have no ability to even know that the information resource exists.
ACLs are simple to understand and maintain. However, they have several drawbacks. The
primary drawback is that each information resource is managed separately, so if a security
administrator wanted to add or remove a user to a large set of information resources, it would
be quite difficult. And as the number of users and resources increase, ACLs become harder to
maintain. This has led to an improved method of access control, called role-based access
control, or RBAC. With RBAC, instead of giving specific users access rights to an
information resource, users are assigned to roles and then those roles are assigned the access.
This allows the administrators to manage users and roles separately, simplifying
administration and, by extension, improving security.
Comparison of ACL and RBAC (click to enlarge)

Encryption
Many times, an organization needs to transmit information over the Internet or transfer it on
external media such as a CD or flash drive. In these cases, even with proper authentication
and access control, it is possible for an unauthorized person to get access to the data.
Encryption is a process of encoding data upon its transmission or storage so that only
authorized individuals can read it. This encoding is accomplished by a computer program,
which encodes the plain text that needs to be transmitted; then the recipient receives
the cipher text and decodes it (decryption). In order for this to work, the sender and receiver
need to agree on the method of encoding so that both parties can communicate properly. Both
parties share the encryption key, enabling them to encode and decode each other’s messages.
This is called symmetric key encryption. This type of encryption is problematic because the
key is available in two different places.
An alternative to symmetric key encryption is public key encryption. In public key
encryption, two keys are used: a public key and a private key. To send an encrypted message,
you obtain the public key, encode the message, and send it. The recipient then uses the
private key to decode it. The public key can be given to anyone who wishes to send the
recipient a message. Each user simply needs one private key and one public key in order to
secure messages. The private key is necessary in order to decrypt something sent with the
public key.
Public key encryption (click for larger diagram)

Sidebar: Password Security


So why is using just a simple user ID/password not considered a secure method of
authentication? It turns out that this single-factor authentication is extremely easy to
compromise. Good password policies must be put in place in order to ensure that passwords
cannot be compromised. Below are some of the more common policies that organizations
should put in place.

● Require complex passwords. One reason passwords are compromised is that they can
be easily guessed. A recent study found that the top three passwords people used in
2012 were password, 123456 and 12345678.[1] A password should not be simple, or a
word that can be found in a dictionary. One of the first things a hacker will do is try to
crack a password by testing every term in the dictionary! Instead, a good password
policy is one that requires the use of a minimum of eight characters, and at least one
upper-case letter, one special character, and one number.
● Change passwords regularly. It is essential that users change their passwords on a
regular basis. Users should change their passwords every sixty to ninety days,
ensuring that any passwords that might have been stolen or guessed will not be able to
be used against the company.
● Train employees not to give away passwords. One of the primary methods that is used
to steal passwords is to simply figure them out by asking the users or administrators.
Pretexting occurs when an attacker calls a helpdesk or security administrator and
pretends to be a particular authorized user having trouble logging in. Then, by
providing some personal information about the authorized user, the attacker convinces
the security person to reset the password and tell him what it is. Another way that
employees may be tricked into giving away passwords is through e-mail phishing.
Phishing occurs when a user receives an e-mail that looks as if it is from a trusted
source, such as their bank, or their employer. In the e-mail, the user is asked to click a
link and log in to a website that mimics the genuine website and enter their ID and
password, which are then captured by the attacker.

Backups
Another essential tool for information security is a comprehensive backup plan for the entire
organization. Not only should the data on the corporate servers be backed up, but individual
computers used throughout the organization should also be backed up. A good backup plan
should consist of several components.

● A full understanding of the organizational information resources. What information


does the organization actually have? Where is it stored? Some data may be stored on
the organization’s servers, other data on users’ hard drives, some in the cloud, and
some on third-party sites. An organization should make a full inventory of all of the
information that needs to be backed up and determine the best way back it up.
● Regular backups of all data. The frequency of backups should be based on how
important the data is to the company, combined with the ability of the company to
replace any data that is lost. Critical data should be backed up daily, while less critical
data could be backed up weekly.
● Offsite storage of backup data sets. If all of the backup data is being stored in the
same facility as the original copies of the data, then a single event, such as an
earthquake, fire, or tornado, would take out both the original data and the backup! It is
essential that part of the backup plan is to store the data in an offsite location.
● Test of data restoration. On a regular basis, the backups should be put to the test by
having some of the data restored. This will ensure that the process is working and will
give the organization confidence in the backup plan.

