Académique Documents
Professionnel Documents
Culture Documents
1. INTRODUCTION
1.1 MOTIVATION
As the use of the Internet began to grow in the late 1980s and early 1990s, viruses began to be created for different reasons. Although a lot of viruses are written for fame and proof of concept, more viruses began to be created for spying on other people, other companies, and other governments. The term spying does not just refer to spyware, which is a form of malicious code that tracks the actions of users and then sells this information to advertisers. Instead, spying viruses refer to any type of virus that is installed on a computer to allow remote access to a computer by unauthorized persons. These viruses can be in the form of a Trojan horse that creates a backdoor, a virus that installs a key logger for capturing data, or any other type of software that provides unauthorized access to information on a computer system. Due to the above poblems faced by the people or the organisations who are using the personal computer for doning there work have to install an antivirus software into there system which prevents there system form virus. Now a days every one is using an antivirus in there system to project there system from virus. If a virus attacks to a system they are using a antivirus available in the market ofcorce it is hamfull to such but they dont know what is the correct antivirus required to them. So this is the reason why we have developed this project which give the information to the user about virus and the correct antivirus to the virus, is provided in our project.
Page 1
Page 2
2. LETERATURE SURVEY
2.1 INTODCUTION
1981/82, the first computer viruses in a wild have been developed. The programs infect Apple 11 disks without deleting data. It is called Elk Cloner. In 1983, the first documented experimental virus has been developed by Fred Cohen. Ralf Burger from Germany has presented Virdem virus during Chaos Computer Club conference. It establishes itself in the disk's boot sector. A small Pakistani computer firm developed Brain virus whose purpose is to foster customer loyalty. In 1987, Lehigh virus becomes the first virus to infect command.com. Jerusalem or also known as Friday the Thirteenth is the first virus to establish itself in the main memory (RAM). It affects the computer in two ways: On any thirteenth day of the month falling on Friday and on all other days, the virus reduces computer speed after 30 minutes. In 1988, Denny Yanuar Ramdhani from Bandung, Indonesia has developed Zuk; the first anti-virus. It recognizes and removes the Brain virus and then replaces it with a copy itself. The first memory resident virus; Cascade, loose into the wilderness in 1988. This virus has been developed by anonymous from Germany. In 1989, the first polymorphic virus is discovered. It is called as Washburn or V2Px 1260. Symantec introduces Norton Anti-virus in 1990. This is the first anti-virus programs developed by a large Internet company. In 1990, Verband Deutscher Virenhebhaber has developed the first virus construction kit for DOS systems. This kit enables someone to assemble new viruses. Mutation Engine program has been developed by Dark Avenger. This program can be used to generate polymorphic viruses from simple viruses. This program has been introduced in 1992. In 1993, the anti-virus industry presents its first wild list. This is a list of all computer viruses which surface "in the wild" that is directly on the user's PC. Goodd Times is the first hoax. This virus supposedly causes the entire contents of the hard disk to be deleted, merely by reading the message. This virus was launched on 1994. In 1995, the first macro virus which infects Microsoft Word documents was introduced. It is called Concept. WM/Concept was the first virus specifically written for the Microsoft Word system and discovered "in the wild". In 1995, the first Windows 95 virus; Boza was launched. On the 31"' of each month it issues a message regarding its creators; Quantum. Beside that, XM.Laroux; the first Excel virus make sits appearance in Alaska and Africa. Staog, the first Linuc virus is found in the lab but it is never spotted in the wild. Linux Bliss is the first Linux Tenali Engineering College Page 3
Virus Information System virus in the wild found in 1997. It searches for programs for which current process has write permission and then overwrite such files with its viral code. In 1998, the first VB script virus; VBS.Rabbit was found.
2.6 CONCLUSION
In this we specify the how proposed system is more usefull than the existing system. It is operationally feasible because now a days every one uses system and internet so every one can easily use this porject
Page 4
3. ANYALYSIS
3.1 Introduction
After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking as well as understanding of existing system is also difficult. Improper understanding of present system can lead diversion from solution.
Technical Feasibility
This project, Employee Performance and Recognition Portal needs the support to average technology already being implemented for other useful systems in a company. It requires PCs and a modem with normal configuration for Internet access. Almost all administrators have their own PC on their desk. Thus it is technically feasible to implement the new system here.
