SlideShare una empresa de Scribd logo
1 de 14
E-Commerce & Web Solution
Online Shopping mall
Group members
Md.Ramiz Uddin
Md.Reduanur Rahman Rafi
Contents will covered within
this session
1.Project overview with PPT
2. Showing demo product live on browser
3.Submit report.
We proposed for
A system in which will include the following features
• Business-to-Consumer (B2C)
• Consumer-to-consumer (C2C)
• CMS for all sorts of users
• Custom search
What we have achieved ?
1.Very user friendly interface.
2.A very useful project architecture.
3.Strong security system
4.Clean code
User experience Design
1.Easy Navigation
- The navigation is not hazy just added the necessary
pages in the navigation bar.
- User need not to round up here and there for their
desired product.
- Easy to crate account
- Only few information needed to create account.
2.Supper easy management system.
- Just do everything in one click
Security system in detail
SQL injection
How does hackers inject bad thing lets have an
example.
The most common thing the hacker do first is bypassing
how dose it works ?
Lets have a look on our sql query for a login system
$query="select username,pass from users where
username='$uname' and password='$passwrd' limit 0,1";
Security system Continued
Hackers generally perform bypassing like this
Username : ' or ''='
Password : ' or ''=‘
Then the query looks like
select username, pass from users where username='' or
''='' and password='' or ''='' limit 0,1;
To get ride of this we took 2 steps
First one is to validate the form so that user could not enter
any special character.
Then we used PDO
Which contains prepare function to execute query.
Project Architecture
Project Architecture
Project Architecture
How does it works ?
User’s
request • Frontend
validation
controller
• Check valid
request
• Find model
Model
• find data
• Save data
Project Architecture
Example of controlling a process
Complete system at a glance
Search with
product name
Know price limit
View product
and order
View shop
Bring products
with shops
B2C
Complete system at a glance
C2C
• Buy and
sell
• Find
ads
• Create
ads
• Create
account
Product
list
Search
Product
Get seller
info
Find
categories
Let’s Move on towards demo

Más contenido relacionado

La actualidad más candente

Srs online shoping
Srs online shopingSrs online shoping
Srs online shopingAbdul Saboor
 
Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shoppingSandeep Bittu
 
Online Mobile Shopping
Online Mobile ShoppingOnline Mobile Shopping
Online Mobile ShoppingPanchal Chetan
 
Shop management system
Shop management systemShop management system
Shop management systemBUBT
 
Online Shopping System
Online Shopping SystemOnline Shopping System
Online Shopping SystemKusum Sankhala
 
Online shopping system (E-commerce)
Online shopping system (E-commerce)Online shopping system (E-commerce)
Online shopping system (E-commerce)Sarp Infotech
 
business marketing assignment
business marketing assignmentbusiness marketing assignment
business marketing assignmentNitesh Balraju
 
Thefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRMThefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRMalekswatch
 

La actualidad más candente (11)

Srs online shoping
Srs online shopingSrs online shoping
Srs online shoping
 
E commerce
E commerceE commerce
E commerce
 
IBN CRM
IBN CRM IBN CRM
IBN CRM
 
Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shopping
 
Online Mobile Shopping
Online Mobile ShoppingOnline Mobile Shopping
Online Mobile Shopping
 
Shop management system
Shop management systemShop management system
Shop management system
 
My ppt
My pptMy ppt
My ppt
 
Online Shopping System
Online Shopping SystemOnline Shopping System
Online Shopping System
 
Online shopping system (E-commerce)
Online shopping system (E-commerce)Online shopping system (E-commerce)
Online shopping system (E-commerce)
 
business marketing assignment
business marketing assignmentbusiness marketing assignment
business marketing assignment
 
Thefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRMThefloors - Real Estate Planing and Management CRM
Thefloors - Real Estate Planing and Management CRM
 

Destacado

'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...Grant Goddard
 
Commemorazione Craxi 2012[1]
Commemorazione  Craxi 2012[1]Commemorazione  Craxi 2012[1]
Commemorazione Craxi 2012[1]Michele Simone
 
Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark
 
Los materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informaticaLos materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informaticaChristian Paredes Arroyo
 
Things Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small BusinessThings Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small BusinessIntuit Inc.
 