Besides these considerations, organizations should also examine their operations to determine
what effect downtime would have on their business. If their information technology were to
be unavailable for any sustained period of time, how would it impact the business?
Additional concepts related to backup include the following:

● Universal Power Supply (UPS). A UPS is a device that provides battery backup to
critical components of the system, allowing them to stay online longer and/or
allowing the IT staff to shut them down using proper procedures in order to prevent
the data loss that might occur from a power failure.
● Alternate, or “hot” sites. Some organizations choose to have an alternate site where an
exact replica of their critical data is always kept up to date. When the primary site
goes down, the alternate site is immediately brought online so that little or no
downtime is experienced.

As information has become a strategic asset, a whole industry has sprung up around the
technologies necessary for implementing a proper backup strategy. A company can contract
with a service provider to back up all of their data or they can purchase large amounts of
online storage space and do it themselves. Technologies such as storage area networks and
archival systems are now used by most large businesses.

Firewalls
Network configuration with firewalls, IDS, and a DMZ. Click to enlarge.

Another method that an organization should use to increase security on its network is a
firewall. A firewall can exist as hardware or software (or both). A hardware firewall is a
device that is connected to the network and filters the packets based on a set of rules. A
software firewall runs on the operating system and intercepts packets as they arrive to a
computer. A firewall protects all company servers and computers by stopping packets from
outside the organization’s network that do not meet a strict set of criteria. A firewall may also
be configured to restrict the flow of packets leaving the organization. This may be done to
eliminate the possibility of employees watching YouTube videos or using Facebook from a
company computer.
Some organizations may choose to implement multiple firewalls as part of their network
security configuration, creating one or more sections of their network that are partially
secured. This segment of the network is referred to as a DMZ, borrowing the term
demilitarized zone from the military, and it is where an organization may place resources that
need broader access but still need to be secured.
Intrusion Detection Systems
Another device that can be placed on the network for security purposes is an intrusion
detection system, or IDS. An IDS does not add any additional security; instead, it provides
the functionality to identify if the network is being attacked. An IDS can be configured to
watch for specific types of activities and then alert security personnel if that activity occurs.
An IDS also can log various types of traffic on the network for analysis later. An IDS is an
essential part of any good security setup.

Sidebar: Virtual Private Networks


Using firewalls and other security technologies, organizations can effectively protect many of
their information resources by making them invisible to the outside world. But what if an
employee working from home requires access to some of these resources? What if a
consultant is hired who needs to do work on the internal corporate network from a remote
location? In these cases, a virtual private network (VPN) is called for.
A VPN allows a user who is outside of a corporate network to take a detour around the
firewall and access the internal network from the outside. Through a combination of software
and security measures, this lets an organization allow limited access to its networks while at
the same time ensuring overall security.

Physical Security
An organization can implement the best authentication scheme in the world, develop the best
access control, and install firewalls and intrusion prevention, but its security cannot be
complete without implementation of physical security. Physical security is the protection of
the actual hardware and networking components that store and transmit information
resources. To implement physical security, an organization must identify all of the vulnerable
resources and take measures to ensure that these resources cannot be physically tampered
with or stolen. These measures include the following.

● Locked doors: It may seem obvious, but all the security in the world is useless if an
intruder can simply walk in and physically remove a computing device. High-value
information assets should be secured in a location with limited access.
● Physical intrusion detection: High-value information assets should be monitored
through the use of security cameras and other means to detect unauthorized access to
the physical locations where they exist.
● Secured equipment: Devices should be locked down to prevent them from being
stolen. One employee’s hard drive could contain all of your customer information, so
it is essential that it be secured.
● Environmental monitoring: An organization’s servers and other high-value equipment
should always be kept in a room that is monitored for temperature, humidity, and
airflow. The risk of a server failure rises when these factors go out of a specified
range.
● Employee training: One of the most common ways thieves steal corporate information
is to steal employee laptops while employees are traveling. Employees should be
trained to secure their equipment whenever they are away from the office.