Economic Feasibility
Employee Performance and Recognition Portal is a mid-scale project. It is very much useful to employees as well as admin people in reducing manual work which increases the productivity of the company. The infrastructure for the development of their new system is available in the company. The system is developed at no additional cost. Hence it is economically feasible for the new system to be implemented.
Operational Feasibility
This system is being automated on the request of the employees of a company and the management people. This new system meets their requirement and covers all aspects
required much better than the old manual system. Most of the people involved in this company are computer literates and do not need much training if this system is implemented. Hence it is operationally feasible. Tenali Engineering College Page 5
HTML
JAVA
Oracle 10g
JSP
3.2.2.1 HTML
Hyper Text Markup Language (HTML) is a language used to create hypertext documents that have hyper links embedded in them. It consists of tags embedded in the text of a document with HTML. We can build web pages or web document s. it is basically a formatting language and not a programming language. The browser reading the document interprets mark up tags to help format the document for subsequent display to a reader. HTML is a language for describing structured documents. HTML is a platform independent. WWW (World Wide Web) pages are written using HTML. HTML tags control in part the representation of the WWW page when view with web browser. The browser interprets
Page 6
Virus Information System HTML tags in the web document and displays it. Different browsers show data differently. Examples of browsers used to be web pages include: Netscape Internet Explorer
HTML: What It Is HTML is a document-layout and hyperlink-specification language. It defines the syntax and placement of special, embedded directions that aren't displayed by the browser, but tell it how to display the contents of the document, including text, images, and other support media. The language also tells you how to make a document interactive through special hypertext links, which connect your document with other documents--on either your computer or someone else's, as well as with other Internet resources, like FTP and Gopher. IMAGE HTML TAG: This command presents Select File dialog box to select image file. If you want to insert the image tag directly without the dialog box, hold down Shift key when running this command. <IMG SRC="" ALT=""> The Table Generator helps you to insert table tag into the HTML document very easily. Press left mouse button on a table cell and drag to the desired size then release the mouse button. Inserts Frame HTML tag: <FRAMESET ROWS="," COLS=","> <FRAME NAME="" SRC="" SCROLLING=""> <FRAME NAME="" SRC="" SCROLLING=""> </FRAMESET> Inserts Font HTML tag: <FONT SIZE=""></FONT> This command presents Heading popup menu. Heading 1 - 6 tags are available on heading popup menu.
Page 7
Virus Information System Inserts Horizontal Ruler HTML tag: <HR> This command presents List tag popup menu. Unordered list, ordered list and Definition list are available on List tag popup menu. Inserts List Box HTML tag: <SELECT NAME=""></SELECT> Inserts Ordered List HTML tag. <OL> <LI> </LI> </OL> With all its multimedia-enabling, new page layout features, and the hot technologies that give life to HTML documents over the Internet, it is also important to understand the language's limitations: HTML is not a word processing tool, a desktop publishing solution, or even a programming language, for that matter. That's because its fundamental purpose is to define the structure and appearance of documents and document families so that they might be delivered quickly and easily to a user over a network for rendering on a variety of display devices.
Virus Information System .. .. </Body> </Html> Each document has a head and a body, delimited by the <head> and <body> tags. The head is where you give your HTML document a title and where you indicate other parameters the browser may use when displaying the document. The body is where you put the actual contents of the HTML document. This includes the text for display and document control markers (tags) that advise the browser how to display the text. Tags also reference specialeffects files including graphics and sound, and indicate the hot spots (hyperlinks and anchors) that link your document to other documents.
Basic HTML Tags : <! ---> Specifies comments Creates hypertext links Formats text as bold Formats text in large font. Contains all tags and text in the HTML document Creates text Definition of a term Creates definition list Formats text with a particular font Encloses a fill-out form Defines a particular frame in a set of frames Creates headings of different levels Contains tags that specify information about a document <HR>...</HR> <HTML></HTML> <META>...</META> <SCRIPT></SCRIPT> Tenali Engineering College Creates a horizontal rule Contains all other HTML tags Provides meta-information about a document Contains client-side or server-side script Page 9
<A>.</A> <B>.</B> <BIG>. </BIG> <BODY></BODY> <CENTER>...</CENTER> <DD></DD> <DL>...</DL> <FONT></FONT> <FORM>...</FORM> <FRAME>...</FRAME> <H#></H#> <HEAD>...</HEAD>
Creates a table Indicates table data in a table Designates a table row Creates a heading in a table
A HTML document is small and hence easy to send over the net. It is small because it does not include formatted information.
