Develop web application system that scan classified files

Assignment Help Computer Engineering
Reference no: EM131243298

I want to develop a private web application system that scan the confidential and classified files with multiple Anti-virus engines.

The web should be look like " virusetotal.com, but I cannot use and uplaod any classified files to this website beacuse of its confidentiaity.  

It is a single web application to scan a file with multiple AV engines simultaneously and report back the analysis result.

Basically, the multi-engine antivirus scanner is a web based system that offers the ability to upload a file or multiple files and scan them with many different types of antivirus software instantaneously.

How it works:

- Users visit the website.

- Browse the file that they want to scan from the computer, or drag and drop the file from computer to the web.

- Then, click on upload button to start uploading

- After that, click a scan button and wait for the scan to run. Within seconds, the detection results are displayed on your web browser for you to decide if it is infected or not.

The file analysis results are based on antivirus engines.

The malware signatures of antivirus solutions will be updated as they are developed and distributed by the antivirus companies. This makes sure that the products are using the latest signature sets.

Reference no: EM131243298

Questions Cloud

Compare and contrast to your chosen change model : For this assignment, write a 1-2 page analysis of the change methods that were implemented to address the organization's problems. Compare and contrast to your chosen change model. Include an example of at least three similarities and three differ..
How the group of four items crawls up to the top of queue : Start with the initial configuration of the Queue Workshop applet. Alternately remove and insert items. (This way, you can reuse the deleted key value for the new item without typing it.) Notice how the group of four items crawls up to the top of ..
What does project failure mean and what are some examples : What does project failure mean? What are some examples? Name the 10 project management knowledge areas, and briefly summarize each. Appreciative inquiry consists typically of four phases. Identify the four phases, and briefly describe eac..
What is the story miles go before we sleep : What is the story miles go before we sleep: racial inequities in health by david Williams and what do you think about the article?
Develop web application system that scan classified files : I want to develop a private web application system that scan the confidential and classified files with multiple Anti-virus engines. The web should be look like " virusetotal.com, but I cannot use and uplaod any classified files to this website bea..
Consumer surplus from their visit to amusement park : (Consumer Surplus) If, toward the end of the day, some people become indifferent whether or not they go on another ride, how can we say that they derived consumer surplus from their visit to the amusement park that day?
Write a nodups() method for the higharray class : One approach is to first compare every item with all the other items and overwrite any duplicates with a null (or a distinctive value that isn't used for real keys). Then remove all the nulls. Of course, the array size will be reduced.
Give an overview of the delta pacific case study : In a 1-page summary, give an overview of the Delta Pacific case study, listing at least three key takeaways of what you gleaned from the study. Share two separate contingency models that could be used to affect the organizational change and share ..
Finding the largest item and carrying it toward out : You'll need two outer indexes, one on the right (the old out) and another on the left.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd