Vous êtes sur la page 1sur 51

Destiny Security Tools 2010

~1~
Destiny Security Tools 2010

Project Name :- Destiny Security Tools


2010

Developed For :- Common Computer


Users

Hardware :- intel Pentium,


256 MB RAM,
4.3 GB HDD,
VGA Monitor.

Front End :- VB 6

Operating
System :- Windows XP

Developed By :-Gosai Bhadreshbharthi R.


And

~2~
Destiny Security Tools 2010

Chandwani
Kapilkumar D.

~3~
Destiny Security Tools 2010

We have the work of develop


system. The system has been
developed to be very user friendly be
introducing HELP feature guiding the
user about what to do next at each
step. Any person, rather entirely
unfamiliar to the computer can also
work with new system through proper
use of the user help facilities.

This Software System will give


many Features that can’t be finding in
one software. Like the system that
only provides the facility of locking
folder that can not be use for other
work.

~4~
Destiny Security Tools 2010

This Software is very useful for


common user that use computer for
multimedia. The main purpose of this
system is to protect virus come
through USB port.

~5~
Destiny Security Tools 2010

~6~
Destiny Security Tools 2010

TABLE NAME : vdef.dat

FIELD NAME CONSTRAINT DATA TYPE WIDTH

No - TEXT 20

VNAME - TEXT 25

Defination - TEXT 25

TABLE NAME : Count_vdef.def

FIELD NAME CONSTRAINT DATA TYPE WIDTH

Count - TEXT unlimited

~7~
Destiny Security Tools 2010

TABLE NAME : app.dll

FIELD NAME CONSTRAINT DATA TYPE WIDTH

Password - TEXT 20

TABLE NAME : Update.Destiny

FIELD NAME CONSTRAINT DATA WIDTH


TYPE
DatabaseVer - TEXT 20

~8~
Destiny Security Tools 2010

~9~
Destiny Security Tools 2010

System development process is


spread out in several stages. Each
stages has its own place in
hierarchy of significance. These
stages start from preliminary
investigation and end design. The
major steps in this process are
system analysis and design.
system analysis define what is to
be done and system design decide
how is to be done. But before this
phase is encounter and important
stages of preliminary survey ,which
decides that, whether it is really
worth designing and developing
proposed system. Many question

~10~
Destiny Security Tools 2010

are to be answered until there is a


satisfactory answer for all of them.

There are three ways to system


development process.

System Development Life Cycle


method(SDLC).
Structure System Analysis and
Design Method (SAD).
Application prototyping.

System Development life cycle


method (SDLC)

First method that has used for


system development process. It is
widely accepted in its early days.
Shortly it is known as SDLC
method. this system evolving after
completion of one cycle of all
stages is never complete. To be
precise, it is on its way to
~11~
Destiny Security Tools 2010

perfection. After each iteration, it is


more near to its final stage of
approval and acceptances. So, it is
never completed in one pr two
cycle, it is a repetitive process.

The phases of this method are:-

1. Preliminary investigation

2. Feasibility survey

3. System analysis

4. System design

5. Testing

6. Implementation

7. Evaluation

8. Modification
~12~
Destiny Security Tools 2010

9. Documentation

Structure System Analysis and


Design Model (SSAD)

Another approach to system


development PROCESS IS SSAD.
This method is developed after
SDLC method. it is entirely
different from this method, since it
involves a no of iteration, until an
effective and system is developed.

The phases of this method are:-

Initialstudy
Analysis
~13~
Destiny Security Tools 2010

Design
Coding
Parallel run
Implementation

The initial study requires


examine the overall system and its
functioning. It also covers the
system feasibility in term’s OS
operation, cost of H/W and S/W
tenure required for developing the
specific system.

Analysis phase is a more detail


study of all the above factors along
with the formulation of the problem
precisely.

The other phases are almost same


as in SDLC method.

Application prototyping

~14~
Destiny Security Tools 2010

The prototype is a working


system. In other item it is a
product, which is revised again to
result in to final product ,i.e. it is
an intermediate product. This
method involves developing a
working system base on given
specifications, leaving to the user
for criticism, considering the
changes.

Suggested by them rebuilding


the prototype with new
specifications. This process is
retailed until a desire system is
produced.

~15~
Destiny Security Tools 2010

~16~
Destiny Security Tools 2010

 Why V.B. 6.0?