3.2.2.2 JAVA
About JAVA: Java was conceived by James Gosling, Patrick Naughton, Chris Warth, Ed Frank and Mike Sheridan at SUN Micro Systems Incorporation in 199I.It took 18 months to develop the first working version .This language initially called "OAK", but was renamed " JAVA " In 1995.Beforde the initial implementation of OAK in 1992 and the public announcement of Java in 1995, many more contributed to the design and evolution of the language.
JAVA Overview: Java is a powerful but lean object oriented programming language. lt has generated a lot of excitement because it makes it possible to program for internet by creating applets. Programs that can be embedded in a web page. The context of an applet is limited only by one's imagination. For example an applet can be an animation with sound, an interactive game or a ticker tape with constantly updated stock prices. Applets can be just little decorations to liven up web page, or they can be serious applications like word processors or spreadsheets. But Java is more than programming language for writing applets. It is being used more and more for writing standalone application as well. It is becoming so popular that many people believe it will become standard language for both general purpose and internet programming.
Page 10
Virus Information System JAVA is Robust: The multiplatform environment of the Web places extraordinary demands on a program, because it must execute reliably in a variety of systems. Thus the ability to create robust programs was given a high priority in the design of java. To gain reliability Java restricted you in a few key areas to force you to find your mistakes early in program developments. At the same Java frees you from having to worry about many of the most common causes of programming errors. Because Java is strictly typed language, it checks your code at compile time. JAVA Scales Well: Java platform is designed to scale well, for portable consumer electronic devices to powerful desktop and several machines. The virtual machine takes a small foot print and Java byte code is optimized to be small and compact. As a result java accommodates the need for low storage and bandwidth transmission over the internet. JAVA is Multithreaded: Multithreading is simply the ability of a program to do more than one thing at a time. For example an application could be faxing documentation at the same time is printing another document. Multithreading is particularly important in multimedia: a multimedia program might often be running a movie, running an audio track and displaying text at the same time. JAVA is Extensible: A big plus for Java is the fact it can be extended. lt was purposely written to be lean with the emphasis on doing what it does very well: instead of typing of trying to do everything from the beginning, it was written so that extending it is very easy. JAVA is Secure: The Java platform builds security in four ways. 1 .The way memory is allocated and laid out. 2. The way incoming code checked. 3. The classes are loaded 4. The way access is restricted for untrusted code. JAVA performs well: Java's performs is better than one might expect. Java's many advantages, such as having built-in security and being interpreted as well as compiled, does have a cost attached Tenali Engineering College Page 11
Virus Information System them. However, various optimizations have been built-in, and the byte code interpreter can run very fast the cost it does not have to do any checking. No pointers: Eliminates big source errors by using object references instead of memory pointers, problems with pointer arithmetic are eliminated and problems with in adversely accessing the wrong memory address are greatly reduced. Strong Typing: Cuts down on runtime errors because Java enforces strong type checking, many errors are caught when code is compiled. Dynamic binding is possible and often very useful but static binding with strict type checking is used when possible. Simplicity: Makes Java easier to learn and correctly Java keeps it simple by having just one way to do something instead of having several alternatives as in some languages Java also stays lean by not including multiple inheritance which eliminates the errors and ambiguity that arise when you create a subclass that inherits from two or more classes. JAVA includes a Library of classes and interfaces: The Java platform includes an extensive class library so that programmers can use already existing classes it is create sub classes to modify existing classes or implements interfaces to augment the capabilities of classes.
Virus Information System JSPs are not restricted to any specific platform or server. It was originally created as an alternative to Microsoft's ASPs(Active Server Pages). Recently, however, Microsoft has countered JSP technology with its own ASP.NET, part of the .NET initiative. Java Server Pages (JSP) is a technology that lets you mix regular, static HTML with dynamically-generated HTML. Many Web pages that are built by CGI programs are mostly static, with the dynamic part limited to a few small locations. But most CGI variations, including servlets, make you generate the entire page via your program, even though most of it is always the same. JSP lets you create the two parts separately
Advantages of JSP?