Errezeta txantiloia
Errezeta txantiloiaErrezeta txantiloia
Errezeta txantiloiaidoialariz
 

Destacado (11)

'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
'An Independent Review Of The Rules Governing Local Content On Commercial Rad...
 
Commemorazione Craxi 2012[1]
Commemorazione  Craxi 2012[1]Commemorazione  Craxi 2012[1]
Commemorazione Craxi 2012[1]
 
Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013Emma Clark Columbia Certificate July 2013
Emma Clark Columbia Certificate July 2013
 
about_limeSHIFT
about_limeSHIFTabout_limeSHIFT
about_limeSHIFT
 
Diseño de título
Diseño de títuloDiseño de título
Diseño de título
 
Los materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informaticaLos materiales y las energías limpias en la informatica
Los materiales y las energías limpias en la informatica
 
Site Mockups
Site MockupsSite Mockups
Site Mockups
 
Menú del día
Menú del día Menú del día
Menú del día
 
9 tips for gaining Self Confidence
9 tips for gaining Self Confidence9 tips for gaining Self Confidence
9 tips for gaining Self Confidence
 
Things Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small BusinessThings Expo: The Emergence of the Quantified Small Business
Things Expo: The Emergence of the Quantified Small Business
 
Errezeta txantiloia
Errezeta txantiloiaErrezeta txantiloia
Errezeta txantiloia
 

Similar a Defence

Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceMarc Boorshtein
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdfMarlboroAbyad
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerTom Keetch
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less workIevgenii Katsan
 
IT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsIT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsSieuwert van Otterloo
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...PROIDEA
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversysKrishnendu Paul
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)mikemcbryde
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service deliveryRakuten Group, Inc.
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)abend_cve_9999_0001
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessHelpSystems
 
Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point SARCCOM
 
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with AnalyticsWSO2
 

Similar a Defence (20)

Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
 
Security testing
Security testingSecurity testing
Security testing
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less work
 
IT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startupsIT due diligence and software quality for fintech startups
IT due diligence and software quality for fintech startups
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point Blibli Web Application Security Policy Enforcement Point
Blibli Web Application Security Policy Enforcement Point
 
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
[WSO2Con EU 2017] Deriving Insights for Your Digital Business with Analytics
 

Último

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 

Último (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 

Defence

  • 1. E-Commerce & Web Solution Online Shopping mall Group members Md.Ramiz Uddin Md.Reduanur Rahman Rafi
  • 2. Contents will covered within this session 1.Project overview with PPT 2. Showing demo product live on browser 3.Submit report.
  • 3. We proposed for A system in which will include the following features • Business-to-Consumer (B2C) • Consumer-to-consumer (C2C) • CMS for all sorts of users • Custom search
  • 4. What we have achieved ? 1.Very user friendly interface. 2.A very useful project architecture. 3.Strong security system 4.Clean code
  • 5. User experience Design 1.Easy Navigation - The navigation is not hazy just added the necessary pages in the navigation bar. - User need not to round up here and there for their desired product. - Easy to crate account - Only few information needed to create account. 2.Supper easy management system. - Just do everything in one click
  • 6. Security system in detail SQL injection How does hackers inject bad thing lets have an example. The most common thing the hacker do first is bypassing how dose it works ? Lets have a look on our sql query for a login system $query="select username,pass from users where username='$uname' and password='$passwrd' limit 0,1";
  • 7. Security system Continued Hackers generally perform bypassing like this Username : ' or ''=' Password : ' or ''=‘ Then the query looks like select username, pass from users where username='' or ''='' and password='' or ''='' limit 0,1; To get ride of this we took 2 steps First one is to validate the form so that user could not enter any special character. Then we used PDO Which contains prepare function to execute query.
  • 10. Project Architecture How does it works ? User’s request • Frontend validation controller • Check valid request • Find model Model • find data • Save data
  • 11. Project Architecture Example of controlling a process
  • 12. Complete system at a glance Search with product name Know price limit View product and order View shop Bring products with shops B2C
  • 13. Complete system at a glance C2C • Buy and sell • Find ads • Create ads • Create account Product list Search Product Get seller info Find categories
  • 14. Let’s Move on towards demo