Visual Basic is by gar the most


popular programming tool in
history, and there are a lot of
good reasons for this popularity.
Visual Basic is first development
tool that took windows
programming out of the realm of
specialist and brought it to a
level where normal intelligent
people can make the thing
wonderful. As the name suggest,
programming with visual basic is
accomplished visually. The
method used to create the
graphical user interface is the
visual part where existing
~17~
Destiny Security Tools 2010

objects are dragged and dropped


into place instead of writing long
lines of code. While writing the
program, we are able to see how
the program will look during the
runtime. The idea of drag-drop
interface design and event
driven programming are almost
universal now, but the Visual
Basic was the first to make them
available to general
programmers.

Visual Basic was the first Rapid


Application Development tool for
the windows operating system
and to many people it is still the
best. In today’s industry scenario
there is an ever-expanding need
for speedy development of
application programs that are
sophisticated, reliable and full
featured. With Visual Basic we
can develop real world programs
speedily and easily.

~18~
Destiny Security Tools 2010

Microsoft Visual Basic 6.0 takes


advantage of both Windows 95
and Windows NT 32-bit
operating system. It has
excellent development
environment to create user
interface, to use OLE automation
and to use Active-X DLL, Active-
X EXE advantages along with
common functionalities in other
programming languages. In
particular, feature for database
programming, client/server
deployment and Internet
development provide the
capabilities the programmer
demand most.

~19~
Destiny Security Tools 2010

~20~
Destiny Security Tools 2010

Count_viruse.
def

No. Of Virus Detail

Acknowledgment
Destiny
Custome Securit
r y Tools
Detail 2010

Virus Detail

Vdef.dat

~21~
Destiny Security Tools 2010

CONTEX LEVEL DIAGRAM

Scan Count_viruse.
1.0
Detail def
Pc
Vdef.dat
Scan
Acknowledgment ment

2.0

Password Detail Password


Folder Detail App.dll
Lock
Acknowle-
dgment
Custome
r

3.0
Password USB Password Detail
Detail Lock

Acknowle-
dgment
System Tool Detail 5.0

4.0 System
Auto Tools
Shutdo
~22~
wn
Destiny Security Tools 2010

Shutdown detail

FIRST LEVEL DIAGRAM

Scan Count_viruse.
1.1
Detail def
Full

Scan Vdef.dat
Acknowledgment ment

1.2

Virus Detail Selecte 1.4


d
Deletio
Scan n

Custome
r

1. 3

Schedu
le

Scan

1.5

Reporti
~23~
ng
Destiny Security Tools 2010

Acknowledgment Deleted
Virus Detail

Second Level (PC Scan)


2.1
Password Detail get
Password detail Verify
Passwo
rd

Verification detail

2.2
Lock/Unlock
Lock/U App.dll
Detail
Custome nlock
r

2.3
Change Password detail
Change Change Password
detail Passwo
rd

~24~
Destiny Security Tools 2010

Second Level (Folder


lock)

3.1
Verify
Password Detail Passwo get
Password detail rd

Verification detail

3.2
Lock/Unlock
Lock/U App.dll
Detail
Custome nlock
r

3.3

Change
Passwo
~25~
rd
Destiny Security Tools 2010

Change Password detail


Change Password
detail

Second Level (USB


lock)

~26~
Destiny Security Tools 2010

Splash Screen

~27~
Destiny Security Tools 2010

Main Form

~28~
Destiny Security Tools 2010

Destiny Tools Form

~29~
Destiny Security Tools 2010

Go !

~30~
Destiny Security Tools 2010

PC Scan Tools

~31~
Destiny Security Tools 2010

Full Scan Form

~32~
Destiny Security Tools 2010

Report Form

~33~
Destiny Security Tools 2010

Selected Scan

~34~
Destiny Security Tools 2010

Schedule Scan

~35~
Destiny Security Tools 2010

Update Form

~36~
Destiny Security Tools 2010

Extra Tools

~37~
Destiny Security Tools 2010

Set Password

~38~
Destiny Security Tools 2010

Create Folder
~39~
Destiny Security Tools 2010

~40~
Destiny Security Tools 2010

Folder Lock

Lock/Unlock Form

~41~
Destiny Security Tools 2010

USB Lock Form

~42~
Destiny Security Tools 2010

~43~
Destiny Security Tools 2010

Lock / Unlock USB

~44~
Destiny Security Tools 2010

Auto Shutdown

~45~
Destiny Security Tools 2010

System Tools

~46~
Destiny Security Tools 2010

Restore Tool

~47~
Destiny Security Tools 2010

Disk Clean UP

~48~
Destiny Security Tools 2010

Help Form

~49~
Destiny Security Tools 2010

~50~
Destiny Security Tools 2010

Book : Visual Basic 6.0 Black Book

Book : Master In VB 6.0

~51~

Vous aimerez peut-être aussi