Vs. Active Server Pages (ASP). ASP is a similar technology from Microsoft. The advantages of JSP are twofold. First, the dynamic part is written in Java, not Visual Basic or other MS-specific language, so it is more powerful and easier to use. Second, it is portable to other operating systems and non-Microsoft Web servers.
Vs. Pure Servlets. JSP doesn't give you anything that you couldn't in principle do with a servlet. But it is more convenient to write (and to modify!) regular HTML than to have a zillion println statements that generate the HTML. Plus, by separating the look from the content you can put different people on different tasks: your Web page design experts can build the HTML, leaving places for your servlet programmers to insert the dynamic content.
Vs. JavaScript. JavaScript can generate HTML dynamically on the client. This is a useful capability, but only handles situations where the dynamic information is based on the client's environment. With the exception of cookies, HTTP and form submission data is not available to JavaScript. And, since it runs on the client,
Page 13
Virus Information System JavaScript can't access server-side resources like databases, catalogs, pricing information, and the like.
Vs. Static HTML. Regular HTML, of course, cannot contain dynamic information. JSP is so easy and convenient that it is quite feasible to augment HTML pages that only benefit marginally by the insertion of small amounts of dynamic data. Previously, the cost of using dynamic data would preclude its use in all but the most valuable instances.
Page 14
Virus Information System DBMS is a collection of inter-related data and set of programs that allow several users to access and manipulate data. Its main purpose is to provide users with an abstract view of the data, i.e. the system hides certain details of how the data is stored and maintained. Database Management System is divided into 4 main components. Database Hardware Software User
Database:
It consists of collection of persistent data that is used by the application system. Hardware: The processor (s) and associated main memory that are used to support the execution of database system software. Software: The layer between the physical database and the users that handle all requests from the user for access to the database. User: There are three types of users Application Programmers End User Database Administrator (DBA)
TYPES OF DBMS:
There are four major categories of DBMS data models. Hierarchical Network Inverted Relational
Page 15
The commands in SQL is subdivided according to their functions as follows: Data Definition Language (DDL)-create, alter, drop, Truncate, rename Data Manipulation Language (DML)-insert, update, delete Data Control Language (DCL)-grant, revoke Data Retrival Language (DRL)-select Transaction Control Language (TCL)-commit, savepoint, rollback SQL*PLUS is a program or a tool available for working with an ORACLE Database. It allows the user to: 1. 2. 3. 4. Create tables in a database. Stores information in the tables. Changes information in the tables. Retrieve the information in the form we choose, Page 16
Virus Information System 5. 6. performing calculations on it and combining it in new ways. Maintain the database itself.
How Does JDBC Work? JDBC makes it possible to do the following things within a Java application: Establish a connection with a data source Send queries and update statements to the data source Process the results
Page 17
Virus Information System Why Do We Need JDBC? Why cant application developers use ODBC (Open Database Connectivity) on the Java platform? After all, its an established standard API for database access. You can use ODBC; however, ODBC isnt appropriate for direct use from the Java programming language because it uses a C interface. The JDBC API was modeled after ODBC, but, because JDBC is a Java API, it offers a natural Java interface for working with SQL. JDBC is needed to provide a pure Java solution for application development. Features of JDBC Following are some of the features that are part of the JDBC 3.0 specification:
Retrieval of auto-generated keys Blob/Clob Updates Multiple open result sets Transactional Save points Statement Pooling
Type 1: JDBC-ODBC bridge Type 2: partial Java driver Type 3: pure Java driver for database middleware Type 4: pure Java driver for direct-to-database
Establishing A Connection
The first thing to do, of course, is to install Java, JDBC and the DBMS on your working machines. Since we want to interface with an Oracle database, we would need a Tenali Engineering College Page 18
Virus Information System driver for this specific database as well. Fortunately, we have a responsible administrator who has already done all this for us on the Leland machines. To access a database, a connection must be opened between our program (client) and the database (server). This involves two steps: Load the vendor specific driver Why would we need this step? To ensure portability and code reuse, the API was designed to be as independent of the version or the vendor of a database as possible. Since different DBMSs have different behavior, we need to tell the driver manager which DBMS we wish to use, so that it can invoke the correct driver. Make the connection Once the driver is loaded and ready for a connection to be made, you may create an instance of a Connection object using: The connection returned in the last step is an open connection which we will use to pass SQL statements to the database. In this code snippet, con is an open connection, and we will use it below.