Security Policies
Besides the technical controls listed above, organizations also need to implement security
policies as a form of administrative control. In fact, these policies should really be a starting
point in developing an overall security plan. A good information-security policy lays out the
guidelines for employee use of the information resources of the company and provides the
company recourse in the case that an employee violates a policy.
According to the SANS Institute, a good policy is “a formal, brief, and high-level statement
or plan that embraces an organization’s general beliefs, goals, objectives, and acceptable
procedures for a specified subject area.” Policies require compliance; failure to comply with a
policy will result in disciplinary action. A policy does not lay out the specific technical
details, instead it focuses on the desired results. A security policy should be based on the
guiding principles of confidentiality, integrity, and availability.[2]
A good example of a security policy that many will be familiar with is a web use policy. A
web use policy lays out the responsibilities of company employees as they use company
resources to access the Internet. A good example of a web use policy is included in Harvard
University’s “Computer Rules and Responsibilities” policy, which can be found here.
A security policy should also address any governmental or industry regulations that apply to
the organization. For example, if the organization is a university, it must be aware of the
Family Educational Rights and Privacy Act (FERPA), which restricts who has access to
student information. Health care organizations are obligated to follow several regulations,
such as the Health Insurance Portability and Accountability Act (HIPAA).
A good resource for learning more about security policies is the SANS Institute’s Information
Security Policy Page.

Sidebar: Mobile Security


As the use of mobile devices such as smartphones and tablets proliferates, organizations must
be ready to address the unique security concerns that the use of these devices bring. One of
the first questions an organization must consider is whether to allow mobile devices in the
workplace at all. Many employees already have these devices, so the question becomes:
Should we allow employees to bring their own devices and use them as part of their
employment activities? Or should we provide the devices to our employees? Creating a
BYOD (“Bring Your Own Device”) policy allows employees to integrate themselves more
fully into their job and can bring higher employee satisfaction and productivity. In many
cases, it may be virtually impossible to prevent employees from having their own
smartphones or iPads in the workplace. If the organization provides the devices to its
employees, it gains more control over use of the devices, but it also exposes itself to the
possibility of an administrative (and costly) mess.
Mobile devices can pose many unique security challenges to an organization. Probably one of
the biggest concerns is theft of intellectual property. For an employee with malicious intent, it
would be a very simple process to connect a mobile device either to a computer via the USB
port, or wirelessly to the corporate network, and download confidential data. It would also be
easy to secretly take a high-quality picture using a built-in camera.
When an employee does have permission to access and save company data on his or her
device, a different security threat emerges: that device now becomes a target for thieves.
Theft of mobile devices (in this case, including laptops) is one of the primary methods that
data thieves use.
So what can be done to secure mobile devices? It will start with a good policy regarding their
use. According to a 2013 SANS study, organizations should consider developing a mobile
device policy that addresses the following issues: use of the camera, use of voice recording,
application purchases, encryption at rest, Wi-Fi autoconnect settings, bluetooth settings, VPN
use, password settings, lost or stolen device reporting, and backup. [3]
Besides policies, there are several different tools that an organization can use to mitigate
some of these risks. For example, if a device is stolen or lost, geolocation software can help
the organization find it. In some cases, it may even make sense to install remote data-removal
software, which will remove data from a device if it becomes a security risk.

Usability
When looking to secure information resources, organizations must balance the need for
security with users’ need to effectively access and use these resources. If a system’s security
measures make it difficult to use, then users will find ways around the security, which may
make the system more vulnerable than it would have been without the security measures!
Take, for example, password policies. If the organization requires an extremely long
password with several special characters, an employee may resort to writing it down and
putting it in a drawer since it will be impossible to memorize.
Biblography:
www.stackoverflow.com
www.hackerearth.com
www.hackerrank.com
www.codechef.com
www.geekforgeeks.com
www.free-css.com
www.templatemo.com
Future Scope:
The car rental industry is growing very fast and demand for this industry has been increased
globally in the past few years. The global car rental industry looks good and seems so many
opportunities for this sector in the future. With the increase of national and international
tourists in different countries, the industry is expecting more growth and bright car rental
business opportunities.

For most of the travelers, renting a car is one of the easiest and cost-effective solution to
travel. You can choose your preferred car and cover the distance you want. Often Car Rental
companies offer great deals and discounts which can save money for you. Also by renting a
car, you can enjoy a convenient journey.

These days most of the people prefer car rentals as one of their favorite mode of transport.
With number of vehicle options like luxury cars, economy cars, sports vehicles, multi utility
vehicles, etc, car rental companies are making it available for every customer.

Conclusions and Recommendations:

The entire project has been developed and deployed as per the requirements

Stated by the user, it is found to be bug free as per the testing standards that is
implemented. Any specification-untraced errors will be concentrated in the
coming versions, which are planned to be developed in near future. The system
at present does not take care off the money payment methods, as the
consolidated constructs need SSL standards and are critically to be initiated in
the first face; the application of the credit card transactions is applied as a
developmental phase in the coming days. The system needs more elaborative
technicality for its inception and evolution.

You might also like