Transactions
Page 19
Virus Information System JDBC allows SQL statements to be grouped together into a single transaction. Thus, we can ensure the ACID (Atomicity, Consistency, Isolation, Durability) properties using JDBC transactional features. The Connection object performs transaction control. When a connection is created, by default it is in the auto-commit mode. This means that each individual SQL statement is treated as a transaction by itself, and will be committed as soon as its execution finished. (This is not exactly precise, but we can gloss over this subtlety for most purposes).
128 MB
20 GB
3.5 CONCLUSION
In this phase, we understand the software requirement specifications for the project. We arrange all the required components to develop the project in this phase itself so that we will have a clear idea regarding the requirements before designing the project. Thus we will proceed to the design phase followed by the implementation phase of the project. Tenali Engineering College Page 20
4.DESIGN
4.1 INTODUCTION
It details how the softare rquirements should be implemented and it gives the programmers a blueprint to follow.Once the software design document is approved by the appropriate parties, it becomes a baseline for limiting changes in the scope of the project.
Page 21
4.2.1.1 OVERVIEW/DFD
Login
Logout
Page 22
Update virus
Accept/reject Virus
View Feedback
Searchvirus
Viewvirus
Postvirus
download antivirus
send Feedback
SearchVirus
Page 23
ViewVirus
visitor
Send feedback
search virus
Page 24
: ADMIN
LOGIN
ACCEPT/REJE CT USERS
POST VIRUS
POST ANTIVIRUS
VIEW FEEDBACK
SEARCH VIRUS
LOGOUT
LOGIN ACCEPT/REJECT
POST VIRUS
POST ANTIVIRUS
VIEW FEEDBACK
SEARCH VIRUS
LOGOUT
Page 25
VIEW VIRUS
SEND FEEDBACK
SEARCH VIRUS
: VISITOR
LOGIN
VIEW VIRUS
POSTVIRUS
POST ANTIVIRUS
DOWNLOAD ANTIVIRUS
SEND FEEDBACK
SEARCH VIRUS
LOGOUT
: USER
POST VIRUS
POST ANTIVIRUS
DOWNLOAD ANTIVIRUS
SEND FEEDBACK
SEARCH VIRUS
LOGOUT
Page 26
Visitor module:
He/she can search for virus He/she can view virus information He/she can send feedback to administrator
User module:
He/she first login into the system He/she can upload and download antivirus for the existing virus He/she can send feedback to the administrator He/she Can receive virus updates He/she Can post virus He/she Can view virus information He/she Can develop further to the existing system
Administrator module:
He/she Maintains or updates the wholr information system about viruses antiviruses He/she Has right to add or remove users He/she Can upload the antivirus with respect to the virus posted by users He/she Can view feedbacks that are3 sent by the users and visitors He/she Can view whole system information that is given by the users.
4.4 CONCLUSION
In this way we can design the layout of the project which is to be implemented during theconstruction phase. Thus we will have a clear picture of the project before being coded. Hence any necessary enhancements can be made during this phase and coding can be started. Tenali Engineering College Page 27
Page 28
Page 29
Sno 1 2 3 4 5
Sno 1 2 3 4 5 6
Page 30
Constraints Primary key Not null Not null Not null Not null Not null Not null
Description Virus no Virus name Virus type Date Posted Posted By Effected Files Effected Date Other Details
Sno 1 2 3 4 5 6
Column name Avno Avname Avtype Date Posted Locate File Posted By
Constraints Primary key Not null Not null Not null Not null Not null
Description Anti virusno Antivirus name Antivirus type Date Posted Locate File Posted By
Page 31
Sno 1 2 3 4 5
Constraints Primary key Not null Not null Not null Not null
Page 32
Page 33
HOME PAGE
Page 34
Page 35
ACCEPT/REJECT SCREEN
Page 36
Page 37
LOGOUT SCREEN
Page 38
Page 39
Page 40
Page 41
Page 42
5.3 Conclusion
In this way we implement the project successfully using java server pages for an easy interaction of the user to virus information with less effort work . we proceed to the next phase i.e.,testing which is very important while delevering the porject.
Page 43
6.SYSTEM TESTING
6.1 INTRODUCTION:
Testing is performed after the coding phase. It is a major software quality control measure employed during software development. Its basic function is to detect the errors in the software. The goal of the testing is to uncover required design and coding errors in the programs. The input phase of the testing is the written code. Testing is performed with unit testing which detects errors in each module. These modules are integrated into subsystems and tested for integration. Eventually the overall system is tested which is called system testing. At the end, the system is tested with the real data at the place of installation called as acceptance testing. Testing involves selection of test cases on the basis of two methods. Functional testing, which involves selection test cases for testing the specifications of the system or the module. Structural testing, which involves testing the internal structure of the system or module. The goal of the testing is to select the test cases such that maximum number of errors can be detected by making use of minimum number of test cases. For this reason we generate the test cases on the basis of the test criteria. A criterion is valid if any error in the software can be revealed by the same test case satisfying the criteria.
Page 44
TESTING PROCESS:
Testing performs a very critical role for quality assurance and ensuring the reliability of the software. During testing, the program to be tested is executed with a set of test cases and output of the program for the test case is evaluated to determine if the program is performing as it is expected to. Testing is a process of executing a program with the intent of finding errors. A good test case is one that has a high probability of finding as yet undiscovered error. A successful test is one yet uncovers as yet-undiscovered error.
TESTING TYPES:
Black box Testing focuses on the input/output behavior of the component. Black box tests do not deal with the internal aspects of the component nor with the behavior or the structure of the component. White box Testing focuses on the internal structure of the component. A white box test makes sure that every state in the dynamic model of the object and interactions among the objects are tested.
Types of Testing
Page 45
6.3 Testcases:
TEST CASE ID VIS_01 Enter the wrong username Error Message has to Error Message is Pass and password for Admin be displayed displaying TEST CASE EXPECTING BEHAVIOUR EXHIBITING BEHAVIOUR RES ULT
VIS_02
Login as Admin and Try It has to Add the new It to Add the new virus virus
is
Adding Pass
successfully
VIS_03
Login as Admin and Try It has to Display all It is Displaying all Pass to View the virus Details virus details virus details is adding Pass
VIS_04
Enter Registration first to It has to add the user It access the site details
registration details
VIS_05
Enter the wrong username Error Message has to Error Message is Pass and password for User be displayed displaying It is Displaying all Pass Virus Details
VIS_06
Login as User and try to It has to Display View virus all Virus Details
VIS_07
Login as User and try to It has to add new virus It is adding virus Pass add virus details details is adding Pass
VIS_08
Login as User and try to It has to add new It add antivirus information antivirus information
antivirus information
VIS_09
Login as User and try to It has to download It is downloaded Pass download antivirus antivirus information antivirus information
10
Login as User and try to It has to display the It Search virus virus information
id
displaying Pass
6.3 VALIDATION
Validation aims to demonstrate that the software functions in a manner that can be reasonably expected by the customer. This tests conformance the software to the Software Requirements Specification. Here an experiment has done for checking the consistency for the user requirements regarding the username and password which should be validated through the server and the username and password should be matched and also the method Steganography implemented also checked for its consistency to provide security.
6.4 CONCLUSION:
In this way we also completed the testing phase of the project and ensured that the system is ready to go live
Page 47
FUTURE SCOPE:
In Feature this application can be developed with effectively with Security implementation. It also implemented with different new tools also used for development. In feature the users can provide the different tips for the virus removal In feature the administrator can also upload the licensed antivirus for user access to purchase from the site. In feature it can also implemented to provide more security for the application.
Page 48
BIBLIOGRAPHY
S. No Author of the Book Name of the Book Publisher Magazine Edition Year
01
Herbert Shieldt
Gold
2003
02
Ivan Bayross
TatMcGrahil
2001
03
1999
04
Roger Pressman
Software Engineering
Pearson Edition
1996
05
Roger S.Pressman
Software Engineering
MC-Graw-Hill International
1992
06
Bernerd Bruegge
Wiley Edition
2000
WEBSITES:
www.java2s.com www.javascript.internet.com www.freecsstemplates.org www.roseindia.net Tenali Engineering College Page 49